Ning Li
#136,764
Most Influential Person Now
Ning Li's AcademicInfluence.com Rankings
Ning Licomputer-science Degrees
Computer Science
#6315
World Rank
#6661
Historical Rank
Information Security
#16
World Rank
#16
Historical Rank
Database
#3414
World Rank
#3557
Historical Rank

Download Badge
Computer Science
Ning Li's Degrees
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Ning Li Influential?
(Suggest an Edit or Addition)Ning Li's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- t-Closeness: Privacy Beyond k-Anonymity and l-Diversity (2007) (3293)
- Design of a role-based trust-management framework (2002) (879)
- Delegation logic: A logic-based approach to distributed authorization (2003) (492)
- Using probabilistic generative models for ranking risks of Android apps (2012) (402)
- Distributed Credential Chain Discovery in Trust Management (2003) (368)
- Slicing: A New Approach for Privacy Preserving Data Publishing (2009) (365)
- Locally Differentially Private Protocols for Frequency Estimation (2017) (337)
- On the tradeoff between privacy and utility in data publishing (2009) (335)
- Android permissions: a perspective combining risks and benefits (2012) (331)
- Efficient k -Anonymization Using Clustering Techniques (2007) (326)
- RT: a Role-based Trust-management framework (2003) (313)
- DATALOG with Constraints: A Foundation for Trust Management Languages (2003) (294)
- Purpose based access control of complex data for privacy protection (2005) (285)
- Towards practical automated trust negotiation (2002) (269)
- Purpose based access control for privacy protection in relational database systems (2008) (255)
- A Study of Probabilistic Password Models (2014) (239)
- On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy (2011) (234)
- Differentially private grids for geospatial data (2012) (230)
- Secure Anonymization for Incremental Datasets (2006) (206)
- Automated trust negotiation using cryptographic credentials (2005) (185)
- Mining roles with semantic meanings (2008) (184)
- Safety in automated trust negotiation (2004) (181)
- PrivBasis: Frequent Itemset Mining with Differential Privacy (2012) (177)
- Universal Accumulators with Efficient Nonmembership Proofs (2007) (174)
- Beyond proof-of-compliance: security analysis in trust management (2005) (166)
- End-User Privacy in Human – Computer Interaction (2009) (164)
- Oblivious signature-based envelope (2003) (164)
- On mutually-exclusive roles and separation of duty (2004) (155)
- Understanding Hierarchical Methods for Differentially Private Histograms (2013) (155)
- Privacy at Scale: Local Differential Privacy in Practice (2018) (151)
- Evaluating role mining algorithms (2009) (142)
- Security analysis in role-based access control (2004) (140)
- OACerts: Oblivious Attribute Certificates (2005) (138)
- Minimizing private data disclosures in the smart grid (2012) (135)
- Publishing Graph Degree Distribution with Node Differential Privacy (2016) (133)
- Membership privacy: a unifying framework for privacy definitions (2013) (130)
- Towards Formal Verification of Role-Based Access Control Policies (2008) (129)
- Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy (2011) (127)
- A practically implementable and tractable delegation logic (2000) (123)
- PriView: practical differentially private release of marginal contingency tables (2014) (122)
- A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code (2015) (121)
- A logic-based knowledge representation for authorization with delegation (1999) (120)
- Differentially Private K-Means Clustering (2015) (116)
- Satisfiability and Resiliency in Workflow Authorization Systems (2010) (116)
- Understanding the Sparse Vector Technique for Differential Privacy (2016) (116)
- Security analysis in role-based access control (2006) (114)
- Locally Differentially Private Frequent Itemset Mining (2018) (114)
- Differential Privacy: From Theory to Practice (2016) (111)
- Access control policy combining: theory meets practice (2009) (111)
- Distributed credential chain discovery in trust management: extended abstract (2001) (106)
- An algebra for fine-grained integration of XACML policies (2009) (101)
- A Critique of the ANSI Standard on Role-Based Access Control (2007) (100)
- Mining Roles with Multiple Objectives (2010) (97)
- A roadmap for comprehensive online privacy policy management (2007) (97)
- On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (2007) (96)
