H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 71 Citations 21,021 194 World Ranking 793 National Ranking 474

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • Computer security

Ninghui Li mainly investigates Access control, Data mining, Computer security, Theoretical computer science and Trust management. In general Access control, his work in Role-based access control is often linked to Information system linking many areas of study. The study incorporates disciplines such as Information privacy and Inference in addition to Data mining.

His work on Data anonymization is typically connected to Data element as part of general Information privacy study, connecting several disciplines of science. His work on Authorization, Credential and Privacy software as part of general Computer security study is frequently linked to Negotiation, therefore connecting diverse disciplines of science. His Trust management research includes themes of Datalog, Programming language and Semantics.

His most cited work include:

  • t-Closeness: Privacy Beyond k-Anonymity and l-Diversity (2297 citations)
  • Design of a role-based trust-management framework (733 citations)
  • Delegation logic: A logic-based approach to distributed authorization (405 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Access control, Data mining, Differential privacy and Theoretical computer science. His Computer security research focuses on Internet privacy and how it connects with Password. Ninghui Li has researched Access control in several fields, including Trust management and Authorization.

He works mostly in the field of Data mining, limiting it down to concerns involving Data anonymization and, occasionally, Data publishing. Within one scientific family, he focuses on topics pertaining to News aggregator under Differential privacy, and may sometimes address concerns connected to Private information retrieval and Protocol. His Theoretical computer science research integrates issues from Distributed computing and Parameterized complexity.

He most often published in these fields:

  • Computer security (35.56%)
  • Access control (32.22%)
  • Data mining (20.37%)

What were the highlights of his more recent work (between 2018-2021)?

  • Differential privacy (15.56%)
  • Data mining (20.37%)
  • Computer security (35.56%)

In recent papers he was focusing on the following fields of study:

Ninghui Li mainly focuses on Differential privacy, Data mining, Computer security, News aggregator and Artificial intelligence. His work is dedicated to discovering how Data mining, Domain are connected with Synthetic data generation and other disciplines. His Computer security study integrates concerns from other disciplines, such as Android and Phishing.

His studies deal with areas such as Machine learning and Authentication as well as Artificial intelligence. His Categorical variable research is multidisciplinary, incorporating elements of Dimension, Theoretical computer science and Synthetic data. Ninghui Li studies Operating system, focusing on Access control in particular.

Between 2018 and 2021, his most popular works were:

  • Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information (34 citations)
  • Locally Differentially Private Heavy Hitter Identification (27 citations)
  • Answering Multi-Dimensional Analytical Queries under Local Differential Privacy (25 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Artificial intelligence
  • Operating system

Ninghui Li mostly deals with Differential privacy, Data mining, Oracle, Computer security and News aggregator. His Differential privacy study combines topics in areas such as Theoretical computer science and Categorical variable. His study on Identification is often connected to Label Distribution Protocol as part of broader study in Data mining.

His Oracle study incorporates themes from Consistency and Block. With his scientific publications, his incorporates both Computer security and Training. His News aggregator research incorporates elements of Interpretation and Information retrieval.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

t-Closeness: Privacy Beyond k-Anonymity and l-Diversity

Ninghui Li;Tiancheng Li;S. Venkatasubramanian.
international conference on data engineering (2007)

3613 Citations

Design of a role-based trust-management framework

Ninghui Li;J.C. Mitchell;W.H. Winsborough.
ieee symposium on security and privacy (2002)

1063 Citations

Delegation logic: A logic-based approach to distributed authorization

Ninghui Li;Benjamin N. Grosof;Joan Feigenbaum.
ACM Transactions on Information and System Security (2003)

580 Citations

Distributed credential chain discovery in trust management

Ninghui Li;William H. Winsborough;John C. Mitchell.
Journal of Computer Security (2003)

561 Citations

Using probabilistic generative models for ranking risks of Android apps

Hao Peng;Chris Gates;Bhaskar Sarma;Ninghui Li.
computer and communications security (2012)

466 Citations

Purpose based access control of complex data for privacy protection

Ji-Won Byun;Elisa Bertino;Ninghui Li.
symposium on access control models and technologies (2005)

430 Citations

Efficient k-anonymization using clustering techniques

Ji-Won Byun;Ashish Kamra;Elisa Bertino;Ninghui Li.
database systems for advanced applications (2007)

412 Citations

Android permissions: a perspective combining risks and benefits

Bhaskar Pratim Sarma;Ninghui Li;Chris Gates;Rahul Potharaju.
symposium on access control models and technologies (2012)

391 Citations

RT: a Role-based Trust-management framework

Ninghui Li;J.C. Mitchell.
darpa information survivability conference and exposition (2003)

364 Citations

Towards practical automated trust negotiation

W.H. Winsborough;Ninghui Li.
policies for distributed systems and networks (2002)

362 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Ninghui Li

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 130

Jaideep Vaidya

Jaideep Vaidya

Rutgers, The State University of New Jersey

Publications: 56

Hua Wang

Hua Wang

Victoria University

Publications: 49

Vijayalakshmi Atluri

Vijayalakshmi Atluri

Rutgers, The State University of New Jersey

Publications: 45

Silvio Ranise

Silvio Ranise

Fondazione Bruno Kessler

Publications: 45

Marianne Winslett

Marianne Winslett

University of Illinois at Urbana-Champaign

Publications: 44

Elena Ferrari

Elena Ferrari

University of Insubria

Publications: 44

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 42

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 40

Ting Yu

Ting Yu

Qatar Computing Research Institute

Publications: 36

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 35

Pierangela Samarati

Pierangela Samarati

University of Milan

Publications: 34

Ashwin Machanavajjhala

Ashwin Machanavajjhala

Duke University

Publications: 33

Anna Cinzia Squicciarini

Anna Cinzia Squicciarini

Pennsylvania State University

Publications: 33

Scott D. Stoller

Scott D. Stoller

Stony Brook University

Publications: 32

Something went wrong. Please try again later.