scispace - formally typeset
N

Ninghui Li

Researcher at Purdue University

Publications -  266
Citations -  19897

Ninghui Li is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Differential privacy. The author has an hindex of 70, co-authored 262 publications receiving 17748 citations. Previous affiliations of Ninghui Li include New York University & National Chiao Tung University.

Papers
More filters
Proceedings ArticleDOI

Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps

TL;DR: This work evaluates the effectiveness of content protection mechanisms embraced by vendors of content delivery apps, with respect to a hierarchy of adversaries with varying real-world capabilities, and uncovered that, in many cases, due to developers' unjustified trust assumptions about the underlying technologies, adversaries can obtain unauthorized and unrestricted access to contents of apps.
Posted Content

Differentially Private $k$-Means Clustering

TL;DR: An improvement of DPLloyd is proposed which is a differentially private version of the Lloyd algorithm and a non-interactive approach EUGkM which publishes aDifferentially private synopsis for k-means clustering is proposed.
Proceedings ArticleDOI

Direct static enforcement of high-level security policies

TL;DR: This paper formally defines the notion of a static safety policy, which requires that every set of users together having all permissions needed to complete a sensitive task must contain a subset that satisfies the corresponding security requirement expressed as a term in the algebra.
Book ChapterDOI

Adaptive Deterrence of DNS Cache Poisoning

TL;DR: CGuard is proposed which is an adaptive defense framework for caching DNS resolvers: CGuard actively tries to detect cache poisoning attempts and protect the cache entries under attack by only updating them through available high confidence channels.
Proceedings Article

Analyzing protection quality of security-enhanced operating systems

TL;DR: The notion of vulnerability surfaces under attack scenarios as the measurement of protection quality is introduced, and a tool for computing the vulnerability surfaces is implemented.