- Injector: Mining Background Knowledge for Data Anonymization (2008) (96)
- Beyond proof-of-compliance: safety and availability analysis in trust management (2003) (96)
- Protecting sensitive attributes in automated trust negotiation (2002) (92)
- Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information (2019) (92)
- Introduction to special section SACMAT'08 (2011) (89)
- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection (2009) (88)
- Administration in role-based access control (2007) (86)
- Modeling and Integrating Background Knowledge in Data Anonymization (2009) (82)
- CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy (2018) (78)
- Usable Mandatory Integrity Protection for Operating Systems (2007) (77)
- Understanding SPKI/SDSI using first-order logic (2003) (74)
- EXAM: a comprehensive environment for the analysis of access control policies (2010) (72)
- A formal semantics for P3P (2004) (70)
- Local names in SPKI/SDSI (2000) (68)
- Locally Differentially Private Heavy Hitter Identification (2017) (67)
- Beyond separation of duty: An algebra for specifying high-level security policies (2008) (65)
- Closeness: A New Privacy Measure for Data Publishing (2010) (63)
- Mining roles with noisy data (2010) (59)
- Effective Risk Communication for Android Apps (2013) (59)
- A theory for comparing the expressive power of access control models (2007) (58)
- Answering Multi-Dimensional Analytical Queries under Local Differential Privacy (2019) (58)
- Privacy-Preserving Database Systems (2005) (57)
- On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining (2009) (57)
- Towards optimal k-anonymization (2008) (55)
- Achieving privacy in mesh networks (2006) (54)
- Resiliency Policies in Access Control (2009) (53)
- Comparing the expressive power of access control models (2004) (52)
- Audit Trail (2020) (52)
- Generating Summary Risk Scores for Mobile Applications (2014) (51)
- Satisfiability and Resiliency in Workflow Systems (2007) (51)
- Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems (2009) (51)
- PrivSyn: Differentially Private Data Synthesis (2020) (50)
- On safety in discretionary access control (2005) (49)
- Privacy-preserving incremental data dissemination (2009) (47)
- On mutually exclusive roles and separation-of-duty (2007) (46)
- Enhancing security behaviour by supporting the user (2018) (46)
- Policy decomposition for collaborative access control (2008) (45)
- SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations (2017) (43)
- Analysis of privacy and security policies (2009) (43)
- Influence of Risk/Safety Information Framing on Android App-Installation Decisions (2015) (42)
- Minimizing minimality and maximizing utility (2010) (40)
- Estimating Numerical Distributions under Local Differential Privacy (2019) (39)
- Locally Differentially Private Frequency Estimation with Consistency (2019) (38)
- Policy-hiding access control in open environment (2005) (38)
- EFFICIENT K-ANONYMITY USING CLUSTERING TECHNIQUE (2006) (38)
- A semantics based approach to privacy languages (2006) (37)
- Efficient and accurate strategies for differentially-private sliding window queries (2013) (37)
- Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment (2017) (37)
- Differentially Private Publishing of High-dimensional Data Using Sensitivity Control (2015) (36)
- Membership Inference Attacks and Defenses in Classification Models (2020) (35)
- A Framework for Role-Based Access Control in Group Communication Systems (2004) (34)
- Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization (2017) (34)
- Precise Android API Protection Mapping Derivation and Reasoning (2018) (34)
- An efficient framework for user authorization queries in RBAC systems (2009) (32)
- An Empirical Study of Mnemonic Sentence-based Password Generation Strategies (2016) (32)
- On the Security of Delegation in Access Control Systems (2008) (32)
- Discretionary Access Control (2011) (31)
- Denial of service attacks and defenses in decentralized trust management (2006) (31)
- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation (2002) (31)
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (2009) (30)
- Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehension (2020) (30)
- Detecting Insider Information Theft Using Features from File Access Logs (2014) (30)
- Policy framework for security and privacy management (2009) (29)
