scispace - formally typeset
N

Ninghui Li

Researcher at Purdue University

Publications -  266
Citations -  19897

Ninghui Li is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Differential privacy. The author has an hindex of 70, co-authored 262 publications receiving 17748 citations. Previous affiliations of Ninghui Li include New York University & National Chiao Tung University.

Papers
More filters
Journal ArticleDOI

Effect of microwave radiation on mechanical behaviors of tight fine sandstone subjected to true triaxial stress

TL;DR: In this article , the authors conducted a triaxial test of sandstone under different microwave irradiation conditions and found that the strength of the irradiated sandstone first increased and then decreased.
Journal ArticleDOI

Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks

TL;DR: This paper identifies the underlying design weaknesses enabling such attacks and proposes efficient and backward-compatible approaches to address these weaknesses and demonstrates the deployment feasibility of the enhanced paging protocol by implementing it on an open-source cellular protocol library and commodity hardware.
Posted Content

Information-theoretic metrics for Local Differential Privacy protocols

TL;DR: New information-theoretic metrics for utility and privacy in local Differential Privacy protocols are introduced, showing how they relate to $\varepsilon$-LDP, the \emph{de facto} standard privacy metric, giving an information- theoretic interpretation to the latter.
Proceedings ArticleDOI

Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning

TL;DR: This work extends BioCapsule to face-based recognition and incorporates state-of-art deep learning techniques into a BioC Capsule-based facial authentication system to further enhance secure recognition accuracy.
Posted Content

Practical and Robust Privacy Amplification with Multi-Party Differential Privacy.

TL;DR: This paper investigates the multiple-party setting of LDP, analyzes the threat model and identifies potential adversaries, and proposes new techniques that achieve a better privacy-utility tradeoff than existing ones.