Differentially private grids for geospatial data W Qardaji, W Yang, N Li 2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013 | 358 | 2013 |
A study of probabilistic password models J Ma, W Yang, M Luo, N Li 2014 IEEE Symposium on Security and Privacy, 689-704, 2014 | 332 | 2014 |
Understanding hierarchical methods for differentially private histograms W Qardaji, W Yang, N Li Proceedings of the VLDB Endowment 6 (14), 1954-1965, 2013 | 211 | 2013 |
Membership privacy: A unifying framework for privacy definitions N Li, W Qardaji, D Su, Y Wu, W Yang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 201 | 2013 |
Differential privacy: From theory to practice N Li, M Lyu, D Su, W Yang Morgan & Claypool, 2017 | 198 | 2017 |
Minimizing private data disclosures in the smart grid W Yang, N Li, Y Qi, W Qardaji, S McLaughlin, P McDaniel Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 170 | 2012 |
Priview: practical differentially private release of marginal contingency tables W Qardaji, W Yang, N Li Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014 | 166 | 2014 |
Enhancing security behaviour by supporting the user S Furnell, R Esmael, W Yang, N Li Computers & Security 75, 1-9, 2018 | 117 | 2018 |
Use of phishing training to improve security warning compliance: Evidence from a field experiment W Yang, A Xiong, J Chen, RW Proctor, N Li Proceedings of the hot topics in science of security: symposium and bootcamp …, 2017 | 66 | 2017 |
An empirical study of mnemonic sentence-based password generation strategies W Yang, N Li, O Chowdhury, A Xiong, RW Proctor Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 55 | 2016 |
Is domain highlighting actually helpful in identifying phishing web pages? A Xiong, RW Proctor, W Yang, N Li Human factors 59 (4), 640-660, 2017 | 49 | 2017 |
Embedding training within warnings improves skills of identifying phishing webpages A Xiong, RW Proctor, W Yang, N Li Human factors 61 (4), 577-595, 2019 | 44 | 2019 |
Using context-based password strength meter to nudge users' password generating behavior: A randomized experiment W Khern-am-nuai, W Yang, N Li | 32* | 2017 |
Effectiveness of a phishing warning in field settings W Yang, J Chen, A Xiong, RW Proctor, N Li Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-2, 2015 | 20 | 2015 |
Display of major risk categories for android apps. J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor Journal of Experimental Psychology: Applied 24 (3), 306, 2018 | 16 | 2018 |
Comparing password ranking algorithms on real-world password datasets W Yang, N Li, IM Molloy, Y Park, SN Chari European Symposium on Research in Computer Security, 69-90, 2016 | 8 | 2016 |
Adaptive deterrence of dns cache poisoning SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li Security and Privacy in Communication Networks: 14th International …, 2018 | 6 | 2018 |
Publishing Marginals N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 79-91, 2017 | 1 | 2017 |
The sparse vector technique N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 93-112, 2017 | 1 | 2017 |
What Does DP Mean? N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 33-44, 2017 | 1 | 2017 |