Follow
Weining Yang
Weining Yang
Verified email at cs.purdue.edu
Title
Cited by
Cited by
Year
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
3332013
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
3222014
Understanding hierarchical methods for differentially private histograms
W Qardaji, W Yang, N Li
Proceedings of the VLDB Endowment 6 (14), 1954-1965, 2013
2012013
Membership privacy: A unifying framework for privacy definitions
N Li, W Qardaji, D Su, Y Wu, W Yang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1922013
Differential privacy: From theory to practice
N Li, M Lyu, D Su, W Yang
Morgan & Claypool, 2017
1752017
Minimizing private data disclosures in the smart grid
W Yang, N Li, Y Qi, W Qardaji, S McLaughlin, P McDaniel
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1662012
Priview: practical differentially private release of marginal contingency tables
W Qardaji, W Yang, N Li
Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014
1552014
Enhancing security behaviour by supporting the user
S Furnell, R Esmael, W Yang, N Li
Computers & Security 75, 1-9, 2018
1032018
Use of phishing training to improve security warning compliance: Evidence from a field experiment
W Yang, A Xiong, J Chen, RW Proctor, N Li
Proceedings of the hot topics in science of security: symposium and bootcamp …, 2017
632017
An empirical study of mnemonic sentence-based password generation strategies
W Yang, N Li, O Chowdhury, A Xiong, RW Proctor
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
502016
Is domain highlighting actually helpful in identifying phishing web pages?
A Xiong, RW Proctor, W Yang, N Li
Human factors 59 (4), 640-660, 2017
402017
Embedding training within warnings improves skills of identifying phishing webpages
A Xiong, RW Proctor, W Yang, N Li
Human factors 61 (4), 577-595, 2019
382019
Using context-based password strength meter to nudge users' password generating behavior: A randomized experiment
W Khern-am-nuai, W Yang, N Li
27*2017
Effectiveness of a phishing warning in field settings
W Yang, J Chen, A Xiong, RW Proctor, N Li
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-2, 2015
172015
Display of major risk categories for android apps.
J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor
Journal of Experimental Psychology: Applied 24 (3), 306, 2018
152018
Comparing password ranking algorithms on real-world password datasets
W Yang, N Li, IM Molloy, Y Park, SN Chari
European Symposium on Research in Computer Security, 69-90, 2016
82016
Adaptive Deterrence of DNS Cache Poisoning
SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li
Security and Privacy in Communication Networks: 14th International …, 2018
52018
What Does DP Mean?
N Li, M Lyu, D Su, W Yang
Differential Privacy: From Theory to Practice, 33-44, 2017
12017
Publishing Marginals
N Li, M Lyu, D Su, W Yang
Differential Privacy: From Theory to Practice, 79-91, 2017
2017
Differentially Private Optimization
N Li, M Lyu, D Su, W Yang
Differential Privacy: From Theory to Practice, 61-77, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20