- Dimensions of Risk in Mobile Applications: A User Study (2015) (29)
- Fine-grained integration of access control policies (2011) (29)
- SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android (2017) (28)
- Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching (2006) (28)
- On practical specification and enforcement of obligations (2012) (27)
- On the Complexity of Authorization in RBAC under Qualification and Security Constraints (2011) (27)
- Trojan horse resistant discretionary access control (2009) (27)
- AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection (2018) (26)
- Access Control Friendly Query Verification for Outsourced Data Publishing (2008) (26)
- Constraint generation for separation of duty (2006) (25)
- Nonparametric Bayesian Matrix Factorization by Power-EP (2010) (24)
- Federation in genomics pipelines: techniques and challenges (2019) (24)
- Dynamic Virtual Credit Card Numbers (2007) (24)
- Analysis of SEAndroid Policies: Combining MAC and DAC in Android (2017) (22)
- Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? (2017) (21)
- User Comment Analysis for Android apps and CSPI Detection with Comment Expansion (2014) (21)
- Influence of privacy priming and security framing on mobile app selection (2018) (21)
- The Foundational Work of Harrison-Ruzzo-Ullman Revisited (2013) (20)
- PRECIP: Towards Practical and Retrofittable Confidential Information Protection (2008) (20)
- The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context (2018) (19)
- Consistent and Accurate Frequency Oracles under Local Differential Privacy (2019) (19)
- Combining Discretionary Policy with Mandatory Information Flow in Operating Systems (2011) (18)
- Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap (2020) (18)
- Continuous Release of Data Streams under both Centralized and Local Differential Privacy (2020) (18)
- Diffie-Hellman Key Exchange (2011) (17)
- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols (2006) (17)
- Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings (2009) (17)
- Improving utility and security of the shuffler-based differential privacy (2019) (17)
- A ROADMAP FOR COMPREHENSIVE ONLINE PRIVACY POLICY (2004) (17)
- Recursive partitioning and summarization: a practical framework for differentially private data publishing (2012) (16)
- RTML: A Role-based Trust-management Markup Language (2002) (16)
- Automated trust negotiation using cryptographic credentials (2009) (16)
- Proceedings of the 13th ACM symposium on Access control models and technologies (2008) (16)
- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) (2006) (16)
- Securing Java RMI-based distributed applications (2004) (15)
- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging (2009) (15)
- Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs (2017) (14)
- Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages (2018) (14)
- Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment (2017) (14)
- Information-theoretic metrics for Local Differential Privacy protocols (2019) (14)
- Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models (2022) (14)
- Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks (2020) (13)
- Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification (2019) (13)
- Symmetric Encryption (2009) (12)
- Attack on the GridCode one-time password (2011) (12)
- Data Confidentiality (2009) (11)
- Asymmetric Encryption (2009) (11)
- PrivPfC: differentially private data publication for classification (2018) (11)
- Automatic Abstracting (2009) (11)
- Answering Multi-Dimensional Range Queries under Local Differential Privacy (2020) (11)
- Practical and Robust Privacy Amplification with Multi-Party Differential Privacy (2019) (11)
- Heat Map (2009) (10)
- Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning (2019) (10)
- Comparing Password Ranking Algorithms on Real-World Password Datasets (2016) (10)
- Effectiveness of a phishing warning in field settings (2015) (10)
- On XACML's Adequacy to Specify and to Enforce HIPAA (2012) (10)
- Towards analyzing complex operating system access control configurations (2010) (10)
- Some Usability Considerations in Access Control Systems (2008) (10)
- EXAM: An Environment for Access Control Policy Analysis and Management (2008) (9)
- Beyond separation of duty: an algebra for specifying high-level security policies (2006) (9)
