Hui Li

Orcid: 0000-0003-2382-6289

Affiliations:
  • Xidian University, School of Computer Science and Technology, Xi'an, China
  • Nanyang Technological University, Singapore (PhD 2012)


According to our database1, Hui Li authored at least 72 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DP-starJ: A Differential Private Scheme towards Analytical Star-Join Queries.
Proc. ACM Manag. Data, December, 2023

Fuzzy Differential Privacy Theory and Its Applications in Subgraph Counting.
IEEE Trans. Fuzzy Syst., February, 2023

Toward Balancing the Efficiency and Effectiveness in k-Facility Relocation Problem.
ACM Trans. Intell. Syst. Technol., 2023

PIANO: Influence Maximization Meets Deep Reinforcement Learning.
IEEE Trans. Comput. Soc. Syst., 2023

An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation.
Proc. ACM Manag. Data, 2023

DP-starJ: A Differential Private Scheme towards Analytical Star-Join Queries.
CoRR, 2023

One Size Cannot Fit All: a Self-Adaptive Dispatcher for Skewed Hash Join in Shared-nothing RDBMSs.
CoRR, 2023

ARENA: Alternative Relational Query Plan Exploration for Database Education.
Proceedings of the Companion of the 2023 International Conference on Management of Data, 2023

2022
ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering.
IEEE Trans. Knowl. Data Eng., 2022

LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Technology-Enabled Learning of Relational Query Processing.
IEEE Data Eng. Bull., 2022

ARENA: Towards Informative Alternative Query Plan Selection for Database Education.
CoRR, 2022

a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

LANTERN: Boredom-conscious Natural Language Description Generation of Query Execution Plans for Database Education.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

DBinsight: A Tool for Interactively Understanding the Query Processing Pipeline in RDBMSs.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

DP-HORUS: Differentially Private Hierarchical Count Histograms under Untrusted Server.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys.
IEEE Trans. Serv. Comput., 2021

Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

3E-LDA: Three Enhancements to Linear Discriminant Analysis.
ACM Trans. Knowl. Discov. Data, 2021

Sustainable Ensemble Learning Driving Intrusion Detection Model.
IEEE Trans. Dependable Secur. Comput., 2021

Community Hiding by Link Perturbation in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2021

Influential facilities placement over moving objects.
Distributed Parallel Databases, 2021

Top-k Competitive Location Selection over Moving Objects.
Data Sci. Eng., 2021

Enhanced countering adversarial attacks via input denoising and feature restoring.
CoRR, 2021

Towards Enhancing Database Education: Natural Language Generation Meets Query Execution Plans.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering (Extended Abstract).
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

SQE-GAN: A Supervised Query Expansion Scheme via GAN.
Proceedings of the Advances in Information Retrieval, 2021

SaDes: An Interactive System for Sensitivity-aware Desensitization towards Tabular Data.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Addressing the Hardness of k-Facility Relocation Problem: A Pair of Approximate Solutions.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
FROST: Movement History-Conscious Facility Relocation.
ACM Trans. Intell. Syst. Technol., 2020

An Efficient Secure Dynamic Skyline Query Model.
CoRR, 2020

CHASSIS: Conformity Meets Online Information Diffusion.
Proceedings of the 2020 International Conference on Management of Data, 2020

BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Target Privacy Preserving for Social Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

MALOS: A Movement-Aware Location Selection System.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud.
Proceedings of the Database Systems for Advanced Applications, 2020

Instance-Aware Evaluation of Sensitive Columns in Tabular Dataset.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

On the Vulnerability and Generality of K-Anonymity Location Privacy Under Continuous LBS Requests.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

2019
An efficient LSH indexing on discriminative short codes for high-dimensional nearest neighbors.
Multim. Tools Appl., 2019

DISCO: Influence Maximization Meets Network Embedding and Deep Learning.
CoRR, 2019

Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing.
IEEE Access, 2019

k-Collective Influential Facility Placement Over Moving Object.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

2018
Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments.
IEEE Trans. Big Data, 2018

Hidden community identification in location-based social network via probabilistic venue sequences.
Inf. Sci., 2018

Place Your Next Branch with MILE-RUN: Min-dist Location Selection over User Movement.
Inf. Sci., 2018

Targeted Influential Nodes Selection in Location-Aware Social Networks.
Complex., 2018

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018

2017
Effective optimizations of cluster-based nearest neighbor search in high-dimensional space.
Multim. Syst., 2017

A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017

Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.
CoRR, 2017

2016
PINOCCHIO: Probabilistic Influence-Based Location Selection over Moving Objects.
IEEE Trans. Knowl. Data Eng., 2016

An intelligent movie recommendation system through group-level sentiment analysis in microblogs.
Neurocomputing, 2016

Dimensionality reduction for histogram features: A distance-adaptive approach.
Neurocomputing, 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
Sci. China Inf. Sci., 2016

An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree.
Proceedings of the International Conference on Networking and Network Applications, 2016

A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Improving the utility in differential private histogram publishing: Theoretical study and practice.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Conformity-aware influence maximization in online social networks.
VLDB J., 2015

Backward Path Growth for Efficient Mobile Sequential Recommendation.
IEEE Trans. Knowl. Data Eng., 2015

Social Influence Study in Online Networks: A Three-Level Review.
J. Comput. Sci. Technol., 2015

GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

2014
SK-LSH: An Efficient Index Structure for Approximate Nearest Neighbor Search.
Proc. VLDB Endow., 2014

A Study towards Application-driven Social Network Analysis.
J. Comput., 2014

Affinity-driven blog cascade analysis and prediction.
Data Min. Knowl. Discov., 2014

2013
CINEMA: conformity-aware greedy algorithm for influence maximization in online social networks.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
iMASON: towards influence-driven multi-level analysis of online social networks
PhD thesis, 2012

2011
<i>AffRank</i>: Affinity-driven ranking of products in online social rating networks.
J. Assoc. Inf. Sci. Technol., 2011

CASINO: towards conformity-aware social influence analysis in online social networks.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Affinity-driven prediction and ranking of products in online product review sites.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Blog cascade affinity: analysis and prediction.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009


  Loading...