Haibing Lu

According to our database1, Haibing Lu authored at least 46 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fault-tolerant tile mining.
Expert Syst. Appl., 2018

2017
V2X security: A case study of anonymous authentication.
Pervasive and Mobile Computing, 2017

Utilizing advances in correlation analysis for community structure detection.
Expert Syst. Appl., 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intelligence, 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive and Mobile Computing, 2016

Catch a Fad or Capture a Value?: Social Media Leverage in SMEs.
JOEUC, 2016

A Utility Maximization Framework for Privacy Preservation of User Generated Content.
Proceedings of the 2016 ACM on International Conference on the Theory of Information Retrieval, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Sec. Comput., 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS Journal on Computing, 2015

2014
An optimization framework for role mining.
Journal of Computer Security, 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Community detection in graphs through correlation.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptology ePrint Archive, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Towards User-Oriented RBAC Model.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Sec. Comput., 2012

Secure and efficient distributed linear programming.
Journal of Computer Security, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Overlapping Clustering with Sparseness Constraints.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

2011
Statistical Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure construction and publication of contingency tables from distributed data.
Journal of Computer Security, 2011

Privacy Risk Assessment with Bounds Deduced from Bounds.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Multi-User Private Keyword Search for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Edge-RMP: Minimizing administrative assignments for role-based access control.
Journal of Computer Security, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

2008
Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Sec. Comput., 2008

Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008

Disclosure Analysis and Control in Statistical Databases.
Proceedings of the Computer Security, 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

2006
Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Disclosure Analysis for Two-Way Contingency Tables.
Proceedings of the Privacy in Statistical Databases, 2006

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
Proceedings of the Information Systems Security, Second International Conference, 2006


  Loading...