- Mobile Data Collection and Analysis with Local Differential Privacy (2019) (9)
- Federated Matrix Factorization with Privacy Guarantee (2021) (9)
- CodeShield: towards personalized application whitelisting (2012) (8)
- Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (2013) (8)
- Display of Major Risk Categories for Android Apps (2018) (8)
- How to make Discretionary Access Control secure against trojan horses (2008) (8)
- Framing of Summary Risk/Safety Information and App Selection (2014) (8)
- Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting (2021) (8)
- Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users (2015) (8)
- Role Mining for Engineering and Optimizing Role Based Access Control Systems (2007) (8)
- Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy (2020) (7)
- Analysis Techniques for Information Security (2010) (7)
- Cybersecurity for Android Applications: Permissions in Android 5 and 6 (2018) (7)
- Toward Formal Verification of Role-Based Access Control Policies (2008) (7)
- Resiliency policies in access control (2006) (7)
- Anonymizing Network Traces with Temporal Pseudonym Consistency (2012) (7)
- Proactive defense of insider threats through authorization management (2011) (7)
- Black-box Model Inversion Attribute Inference Attacks on Classification Models (2020) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- A Formal Language for Specifying Policy Combining Algorithms in Access Control (2008) (6)
- Audio Feature Extraction (2009) (6)
- DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges (2021) (5)
- iOracle: Automated Evaluation of Access Control Policies in iOS (2018) (5)
- Data Encryption (2009) (5)
- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance (2009) (5)
- China's Food Economy and its Implications for the Rest of the World (2003) (5)
- Koinonia: verifiable e-voting with long-term privacy (2019) (5)
- Improving Frequency Estimation under Local Differential Privacy (2019) (4)
- Towards quantification of firewall policy complexity (2015) (4)
- A Nonmonotonic Delegation Logic with Prioritized Conflict Handling (2000) (4)
- PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols (2020) (4)
- Security Risk Management Using Incentives (2011) (4)
- PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems (2021) (4)
- Beyond Risk-Based Access Control: Towards Incentive-Based Access Control (2011) (4)
- Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation (2022) (3)
- Analyzing protection quality of security-enhanced operating systems (2009) (3)
- On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols (2016) (3)
- Token (2021) (3)
- Algebraic Construction for Zero-Knowledge Sets (2008) (3)
- Optimizing Locally Differentially Private Protocols (2017) (3)
- Toward privacy-preserving database management systems --- access control and data anonymization (2007) (3)
- Direct static enforcement of high-level security policies (2007) (3)
- TCP SYN Flooding (2004) (3)
- Description-Experience Gap: The Role of Feedback and Description in Human Trust in Automation (2017) (3)
- Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision (2022) (3)
- Decentralized Trust Management (2011) (2)
- Differentially Private Projected Histograms of Multi-Attribute Data for Classification (2015) (2)
- Database Protection (2009) (2)
- Tri-Modularization of Firewall Policies (2016) (2)
- Effect of Facts Box on Users’ Comprehension of Differential Privacy: A Preliminary Study (2020) (2)
- PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. (2020) (2)
- VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol (2022) (2)
- Koinonia (2019) (2)
- Human Centered 38 H Human-Computer Interaction Computing (2009) (2)
- Security Analysis and Administrative Insider Threat Assessment in Role-Based Access Control (2005) (2)
- Enhancing Operational Security by Redesigning Password Strength Meters: Evidence from Randomized Experiments (2020) (2)
- Differential Privacy in the Local Setting (2018) (1)
- DPSyn: Differentially Private Synthetic Data Publication (2018) (1)
- DPWeka: Achieving Differential Privacy in WEKA A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science by (2017) (1)
- Anonymity in Location-Based Services (2009) (1)
- Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps (2018) (1)
- Document Identifier (2020) (1)
- Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples (2018) (1)
