Остановите войну!
for scientists:
default search action
Ninghui Li
- > Home > Persons > Ninghui Li
Publications
- 2023
- [j64]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [c141]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - 2022
- [c138]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c136]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c134]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [i28]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - 2020
- [j55]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [c121]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [i18]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i17]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020) - 2019
- [c116]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - 2017
- [j43]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - 2016
- [c95]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - 2015
- [i5]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private $k$-Means Clustering. CoRR abs/1504.05998 (2015) - 2013
- [c81]Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan:
Efficient and accurate strategies for differentially-private sliding window queries. EDBT 2013: 191-202 - 2012
- [c74]Ninghui Li, Haining Chen, Elisa Bertino:
On practical specification and enforcement of obligations. CODASPY 2012: 71-82 - [c71]Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino:
On XACML's Adequacy to Specify and to Enforce HIPAA. HealthSec 2012 - 2011
- [j35]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [j33]Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - 2010
- [j30]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [j28]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - 2009
- [j25]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - [j24]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009) - [j22]Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination. J. Comput. Secur. 17(1): 43-68 (2009) - [j21]Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li:
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. Proc. VLDB Endow. 2(2): 1618-1621 (2009) - [c60]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c56]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 - [c54]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - [e3]Elena Ferrari, Ninghui Li, Elisa Bertino, Yücel Karabulut:
Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings. IFIP Advances in Information and Communication Technology 300, Springer 2009, ISBN 978-3-642-02055-1 [contents] - 2008
- [c47]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 - [c46]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - [c45]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. SACMAT 2008: 103-112 - 2007
- [j13]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) - [j12]Ninghui Li, Ji-Won Byun, Elisa Bertino:
A Critique of the ANSI Standard on Role-Based Access Control. IEEE Secur. Priv. 5(6): 41-49 (2007) - [c41]Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 - [c36]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - 2006
- [c28]Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li:
Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 - 2005
- [c24]Elisa Bertino, Ji-Won Byun, Ninghui Li:
Privacy-Preserving Database Systems. FOSAD 2005: 178-206 - [c22]Ji-Won Byun, Elisa Bertino, Ninghui Li:
Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint