关注
Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
在 cs.purdue.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
Ariotedef: Adversarially robust iot early defense system based on self-evolution against multi-step attacks
M Huang, H Lee, A Kundu, X Chen, A Mudgerikar, N Li, E Bertino
ACM Transactions on Internet of Things 5 (3), 1-34, 2024
2024
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape-A Survey
JC Zhao, S Bagchi, S Avestimehr, KS Chan, S Chaterji, D Dimitriadis, J Li, ...
arXiv preprint arXiv:2405.03636, 2024
2024
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks
X Li, Z Li, N Li, W Sun
arXiv preprint arXiv:2403.19510, 2024
2024
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
J Li, N Li, B Ribeiro
arXiv preprint arXiv:2311.00919, 2023
12023
Towards Efficient Privacy-Preserving Deep Packet Inspection
W Wang, H Lee, Y Huang, E Bertino, N Li
European Symposium on Research in Computer Security, 166-192, 2023
32023
Exploring Use of Explanative Illustrations to Communicate Differential Privacy Models
A Xiong, C Wu, T Wang, RW Proctor, J Blocki, N Li, S Jha
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 67 (1 …, 2023
2023
Polyscope: Multi-policy access control analysis to triage android scoped storage
YT Lee, H Chen, W Enck, H Vijayakumar, N Li, Z Qian, G Petracca, ...
IEEE Transactions on Dependable and Secure Computing, 2023
32023
Privacy and security
X Gong, Y Chen, W Yang, H Huang, Q Wang
ACM Transactions on 26 (4), 2023
22023
Fine-grained poisoning attack to local differential privacy protocols for mean and variance estimation
X Li, N Li, W Sun, NZ Gong, H Li
32nd USENIX Security Symposium (USENIX Security 23), 1739-1756, 2023
132023
Intrusion Detection Systems for IoT
H Lee, A Mudgerikar, N Li, E Bertino
IoT for Defense and National Security, 237-258, 2022
2022
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors
J Chen, H Ge, N Li, RW Proctor
Human factors 64 (8), 1331-1350, 2022
22022
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy
M Lopuhaä-Zwakenberg, B Škorić, N Li
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 41-53, 2022
32022
Effective passive membership inference attacks in federated learning against overparameterized models
J Li, N Li, B Ribeiro
The Eleventh International Conference on Learning Representations, 2022
72022
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
H Lee, A Mudgerikar, A Kundu, N Li, E Bertino
European Symposium on Research in Computer Security, 549-568, 2022
52022
Application of Differential Privacy to the 2020 US Census and American Community Survey: Researchers’ Understanding and Reactions
Q Zhong, RW Proctor, J Blocki, N Li, A Xiong
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66 (1 …, 2022
2022
Differentially private vertical federated clustering
Z Li, T Wang, N Li
arXiv preprint arXiv:2208.01700, 2022
122022
Analysis Techniques for Information Security
A Datta, S Jha, N Li, D Melski, T Reps
Springer Nature, 2022
152022
Differentially Private Data Synthesis: State of the Art and Challenges
N Li
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
22022
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol
H Lee, I Karim, N Li, E Bertino
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
72022
Using illustrations to communicate differential privacy trust models: an investigation of users' comprehension, perception, and data sharing decision
A Xiong, C Wu, T Wang, RW Proctor, J Blocki, N Li, S Jha
arXiv preprint arXiv:2202.10014, 2022
122022
系统目前无法执行此操作,请稍后再试。
文章 1–20