Haibo Hu
Orcid: 0000-0002-9008-2112Affiliations:
- Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Kowloon
- Hong Kong Baptist University, Kowloon Tong
- Hong Kong University of Science and Technology
According to our database1,
Haibo Hu
authored at least 197 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on haibohu.org
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., December, 2025
GeoRecover: Recovery From Poisoning Attacks for LDP-Enabled Spatial Density Aggregation.
IEEE Trans. Knowl. Data Eng., October, 2025
IEEE Trans. Knowl. Data Eng., October, 2025
CoRR, October, 2025
CoRR, October, 2025
Decision Potential Surface: A Theoretical and Practical Approximation of LLM's Decision Boundary.
CoRR, October, 2025
CoRR, September, 2025
ACM Trans. Multim. Comput. Commun. Appl., August, 2025
Introduction to the Special Issue on AI Empowered Edge Computing for Multimedia Applications.
ACM Trans. Multim. Comput. Commun. Appl., August, 2025
WiFinger: Fingerprinting Noisy IoT Event Traffic Using Packet-level Sequence Matching.
CoRR, August, 2025
Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy.
CoRR, July, 2025
How Much Do Large Language Model Cheat on Evaluation? Benchmarking Overestimation under the One-Time-Pad-Based Framework.
CoRR, July, 2025
United Minds or Isolated Agents? Exploring Coordination of LLMs under Cognitive Load Theory.
CoRR, June, 2025
Unlearning Isn't Deletion: Investigating Reversibility of Machine Unlearning in LLMs.
CoRR, May, 2025
CoRR, May, 2025
CoRR, May, 2025
A Novel Modeling Approach for Cumulative Belief Rule-Base With Joint Optimization and Rule Synthesis.
IEEE Trans. Syst. Man Cybern. Syst., April, 2025
ACM Comput. Surv., April, 2025
Technical Report: Full Version of Analyzing and Optimizing Perturbation of DP-SGD Geometrically.
CoRR, April, 2025
Privacy for Free: Leveraging Local Differential Privacy Perturbed Data from Multiple Services.
Proc. VLDB Endow., February, 2025
Proc. ACM Manag. Data, February, 2025
Fine-tuning is Not Fine: Mitigating Backdoor Attacks in GNNs with Limited Clean Data.
CoRR, January, 2025
DPDeno: A Post-Processing Framework for Releasing Differentially Private Spatio-Temporal Mobility Features.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
SARAs: Substitution and Replay Attacks in the Maintenance Mode of Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
$\eta$η-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing.
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
J. Comput. Secur., 2025
Comput. Secur., 2025
Classification and Time-Frequency Localization of Arbitrary LPWAN Signals With Radial Deformable DETR.
IEEE Access, 2025
Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the ACM on Web Conference 2025, 2025
From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Companion of the 2025 International Conference on Management of Data, 2025
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Dual Utilization of Perturbation for Stream Data Publication Under Local Differential Privacy.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
"Yes, My LoRD." Guiding Language Model Extraction with Locality Reinforced Distillation.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
IEEE Trans. Knowl. Data Eng., November, 2024
LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential Privacy Protocols.
IEEE Trans. Knowl. Data Eng., July, 2024
PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential Privacy.
Proc. VLDB Endow., July, 2024
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024
DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.
Proc. VLDB Endow., February, 2024
PUTS: Privacy-Preserving and Utility-Enhancing Framework for Trajectory Synthesization.
IEEE Trans. Knowl. Data Eng., January, 2024
LDPTube: Theoretical Utility Benchmark and Enhancement for LDP Mechanisms in High-Dimensional Space.
IEEE Trans. Knowl. Data Eng., 2024
ACM Trans. Priv. Secur., 2024
The Design of a Non-Contact Inspection System Integrated With the Time of Flight-Based Flaw Detection (TOFFD) Criterion to Investigate the Structural Integrity of the Rail Track.
IEEE Trans. Instrum. Meas., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Expert Syst. Appl., 2024
New Paradigm of Adversarial Training: Breaking Inherent Trade-Off between Accuracy and Robustness via Dummy Classes.
CoRR, 2024
Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models.
CoRR, 2024
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024
LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
PrivShape: Extracting Shapes in Time Series Under User-Level Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Interactive Trimming Against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 22nd USENIX Conference on File and Storage Technologies, 2024
TSFool: Crafting Highly-Imperceptible Adversarial Time Series Through Multi-Objective Attack.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the Database Systems for Advanced Applications, 2024
2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023
Comput. Secur., December, 2023
Extended belief rule base with ensemble imbalanced learning for lymph node metastasis diagnosis in endometrial carcinoma.
Eng. Appl. Artif. Intell., November, 2023
IEEE Trans. Mob. Comput., August, 2023
IEEE Trans. Knowl. Data Eng., July, 2023
IEEE Trans. Intell. Transp. Syst., May, 2023
Inf. Sci., April, 2023
IEEE Trans. Serv. Comput., 2023
Post-Streaming Wastage Analysis - A Data Wastage Aware Framework in Mobile Video Streaming.
IEEE Trans. Mob. Comput., 2023
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.
IEEE Trans. Cloud Comput., 2023
Proc. ACM Manag. Data, 2023
J. Comput. Secur., 2023
Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Predicting Remaining Useful Life of Lithium-Ion Battery Using Extended Belief Rule Base Model.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Reverse Nearest Neighbor Search in Semantic Trajectories for Location-Based Services.
IEEE Trans. Serv. Comput., 2022
SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Knowl. Data Eng., 2022
ACM Trans. Intell. Syst. Technol., 2022
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022
Proc. VLDB Endow., 2022
Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System.
IEEE Internet Things J., 2022
BlockShare: A Blockchain Empowered System for Privacy-Preserving Verifiable Data Sharing.
IEEE Data Eng. Bull., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
J. Inf. Secur. Appl., 2021
Inf. Syst., 2021
An improved fuzzy rule-based system using evidential reasoning and subtractive clustering for environmental investment prediction.
Fuzzy Sets Syst., 2021
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021
Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
2020
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020
Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning?
IEEE Intell. Syst., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
2019
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup.
CoRR, 2019
Proceedings of the Web Information Systems Engineering, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
CPP: Towards comprehensive privacy preserving for query processing in information networks.
Inf. Sci., 2018
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
2017
Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure.
IEEE Trans. Mob. Comput., 2017
2016
Pattern Recognit., 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
Expanding dictionary for robust face recognition: pixel is not necessary while sparsity is.
IET Comput. Vis., 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the Database Systems for Advanced Applications, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Knowl. Data Eng., 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Computers, 2013
Proc. VLDB Endow., 2013
IEEE Pervasive Comput., 2013
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Access, 2013
VERDICT: Privacy-preserving authentication of range queries in location-based services.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Brain and Health Informatics - International Conference, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012
You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection.
Proceedings of the Database Systems for Advanced Applications, 2012
2011
Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the Database Systems for Advanced Applications, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
IEEE Trans. Parallel Distributed Syst., 2010
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.
IEEE Trans. Knowl. Data Eng., 2010
Proceedings of the Computer and Information Sciences, 2010
Proceedings of the Database Systems for Advanced Applications, 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
2009
Proceedings of the MDM 2009, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the Advances in Databases: Concepts, 2007
2006
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006
Proceedings of the Advances in Database Technology, 2006
2005
IEEE Data Eng. Bull., 2005
Proceedings of the Advances in Spatial and Temporal Databases, 9th International Symposium, 2005
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
2004
Wirel. Networks, 2004
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004
2003
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003