Ariotedef: Adversarially robust iot early defense system based on self-evolution against multi-step attacks M Huang, H Lee, A Kundu, X Chen, A Mudgerikar, N Li, E Bertino ACM Transactions on Internet of Things 5 (3), 1-34, 2024 | | 2024 |
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape-A Survey JC Zhao, S Bagchi, S Avestimehr, KS Chan, S Chaterji, D Dimitriadis, J Li, ... arXiv preprint arXiv:2405.03636, 2024 | | 2024 |
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks X Li, Z Li, N Li, W Sun arXiv preprint arXiv:2403.19510, 2024 | | 2024 |
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training J Li, N Li, B Ribeiro arXiv preprint arXiv:2311.00919, 2023 | 1 | 2023 |
Towards Efficient Privacy-Preserving Deep Packet Inspection W Wang, H Lee, Y Huang, E Bertino, N Li European Symposium on Research in Computer Security, 166-192, 2023 | 3 | 2023 |
Exploring Use of Explanative Illustrations to Communicate Differential Privacy Models A Xiong, C Wu, T Wang, RW Proctor, J Blocki, N Li, S Jha Proceedings of the Human Factors and Ergonomics Society Annual Meeting 67 (1 …, 2023 | | 2023 |
Polyscope: Multi-policy access control analysis to triage android scoped storage YT Lee, H Chen, W Enck, H Vijayakumar, N Li, Z Qian, G Petracca, ... IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |
Privacy and security X Gong, Y Chen, W Yang, H Huang, Q Wang ACM Transactions on 26 (4), 2023 | 2 | 2023 |
Fine-grained poisoning attack to local differential privacy protocols for mean and variance estimation X Li, N Li, W Sun, NZ Gong, H Li 32nd USENIX Security Symposium (USENIX Security 23), 1739-1756, 2023 | 13 | 2023 |
Intrusion Detection Systems for IoT H Lee, A Mudgerikar, N Li, E Bertino IoT for Defense and National Security, 237-258, 2022 | | 2022 |
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors J Chen, H Ge, N Li, RW Proctor Human factors 64 (8), 1331-1350, 2022 | 2 | 2022 |
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy M Lopuhaä-Zwakenberg, B Škorić, N Li Proceedings of the 21st Workshop on Privacy in the Electronic Society, 41-53, 2022 | 3 | 2022 |
Effective passive membership inference attacks in federated learning against overparameterized models J Li, N Li, B Ribeiro The Eleventh International Conference on Learning Representations, 2022 | 7 | 2022 |
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks H Lee, A Mudgerikar, A Kundu, N Li, E Bertino European Symposium on Research in Computer Security, 549-568, 2022 | 5 | 2022 |
Application of Differential Privacy to the 2020 US Census and American Community Survey: Researchers’ Understanding and Reactions Q Zhong, RW Proctor, J Blocki, N Li, A Xiong Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66 (1 …, 2022 | | 2022 |
Differentially private vertical federated clustering Z Li, T Wang, N Li arXiv preprint arXiv:2208.01700, 2022 | 12 | 2022 |
Analysis Techniques for Information Security A Datta, S Jha, N Li, D Melski, T Reps Springer Nature, 2022 | 15 | 2022 |
Differentially Private Data Synthesis: State of the Art and Challenges N Li Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 2 | 2022 |
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol H Lee, I Karim, N Li, E Bertino Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 7 | 2022 |
Using illustrations to communicate differential privacy trust models: an investigation of users' comprehension, perception, and data sharing decision A Xiong, C Wu, T Wang, RW Proctor, J Blocki, N Li, S Jha arXiv preprint arXiv:2202.10014, 2022 | 12 | 2022 |