PRECIP: Towards Practical and Retrofittable Confidential Information Protection.

Jong Youl Choi , Ninghui Li , Zhuowei Li , XiaoFeng Wang
network and distributed system security symposium

21
2008
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.

Ninghui Li , Ziqing Mao , Hong Chen
network and distributed system security symposium

41
2009
A Framework for Role-Based Access Control in Group Communication Systems.

Cristina Nita-Rotaru , Ninghui Li
ISCA PDCS 522 -529

27
2004
On XACML's adequacy to specify and to enforce HIPAA

Elisa Bertino , Jianwei Niu , Omar Chowdhury , Ninghui Li
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy 11 -11

8
2012
Nonparametric Bayesian Matrix Factorization by Power-EP

Ian Molloy , Yuan (Alan) Qi , Rongjing Xiang , Nan Ding
international conference on artificial intelligence and statistics 169 -176

22
2010
TIAMAT: a Tool for Interactive Analysis of Microdata

Gabriel Ghinita , Elisa Bertino , Chenyun Dai , Ji-Won Byun

2009
On the correctness criteria of fine-grained access control in relational databases

Elisa Bertino , Qihua Wang , Keith Irwin , Ji-Won Byun
very large data bases 555 -566

76
2007
User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.

Hongxia Jin , Luo Si , Ninghui Li , Lei Cen
international acm sigir conference on research and development in information retrieval 25 -30

26
2014
A semantics based approach to privacy languages

Annie I. Antón , Ninghui Li , Ting Yu
Computer Systems: Science & Engineering 21 ( 5) 339 -352

29
2006
Foundational and applied research in access control

Ninghui Li , Mahesh Tripunitara
annual information security symposium 23

2004
Using probabilistic generative models for ranking risks of android apps

Hao Peng , Chris Gates , Bhaskar Sarma , Ninghui Li
annual information security symposium 25

517
2013
Role mining and policy misconfigurations

Ian Molloy , Yuan Qi , Luke Dickens , Ninghui Li
annual information security symposium 28

2010
Analyzing protection quality of security-enhanced operating systems

Ninghui Li , Ziqing Mao , Hong Chen
annual information security symposium 8

2
2009
Locally Differentially Private Protocols for Frequency Estimation

Jeremiah Blocki , Ninghui Li , Somesh Jha , Tianhao Wang
usenix security symposium 729 -745

398
2017
Locally Differentially Private Heavy Hitter Identification

Ninghui Li , Somesh Jha , Tianhao Wang
arXiv: Cryptography and Security

82
2017
Differentially Private $k$-Means Clustering

Elisa Bertino , Hongxia Jin , Dong Su , Jianneng Cao
arXiv: Cryptography and Security

153
2015
PrivBasis: Frequent Itemset Mining with Differential Privacy

Wahbeh Qardaji , Dong Su , Jianneng Cao , Ninghui Li
arXiv: Databases

205
2012
Information-theoretic metrics for Local Differential Privacy protocols

Milan Lopuhaä-Zwakenberg , Boris Škorić , Ninghui Li ,
arXiv: Cryptography and Security

14
2019
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.

Yueqiang Cheng , Dong Su , Ninghui Li , Somesh Jha
arXiv: Cryptography and Security

18
2020
Improving Utility and Security of the Shuffler-based Differential Privacy

Ninghui Li , Cheng Hong , Somesh Jha , Zhicong Huang
arXiv: Cryptography and Security

23
2019