46 results on '"Li, Ninghui"'
Search Results
2. Sun Glint Correction Based on BRDF Model for Improving the HY-1C/COCTS Clear-Sky Coverage.
3. Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting
4. MoNet: Impressionism As A Defense Against Adversarial Examples
5. Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehension
6. Mobile Data Collection and Analysis with Local Differential Privacy
7. Locally Differentially Private Frequent Itemset Mining
8. Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs
9. SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations
10. A Study of Probabilistic Password Models
11. Anonymizing Network Traces with Temporal Pseudonym Consistency
12. On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
13. Modeling and Integrating Background Knowledge in Data Anonymization
14. EXAM: An Environment for Access Control Policy Analysis and Management
15. Injector: Mining Background Knowledge for Data Anonymization
16. A New Construction of Zero-Knowledge Sets Secure in Random Oracle Model
17. Usable Mandatory Integrity Protection for Operating Systems
18. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
19. Denial of Service Attacks and Defenses in Decentralized Trust Management
20. Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
21. Differentially private grids for geospatial data.
22. CHAPTER 5: Analyzing Security Protocols: 5.4 RECENT ADVANCES.
23. CHAPTER 5: Analyzing Security Protocols: 5.2 PROTOCOL COMPOSITION LOGIC.
24. CHAPTER 4: Analyzing Security Policies: 4.3 SECURITY POLICIES.
25. CHAPTER 4: Analyzing Security Policies: 4.4 RT.
26. CHAPTER 4: Analyzing Security Policies: 4.1 ACCESS-MATRIX-BASED SYSTEMS.
27. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.4 ADDING CONTEXT SENSITIVITY.
28. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.5 EXPERIENCE WITH THE TOOL.
29. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.1 OVERALL TOOL ARCHITECTURE.
30. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.2 CONSTRAINT RESOLUTION USING LINEAR PROGRAMMING.
31. CHAPTER 2: 2.3 DATALOG.
32. CHAPTER 2: Foundations: 2.2 DATAFLOW ANALYSIS, PUSHDOWN SYSTEMS, AND WEIGHTED PUSHDOWN SYSTEMS.
33. CHAPTER 2: Foundations: 2.1 STATIC ANALYSIS.
34. CHAPTER 1: Introduction.
35. The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
36. CHAPTER 5: Analyzing Security Protocols: 5.3 OTHER PROTOCOL ANALYSIS APPROACHES.
37. CHAPTER 5: Analyzing Security Protocols: 5.1 PROTOCOL ANALYSIS METHODOLOGY.
38. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.3 SOLVING CONSTRAINT SYSTEMS HIERARCHICALLY.
39. CHAPTER 3: Detecting Buffer Overruns Using Static Analysis: 3.6 RELATED WORK.
40. Analysis Techniques for Information Security.
41. CHAPTER 2: Foundations.
42. CHAPTER 5: Analyzing Security Protocols: 5.5 CONCLUSIONS.
43. Acknowledgments.
44. Slicing: A New Approach for Privacy Preserving Data Publishing.
45. On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
46. Security Risk Management Using Incentives.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.