Follow
Weining Yang
Weining Yang
Verified email at cs.purdue.edu
Title
Cited by
Cited by
Year
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
2902013
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
2752014
Understanding hierarchical methods for differentially private histograms
W Qardaji, W Yang, N Li
Proceedings of the VLDB Endowment 6 (14), 1954-1965, 2013
1722013
Membership privacy: A unifying framework for privacy definitions
N Li, W Qardaji, D Su, Y Wu, W Yang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1462013
Minimizing private data disclosures in the smart grid
W Yang, N Li, Y Qi, W Qardaji, S McLaughlin, P McDaniel
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1452012
Priview: practical differentially private release of marginal contingency tables
W Qardaji, W Yang, N Li
Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014
1312014
Differential privacy: From theory to practice
N Li, M Lyu, D Su, W Yang
Synthesis Lectures on Information Security, Privacy, & Trust 8 (4), 1-138, 2016
1242016
Enhancing security behaviour by supporting the user
S Furnell, R Esmael, W Yang, N Li
Computers & Security 75, 1-9, 2018
692018
Use of phishing training to improve security warning compliance: evidence from a field experiment
W Yang, A Xiong, J Chen, RW Proctor, N Li
Proceedings of the hot topics in science of security: symposium and bootcamp …, 2017
412017
An empirical study of mnemonic sentence-based password generation strategies
W Yang, N Li, O Chowdhury, A Xiong, RW Proctor
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
412016
Is domain highlighting actually helpful in identifying phishing web pages?
A Xiong, RW Proctor, W Yang, N Li
Human factors 59 (4), 640-660, 2017
292017
Embedding training within warnings improves skills of identifying phishing webpages
A Xiong, RW Proctor, W Yang, N Li
Human factors 61 (4), 577-595, 2019
232019
Using context-based password strength meter to nudge users' password generating behavior: A randomized experiment
W Khern-am-nuai, W Yang, N Li
162017
Effectiveness of a phishing warning in field settings
W Yang, J Chen, A Xiong, RW Proctor, N Li
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-2, 2015
122015
Display of major risk categories for android apps.
J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor
Journal of Experimental Psychology: Applied 24 (3), 306, 2018
102018
Comparing password ranking algorithms on real-world password datasets
W Yang, N Li, IM Molloy, Y Park, SN Chari
European Symposium on Research in Computer Security, 69-90, 2016
72016
Adaptive Deterrence of DNS Cache Poisoning
SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li
International Conference on Security and Privacy in Communication Systems …, 2018
22018
Publishing Marginals
N Li, M Lyu, D Su, W Yang
Differential Privacy, 79-91, 2017
2017
Differentially Private Optimization
N Li, M Lyu, D Su, W Yang
Differential Privacy, 61-77, 2017
2017
Publishing Histograms for Low-dimensional Datasets
N Li, M Lyu, D Su, W Yang
Differential Privacy, 45-60, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20