default search action
Weining Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Warut Khern-am-nuai, Matthew J. Hashim, Alain Pinsonneault, Weining Yang, Ninghui Li:
Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Inf. Syst. Res. 34(1): 157-177 (2023)
2010 – 2019
- 2019
- [j5]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Hum. Factors 61(4) (2019) - [j4]Yan You, Dongmei Zhao, Weining Yang:
Role of Platform, Supplier and Medium in Online Trust Formation. Int. J. Bus. Data Commun. Netw. 15(1): 58-70 (2019) - 2018
- [j3]Steven Furnell, Warut Khern-am-nuai, Rawan Esmael, Weining Yang, Ninghui Li:
Enhancing security behaviour by supporting the user. Comput. Secur. 75: 1-9 (2018) - [c11]Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li:
Adaptive Deterrence of DNS Cache Poisoning. SecureComm (2) 2018: 171-191 - 2017
- [j2]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Hum. Factors 59(4): 640-660 (2017) - [c10]Warut Khern-am-nuai, Weining Yang, Ninghui Li:
Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment. HICSS 2017: 1-10 - [c9]Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li:
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. HotSoS 2017: 52-61 - 2016
- [b2]Weining Yang:
Improving the Eco-system of Passwords. Purdue University, USA, 2016 - [b1]Ninghui Li, Min Lyu, Dong Su, Weining Yang:
Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01222-8, pp. 1-138 - [c8]Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. CCS 2016: 1216-1229 - [c7]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - 2015
- [c6]Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li:
Effectiveness of a phishing warning in field settings. HotSoS 2015: 14:1-14:2 - 2014
- [c5]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
PriView: practical differentially private release of marginal contingency tables. SIGMOD Conference 2014: 1435-1446 - [c4]Jerry Ma, Weining Yang, Min Luo, Ninghui Li:
A Study of Probabilistic Password Models. IEEE Symposium on Security and Privacy 2014: 689-704 - 2013
- [j1]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Understanding Hierarchical Methods for Differentially Private Histograms. Proc. VLDB Endow. 6(14): 1954-1965 (2013) - [c3]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang:
Membership privacy: a unifying framework for privacy definitions. CCS 2013: 889-900 - [c2]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Differentially private grids for geospatial data. ICDE 2013: 757-768 - 2012
- [c1]Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel:
Minimizing private data disclosures in the smart grid. CCS 2012: 415-427 - [i1]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Differentially Private Grids for Geospatial Data. CoRR abs/1209.1322 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint