BibTeX records: Weining Yang

download as .bib file

@article{DBLP:journals/hf/XiongPYL19,
  author    = {Aiping Xiong and
               Robert W. Proctor and
               Weining Yang and
               Ninghui Li},
  title     = {Embedding Training Within Warnings Improves Skills of Identifying
               Phishing Webpages},
  journal   = {Hum. Factors},
  volume    = {61},
  number    = {4},
  year      = {2019},
  url       = {https://doi.org/10.1177/0018720818810942},
  doi       = {10.1177/0018720818810942},
  timestamp = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/hf/XiongPYL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdcn/YouZY19,
  author    = {Yan You and
               Dongmei Zhao and
               Weining Yang},
  title     = {Role of Platform, Supplier and Medium in Online Trust Formation},
  journal   = {Int. J. Bus. Data Commun. Netw.},
  volume    = {15},
  number    = {1},
  pages     = {58--70},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJBDCN.2019010104},
  doi       = {10.4018/IJBDCN.2019010104},
  timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijbdcn/YouZY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FurnellKEYL18,
  author    = {Steven Furnell and
               Warut Khern{-}am{-}nuai and
               Rawan Esmael and
               Weining Yang and
               Ninghui Li},
  title     = {Enhancing security behaviour by supporting the user},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {1--9},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.016},
  doi       = {10.1016/j.cose.2018.01.016},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/FurnellKEYL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18,
  author    = {Sze Yiu Chau and
               Omar Chowdhury and
               Victor E. Gonsalves and
               Huangyi Ge and
               Weining Yang and
               Sonia Fahmy and
               Ninghui Li},
  editor    = {Raheem Beyah and
               Bing Chang and
               Yingjiu Li and
               Sencun Zhu},
  title     = {Adaptive Deterrence of {DNS} Cache Poisoning},
  booktitle = {Security and Privacy in Communication Networks - 14th International
               Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
               Part {II}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {255},
  pages     = {171--191},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01704-0\_10},
  doi       = {10.1007/978-3-030-01704-0\_10},
  timestamp = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hf/XiongPYL17,
  author    = {Aiping Xiong and
               Robert W. Proctor and
               Weining Yang and
               Ninghui Li},
  title     = {Is Domain Highlighting Actually Helpful in Identifying Phishing Web
               Pages?},
  journal   = {Hum. Factors},
  volume    = {59},
  number    = {4},
  pages     = {640--660},
  year      = {2017},
  url       = {https://doi.org/10.1177/0018720816684064},
  doi       = {10.1177/0018720816684064},
  timestamp = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/hf/XiongPYL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Khern-am-nuaiYL17,
  author    = {Warut Khern{-}am{-}nuai and
               Weining Yang and
               Ninghui Li},
  editor    = {Tung Bui},
  title     = {Using Context-Based Password Strength Meter to Nudge Users' Password
               Generating Behavior: {A} Randomized Experiment},
  booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
               Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages     = {1--10},
  publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year      = {2017},
  url       = {http://hdl.handle.net/10125/41220},
  timestamp = {Mon, 08 Apr 2019 17:17:49 +0200},
  biburl    = {https://dblp.org/rec/conf/hicss/Khern-am-nuaiYL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/YangXCPL17,
  author    = {Weining Yang and
               Aiping Xiong and
               Jing Chen and
               Robert W. Proctor and
               Ninghui Li},
  title     = {Use of Phishing Training to Improve Security Warning Compliance: Evidence
               from a Field Experiment},
  booktitle = {Proceedings of the Hot Topics in Science of Security: Symposium and
               Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017},
  pages     = {52--61},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3055305.3055310},
  doi       = {10.1145/3055305.3055310},
  timestamp = {Tue, 06 Nov 2018 16:57:27 +0100},
  biburl    = {https://dblp.org/rec/conf/hotsos/YangXCPL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2016Li,
  author    = {Ninghui Li and
               Min Lyu and
               Dong Su and
               Weining Yang},
  title     = {Differential Privacy: From Theory to Practice},
  series    = {Synthesis Lectures on Information Security, Privacy, {\&} Trust},
  publisher = {Morgan {\&} Claypool Publishers},
  year      = {2016},
  url       = {https://doi.org/10.2200/S00735ED1V01Y201609SPT018},
  doi       = {10.2200/S00735ED1V01Y201609SPT018},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/series/synthesis/2016Li.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLCXP16,
  author    = {Weining Yang and
               Ninghui Li and
               Omar Chowdhury and
               Aiping Xiong and
               Robert W. Proctor},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {An Empirical Study of Mnemonic Sentence-based Password Generation
               Strategies},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1216--1229},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978346},
