Weining Yang

According to our database1, Weining Yang authored at least 19 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments.
Inf. Syst. Res., March, 2023

2019
Role of Platform, Supplier and Medium in Online Trust Formation.
Int. J. Bus. Data Commun. Netw., 2019

Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages.
Hum. Factors, 2019

2018
Enhancing security behaviour by supporting the user.
Comput. Secur., 2018

Adaptive Deterrence of DNS Cache Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
Hum. Factors, 2017

Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Differential Privacy: From Theory to Practice
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02350-7, 2016

Improving the Eco-system of Passwords
PhD thesis, 2016

Comparing Password Ranking Algorithms on Real-World Password Datasets.
Proceedings of the Computer Security - ESORICS 2016, 2016

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Effectiveness of a phishing warning in field settings.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
A Study of Probabilistic Password Models.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

PriView: practical differentially private release of marginal contingency tables.
Proceedings of the International Conference on Management of Data, 2014

2013
Understanding Hierarchical Methods for Differentially Private Histograms.
Proc. VLDB Endow., 2013

Differentially private grids for geospatial data.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Membership privacy: a unifying framework for privacy definitions.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...