t-closeness: Privacy beyond k-anonymity and l-diversity N Li, T Li, S Venkatasubramanian 2007 IEEE 23rd international conference on data engineering, 106-115, 2006 | 4978 | 2006 |
Design of a role-based trust-management framework N Li, JC Mitchell, WH Winsborough Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002 | 1125 | 2002 |
Purpose based access control of complex data for privacy protection JW Byun, E Bertino, N Li Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 681 | 2005 |
Locally differentially private protocols for frequency estimation T Wang, J Blocki, N Li, S Jha 26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017 | 631 | 2017 |
Delegation logic: A logic-based approach to distributed authorization N Li, BN Grosof, J Feigenbaum ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003 | 601 | 2003 |
Distributed credential chain discovery in trust management N Li, WH Winsborough, JC Mitchell Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 579 | 2001 |
Using probabilistic generative models for ranking risks of android apps H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 554 | 2012 |
Efficient k-Anonymization Using Clustering Techniques JW Byun, A Kamra, E Bertino, N Li International conference on database systems for advanced applications, 188-200, 2007 | 531 | 2007 |
Android permissions: a perspective combining risks and benefits BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 466 | 2012 |
On the tradeoff between privacy and utility in data publishing T Li, N Li Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 443 | 2009 |
Slicing: A new approach for privacy preserving data publishing T Li, N Li, J Zhang, I Molloy IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010 | 428 | 2010 |
Towards practical automated trust negotiation WH Winsborough, N Li Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 371 | 2002 |
RT: A role-based trust-management framework N Li, JC Mitchell Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003 | 369 | 2003 |
Differentially private grids for geospatial data W Qardaji, W Yang, N Li 2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013 | 361 | 2013 |
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy N Li, W Qardaji, D Su Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 360 | 2012 |
Datalog with Constraints: A Foundation for Trust Management Languages N Li, JC Mitchell Practical Aspects of Declarative Languages: 5th International Symposium …, 2003 | 359 | 2003 |
Purpose based access control for privacy protection in relational database systems JW Byun, N Li The VLDB Journal 17, 603-619, 2008 | 347 | 2008 |
A study of probabilistic password models J Ma, W Yang, M Luo, N Li 2014 IEEE Symposium on Security and Privacy, 689-704, 2014 | 342 | 2014 |
Privacy at scale: Local differential privacy in practice G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang Proceedings of the 2018 International Conference on Management of Data, 1655 …, 2018 | 338 | 2018 |
Security analysis in role-based access control N Li, MV Tripunitara ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006 | 309 | 2006 |