  doi       = {10.1145/2976749.2978346},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/YangLCXP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangLMPC16,
  author    = {Weining Yang and
               Ninghui Li and
               Ian M. Molloy and
               Youngja Park and
               Suresh N. Chari},
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Comparing Password Ranking Algorithms on Real-World Password Datasets},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9878},
  pages     = {69--90},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45744-4\_4},
  doi       = {10.1007/978-3-319-45744-4\_4},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/YangLMPC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/YangCXPL15,
  author    = {Weining Yang and
               Jing Chen and
               Aiping Xiong and
               Robert W. Proctor and
               Ninghui Li},
  editor    = {David M. Nicol},
  title     = {Effectiveness of a phishing warning in field settings},
  booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
               HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages     = {14:1--14:2},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2746194.2746208},
  doi       = {10.1145/2746194.2746208},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/hotsos/YangCXPL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/QardajiYL14,
  author    = {Wahbeh H. Qardaji and
               Weining Yang and
               Ninghui Li},
  editor    = {Curtis E. Dyreson and
               Feifei Li and
               M. Tamer {\"{O}}zsu},
  title     = {PriView: practical differentially private release of marginal contingency
               tables},
  booktitle = {International Conference on Management of Data, {SIGMOD} 2014, Snowbird,
               UT, USA, June 22-27, 2014},
  pages     = {1435--1446},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2588555.2588575},
  doi       = {10.1145/2588555.2588575},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/sigmod/QardajiYL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaYLL14,
  author    = {Jerry Ma and
               Weining Yang and
               Min Luo and
               Ninghui Li},
  title     = {A Study of Probabilistic Password Models},
  booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
               CA, USA, May 18-21, 2014},
  pages     = {689--704},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/SP.2014.50},
  doi       = {10.1109/SP.2014.50},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/MaYLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/QardajiYL13,
  author    = {Wahbeh H. Qardaji and
               Weining Yang and
               Ninghui Li},
  title     = {Understanding Hierarchical Methods for Differentially Private Histograms},
  journal   = {Proc. {VLDB} Endow.},
  volume    = {6},
  number    = {14},
  pages     = {1954--1965},
  year      = {2013},
  url       = {http://www.vldb.org/pvldb/vol6/p1954-qardaji.pdf},
  doi       = {10.14778/2556549.2556576},
  timestamp = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/pvldb/QardajiYL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiQSWY13,
  author    = {Ninghui Li and
               Wahbeh H. Qardaji and
               Dong Su and
               Yi Wu and
               Weining Yang},
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {Membership privacy: a unifying framework for privacy definitions},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {889--900},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2508859.2516686},
  doi       = {10.1145/2508859.2516686},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/LiQSWY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/QardajiYL13,
  author    = {Wahbeh H. Qardaji and
               Weining Yang and
               Ninghui Li},
  editor    = {Christian S. Jensen and
               Christopher M. Jermaine and
               Xiaofang Zhou},
  title     = {Differentially private grids for geospatial data},
  booktitle = {29th {IEEE} International Conference on Data Engineering, {ICDE} 2013,
               Brisbane, Australia, April 8-12, 2013},
  pages     = {757--768},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/ICDE.2013.6544872},
  doi       = {10.1109/ICDE.2013.6544872},
  timestamp = {Thu, 21 Nov 2019 11:11:44 +0100},
  biburl    = {https://dblp.org/rec/conf/icde/QardajiYL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLQQMM12,
  author    = {Weining Yang and
               Ninghui Li and
               Yuan Qi and
               Wahbeh H. Qardaji and
               Stephen E. McLaughlin and
               Patrick D. McDaniel},
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {Minimizing private data disclosures in the smart grid},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {415--427},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2382196.2382242},
  doi       = {10.1145/2382196.2382242},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/YangLQQMM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-1322,
  author    = {Wahbeh H. Qardaji and
               Weining Yang and
               Ninghui Li},
  title     = {Differentially Private Grids for Geospatial Data},
  journal   = {CoRR},
  volume    = {abs/1209.1322},
  year      = {2012},
  url       = {http://arxiv.org/abs/1209.1322},
  archivePrefix = {arXiv},
  eprint    = {1209.1322},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1209-1322.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics