Ninghui Li
Orcid: 0000-0003-2730-8622Affiliations:
- Purdue University, West Lafayette, USA
According to our database1,
Ninghui Li
authored at least 235 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to data privacy, access control, and trust management".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling.
CoRR, January, 2025
IEEE Geosci. Remote. Sens. Lett., 2025
2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024
Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity.
Sensors, April, 2024
A Generalized Model of Sea Surface Slopes and Its Application to Sun Glint Correction on HY-1C/COCTS Imagery.
IEEE Trans. Geosci. Remote. Sens., 2024
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors.
Signal Process., 2024
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey.
CoRR, 2024
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks.
CoRR, 2024
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments.
Inf. Syst. Res., March, 2023
Sun Glint Correction Based on BRDF Model for Improving the HY-1C/COCTS Clear-Sky Coverage.
IEEE Geosci. Remote. Sens. Lett., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Effective passive membership inference attacks in federated learning against overparameterized models.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors.
Hum. Factors, 2022
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Remote. Sens., 2021
J. Priv. Confidentiality, 2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proc. VLDB Endow., 2020
Proc. VLDB Endow., 2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020
CoRR, 2020
CoRR, 2020
Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap.
CoRR, 2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Int. J. Hum. Comput. Interact., 2019
Hum. Factors, 2019
Four accuracy bounds and one estimator for frequency estimation under local differential privacy.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Briefings Bioinform., 2019
Proceedings of the 2019 International Conference on Management of Data, 2019
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context.
Int. J. Hum. Comput. Stud., 2018
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 International Conference on Management of Data, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017
Proc. VLDB Endow., 2017
Hum. Factors, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02350-7, 2016
Proceedings of the 2016 International Conference on Management of Data, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code.
IEEE Trans. Dependable Secur. Comput., 2015
Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
CoRR, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the International Conference on Management of Data, 2014
Proceedings of the Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proc. VLDB Endow., 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Proc. VLDB Endow., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Recursive partitioning and summarization: a practical framework for differentially private data publishing.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
On sampling, anonymization, and differential privacy or, <i>k</i>-anonymization meets differential privacy.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
ACM Trans. Inf. Syst. Secur., 2011
On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Secur. Comput., 2011
CoRR, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010
IEEE Trans. Knowl. Data Eng., 2010
ACM Trans. Inf. Syst. Secur., 2010
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data.
Proc. VLDB Endow., 2010
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Int. J. Inf. Sec., 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proc. VLDB Endow., 2009
Int. J. Inf. Sec., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
Proceedings of the ICDM 2009, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
Proceedings of the Financial Cryptography and Data Security, 2009
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
Proceedings of the Computer Security, 2009
Proceedings of the Computer Security, 2009
2008
VLDB J., 2008
IEEE Trans. Dependable Secur. Comput., 2008
J. ACM, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Computer Security, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
J. Comput. Secur., 2007
IEEE Secur. Priv., 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 23rd International Conference on Data Engineering, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005
Proceedings of the Foundations of Security Analysis and Design III, 2005
2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
A Framework for Role-Based Access Control in Group Communication Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Practical Aspects of Declarative Languages, 5th International Symposium, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
2001
Proceedings of the Financial Cryptography, 2001
Proceedings of the CCS 2001, 2001
2000
PhD thesis, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999