- Surviving in the Digital Environment: Does Survival Processing Provide an Additional Memory Benefit to Password Generation Strategies? (2020) (1)
- Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I (2020) (1)
- Host Integrity Protection Through Usable Non-discretionary Access Control (2006) (1)
- Differentially Private Vertical Federated Clustering (2022) (1)
- Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (2007) (1)
- Scaling the Academic Security Community (2019) (1)
- Differentially Private Data Synthesis: State of the Art and Challenges (2022) (1)
- Adaptive Deterrence of DNS Cache Poisoning (2018) (1)
- Four accuracy bounds and one estimator for frequency estimation under local differential privacy (2019) (1)
- Designing Better Password Strength Meters by Incorporating Contextual Information (2017) (1)
- Safety Priming and Subsequent App Selection Behaviors (2018) (1)
- Letter to the editor [2] (2007) (1)
- A New Construction of Zero-Knowledge Sets Secure in Random Oracle Model (2007) (1)
- PrivPfC: differentially private data publication for classification (2018) (0)
- Converting Class 2 Algorithms to Class 1 Algorithms (2009) (0)
- Application of Differential Privacy to the 2020 U.S. Census and American Community Survey: Researchers’ Understanding and Reactions (2022) (0)
- Welcome to ASIA CCS 2013 (2013) (0)
- Poster : Locally Differentially Private Frequent Itemset Mining (2018) (0)
- Number 12 (2017) (0)
- Homomorphic Encryption (2009) (0)
- Researchers' Understanding of the Differential Privacy (DP) Approach and Their Attitudes Toward Its Implementation (0)
- Augmenting Password Strength Meter Design using the Elaboration Likelihood Model: Evidence from Randomized Experiments (2021) (0)
- PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage (2023) (0)
- Decentralized Data Integration System (2009) (0)
- Evolution of Phishing Attacks: Challenges and Opportunities for Humans to Adapt to the Ubiquitous Connected World (2019) (0)
- Adaptive Database Replication (2009) (0)
- iOracle (2018) (0)
- Service Choreography (2009) (0)
- Improving real-world access control systems by identifying the true origins of a request (2009) (0)
- Role mining and policy misconfigurations (2010) (0)
- C R ] 22 A pr 2 01 5 Differentially Private k-Means Clustering (2015) (0)
- MGD: A Utility Metric for Private Data Publication (2021) (0)
- Policy-Hiding Access Control in Open Environment (Extended Abstract) (2005) (0)
- Data Cache (2009) (0)
- Analysis of access control policies in operating systems (2009) (0)
- What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors (2021) (0)
- Adversarial Information Retrieval (2009) (0)
- Degrees of Consistency (2009) (0)
- MoNet: Impressionism As A Defense Against Adversarial Examples (2020) (0)
- Password Recall Following Employment of a Story-Based Mnemonic Strategy (2019) (0)
- Data Tracking (2009) (0)
- Foundational and applied research in access control (2004) (0)
- VWAnalyzer (2022) (0)
- Session details: Role mining and user obligations (2012) (0)
- Preface Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security (2020) (0)
- A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized . COMPREHENSIVE ONLINE PRIVACY POLICY MANAGEMENT (2007) (0)
- Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy (2022) (0)
- A Policy Management Tool for Fine-Grained Database Access Control (2009) (0)
- Adaptive Metric Techniques (2009) (0)
- Access control policy management (2009) (0)
- Session details: Automated analysis (2005) (0)
- The description-experience gap in the effect of warning reliability on user trust, reliance, and performance in a phishing context (2016) (0)
- Microdata Publishing with Algorithmic Privacy Guarantees (2009) (0)
- Communicating Differential Privacy Models by Illustrations: A Survey and In-Depth Interview Study (2021) (0)
- The Impact of Contextual Information on Users' Password Generating Behavior: A Randomized Experiment (2017) (0)
- Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II (2020) (0)
- Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation (2017) (0)
- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks (2022) (0)
- Data Errors (2022) (0)
- Identification of factors impacting on the transmission and mortality of COVID-19 (2021) (0)
- Display of Major Risk Categories for Mobile Apps (2016) (0)
- Trust Management (2011) (0)
This paper list is powered by the following services: