scispace - formally typeset
N

Ninghui Li

Researcher at Purdue University

Publications -  266
Citations -  19897

Ninghui Li is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Differential privacy. The author has an hindex of 70, co-authored 262 publications receiving 17748 citations. Previous affiliations of Ninghui Li include New York University & National Chiao Tung University.

Papers
More filters
Journal ArticleDOI

Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages.

TL;DR: Embedded training is a complementary strategy to compensate for lack of phishing webpage detection skill when phishing warning is absent and development of training-embedded warnings to enable security training at scale is considered.
Posted Content

Consistent and accurate frequency oracles under local differential privacy

TL;DR: 10 different methods to add post-processing steps to frequency oracle protocols to make them consistent while achieving high accuracy for a wide range of tasks are considered, including frequencies of individual values, frequencies of the most frequent values, and frequencies of subsets of values.
Journal ArticleDOI

Combining Discretionary Policy with Mandatory Information Flow in Operating Systems

TL;DR: The Information Flow Enhanced Discretionary Access Control (IFEDAC) model is proposed, a model that implements the discretionary policy in DAC with the dynamic information flow techniques in MAC achieving the best of both worlds.
Proceedings ArticleDOI

Recursive partitioning and summarization: a practical framework for differentially private data publishing

TL;DR: This paper considers the scenario in which a trusted curator gathers sensitive information from a large number of respondents, creates a relational dataset where each tuple corresponds to one entity, and then publishes a privacy-preserving version of the dataset.
Proceedings ArticleDOI

Securing Java RMI-based distributed applications

TL;DR: This work presents a security architecture that protects both clients and services in distributed proxy-based computing, and describes a Java-based toolkit that implements the security architecture.