Hong Zhu

Orcid: 0000-0001-9815-3934

Affiliations:
  • Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China


According to our database1, Hong Zhu authored at least 51 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving.
Inf. Sci., January, 2024

2023
Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation.
IEEE Trans. Ind. Electron., 2023

Item-Oriented Personalized LDP for Discrete Distribution Estimation.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Group-based recurrent neural network for human mobility prediction.
Neural Comput. Appl., 2022

2021
Quantifying Location Privacy Risks Under Heterogeneous Correlations.
IEEE Access, 2021

CTP: Correlated Trajectory Publication with Differential Privacy.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2019
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release.
IEEE Access, 2019

LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations.
Proceedings of the 2019 IEEE SmartWorld, 2019

A spatial text query scheme based on semantic-aware.
Proceedings of the 3rd International Conference on High Performance Compilation, 2019

Improving Ad Click Prediction by Considering Non-displayed Events.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe.
KSII Trans. Internet Inf. Syst., 2018

Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud.
Inf. Sci., 2018

2017
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service.
Frontiers Comput. Sci., 2017

Query Optimization Strategies in Probabilistic Relational Databases.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Convenient Top-k Location-Text Publish/Subscribe Scheme.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Privacy-preserving ranked neighbor query over encrypted graph data in the cloud.
Secur. Commun. Networks, 2016

Identity-based key management for cloud computing.
Secur. Commun. Networks, 2016

On efficient conditioning of probabilistic relational databases.
Knowl. Based Syst., 2016

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2016

Efficient authorisation update on cloud data.
Int. J. Web Grid Serv., 2016

VParC: a compression scheme for numeric data in column-oriented databases.
Int. Arab J. Inf. Technol., 2016

Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Efficient Initialization Method for Probabilistic Relational Databases.
Proceedings of the Database and Expert Systems Applications, 2016

2015
A distributed scheme for row-based computational private information retrieval.
Secur. Commun. Networks, 2015

Anonymization on refining partition: Same privacy, more utility.
Comput. Sci. Inf. Syst., 2015

Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity.
Comput. J., 2015

2014
An Efficient Conditioning Method for Probabilistic Relational Databases.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Anonymization on refining partition: Same privacy, more utility.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Equi-join for Multiple Datasets Based on Time Cost Evaluation Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Lightweight key management on sensitive data in the cloud.
Secur. Commun. Networks, 2013

Two MRJs for Multi-way Theta-Join in MapReduce.
Proceedings of the Internet and Distributed Computing Systems, 2013

Lightweight Management of Authorization Update on Cloud Data.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Fixed-length string compression for direct operations in column-oriented databases.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Client Privacy Preserving Discovery Service Scheme.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2010
A fine-grained access control model for relational databases.
J. Zhejiang Univ. Sci. C, 2010

Dynamic Damage Recovery for Web Databases.
J. Comput. Sci. Technol., 2010

2009
A practical mandatory access control model for XML databases.
Inf. Sci., 2009

A Robust Damage Assessment Model for Corrupted Database Systems.
Proceedings of the Information Systems Security, 5th International Conference, 2009

On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Controlling Information Leakage of Fine-Grained Access Model in DBMSs.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Dynamic data recovery for database systems based on fine grained transaction log.
Proceedings of the 12th International Database Engineering and Applications Symposium (IDEAS 2008), 2008

Fast N-Dimensional Hilbert Mapping Algorithm.
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008

Tracking and Repairing Damaged Databases Using Before Image Table.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

2007
A flexible mandatory access control policy for XML databases.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Executing Query over Encrypted Character Strings in Databases.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

Fine-Grained Access Control for Database Management Systems.
Proceedings of the Data Management. Data, 2007

2006
The Design and Implementation of a Performance Evaluation Tool with TPC-W Benchmark.
J. Comput. Inf. Technol., 2006

An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006


  Loading...