Haibing Lu

According to our database1, Haibing Lu authored at least 62 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Investment decisions and pricing strategies of crowdfunding players: In a two-sided crowdfunding market.
Electron. Commer. Res., June, 2023

Guest editors' introduction.
J. Comput. Secur., 2023

National Origin Discrimination in Deep-learning-powered Automated Resume Screening.
CoRR, 2023

Domain Adaptive Network Embedding.
IEEE Trans. Big Data, 2022

Overbooked and Overlooked: Machine Learning and Racial Bias in Medical Appointment Scheduling.
Manuf. Serv. Oper. Manag., 2022

Dynamic Pricing for Electric Vehicle Extreme Fast Charging.
IEEE Trans. Intell. Transp. Syst., 2021

Stochastic Workflow Authorizations With Queueing Constraints.
IEEE Trans. Dependable Secur. Comput., 2021

Challenges and Opportunities for Information Systems Research During and After Coronavirus.
Pac. Asia J. Assoc. Inf. Syst., 2021

Analysis and optimisation of perishable inventory with stocks-sensitive stochastic demand and two-stage pricing: A discrete-event simulation study.
J. Simulation, 2021

PACIS 2019: Emerging technology, business, and application in digital economy.
Inf. Manag., 2021

Game Theoretic Approach to Extreme Fast Charging Location.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

Power Grid Cascading Failure Prediction Based on Transformer.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020

Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019

Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy.
CoRR, 2019

Fault-tolerant tile mining.
Expert Syst. Appl., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

V2X security: A case study of anonymous authentication.
Pervasive Mob. Comput., 2017

Utilizing advances in correlation analysis for community structure detection.
Expert Syst. Appl., 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Catch a Fad or Capture a Value?: Social Media Leverage in SMEs.
J. Organ. End User Comput., 2016

A Utility Maximization Framework for Privacy Preservation of User Generated Content.
Proceedings of the 2016 ACM on International Conference on the Theory of Information Retrieval, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Towards user-oriented RBAC model.
J. Comput. Secur., 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS J. Comput., 2015

An optimization framework for role mining.
J. Comput. Secur., 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Community detection in graphs through correlation.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptol. ePrint Arch., 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012

Secure and efficient distributed linear programming.
J. Comput. Secur., 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Overlapping Clustering with Sparseness Constraints.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Statistical Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure construction and publication of contingency tables from distributed data.
J. Comput. Secur., 2011

Privacy Risk Assessment with Bounds Deduced from Bounds.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Multi-User Private Keyword Search for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Edge-RMP: Minimizing administrative assignments for role-based access control.
J. Comput. Secur., 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Secur. Comput., 2008

Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008

Disclosure Analysis and Control in Statistical Databases.
Proceedings of the Computer Security, 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Disclosure Analysis for Two-Way Contingency Tables.
Proceedings of the Privacy in Statistical Databases, 2006

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
Proceedings of the Information Systems Security, Second International Conference, 2006