| Differentially private grids for geospatial data W Qardaji, W Yang, N Li 2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013 | 384 | 2013 |
| A study of probabilistic password models J Ma, W Yang, M Luo, N Li 2014 IEEE Symposium on Security and Privacy, 689-704, 2014 | 377 | 2014 |
| Differential privacy: From theory to practice N Li, M Lyu, D Su, W Yang Morgan & Claypool, 2017 | 252 | 2017 |
| Understanding hierarchical methods for differentially private histograms W Qardaji, W Yang, N Li Proceedings of the VLDB Endowment 6 (14), 1954-1965, 2013 | 232 | 2013 |
| Membership privacy: A unifying framework for privacy definitions N Li, W Qardaji, D Su, Y Wu, W Yang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 226 | 2013 |
| Priview: practical differentially private release of marginal contingency tables W Qardaji, W Yang, N Li Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014 | 185 | 2014 |
| Minimizing private data disclosures in the smart grid W Yang, N Li, Y Qi, W Qardaji, S McLaughlin, P McDaniel Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 174 | 2012 |
| Enhancing security behaviour by supporting the user S Furnell, R Esmael, W Yang, N Li Computers & Security 75, 1-9, 2018 | 124 | 2018 |
| Use of phishing training to improve security warning compliance: Evidence from a field experiment W Yang, A Xiong, J Chen, RW Proctor, N Li Proceedings of the hot topics in science of security: symposium and bootcamp …, 2017 | 74 | 2017 |
| An empirical study of mnemonic sentence-based password generation strategies W Yang, N Li, O Chowdhury, A Xiong, RW Proctor Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 59 | 2016 |
| Embedding training within warnings improves skills of identifying phishing webpages A Xiong, RW Proctor, W Yang, N Li Human factors 61 (4), 577-595, 2019 | 56 | 2019 |
| Is domain highlighting actually helpful in identifying phishing web pages? A Xiong, RW Proctor, W Yang, N Li Human factors 59 (4), 640-660, 2017 | 54 | 2017 |
| Augmenting password strength meter design using the elaboration likelihood model: Evidence from randomized experiments W Khern-am-nuai, MJ Hashim, A Pinsonneault, W Yang, N Li Information Systems Research 34 (1), 157-177, 2023 | 47* | 2023 |
| Effectiveness of a phishing warning in field settings W Yang, J Chen, A Xiong, RW Proctor, N Li Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-2, 2015 | 24 | 2015 |
| Display of major risk categories for android apps. J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor Journal of Experimental Psychology: Applied 24 (3), 306, 2018 | 16 | 2018 |
| Adaptive deterrence of dns cache poisoning SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li International Conference on Security and Privacy in Communication Systems …, 2018 | 9 | 2018 |
| Comparing password ranking algorithms on real-world password datasets W Yang, N Li, IM Molloy, Y Park, SN Chari European Symposium on Research in Computer Security, 69-90, 2016 | 8 | 2016 |
| Publishing marginals N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 79-91, 2022 | 1 | 2022 |
| A Primer on ε-Differential Privacy N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 7-31, 2022 | 1 | 2022 |
| The sparse vector technique N Li, M Lyu, D Su, W Yang Differential Privacy: From Theory to Practice, 93-112, 2022 | 1 | 2022 |