Year |
Citation |
Score |
2019 |
Hong Y, Lu H, Fang C, Yang Y, Chang J, Chen X. Chinese address standardisation via hybrid approach combining statistical and rule-based methods International Journal of Internet and Enterprise Management. 9: 179. DOI: 10.1504/Ijiem.2019.10024752 |
0.336 |
|
2018 |
Lu H, Zhu W, Phan J, Ghiassi M, Fang Y, Hong Y, He X. Fault-tolerant tile mining Expert Systems With Applications. 101: 25-42. DOI: 10.1016/J.Eswa.2018.02.007 |
0.334 |
|
2017 |
He X, Lu H. Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework Journal of Information Privacy and Security. 13: 104-119. DOI: 10.1080/15536548.2017.1357383 |
0.327 |
|
2017 |
Yang Y, Wei Z, Zhang Y, Lu H, Choo KR, Cai H. V2X security: A case study of anonymous authentication Pervasive and Mobile Computing. 41: 259-269. DOI: 10.1016/J.Pmcj.2017.03.009 |
0.31 |
|
2016 |
Almasrahi A, Shin H, Lu H. Towards trajectory anonymisation using multi-dimensional index structures International Journal of Business Continuity and Risk Management. 6: 304. DOI: 10.1504/Ijbcrm.2016.081258 |
0.534 |
|
2015 |
Lu H, Hong Y, Yang Y, Duan L, Badar N. Towards user-oriented RBAC model Journal of Computer Security. 23: 107-129. DOI: 10.3233/Jcs-140519 |
0.45 |
|
2015 |
Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607 |
0.569 |
|
2015 |
Hong Y, Vaidya J, Lu H, Karras P, Goel S. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility Ieee Transactions On Dependable and Secure Computing. 12: 504-518. DOI: 10.1109/Tdsc.2014.2369034 |
0.437 |
|
2015 |
Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KKR. Cloud based data sharing with fine-grained proxy re-encryption Pervasive and Mobile Computing. DOI: 10.1016/J.Pmcj.2015.06.017 |
0.386 |
|
2014 |
Lu H, Vaidya J, Atluri V. An optimization framework for role mining Journal of Computer Security. 22: 1-31. DOI: 10.3233/Jcs-130484 |
0.611 |
|
2012 |
Hong Y, Vaidya J, Lu H. Secure and efficient distributed linear programming Journal of Computer Security. 20: 583-634. DOI: 10.3233/Jcs-2012-0452 |
0.39 |
|
2012 |
Lu H, Vaidya J, Atluri V, Hong Y. Constraint-aware role mining via extended Boolean matrix decomposition Ieee Transactions On Dependable and Secure Computing. 9: 655-669. DOI: 10.1109/Tdsc.2012.21 |
0.624 |
|
2011 |
He X, Lu H, Vaidya J, Adam N. Secure construction and publication of contingency tables from distributed data Journal of Computer Security. 19: 453-484. DOI: 10.3233/Jcs-2010-0417 |
0.377 |
|
2011 |
LI Y, LU H. PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 19: 685-715. DOI: 10.1142/S0218488511007180 |
0.329 |
|
2011 |
Hong Y, Vaidya J, Lu H, Shafiq B. Privacy-preserving tabu search for distributed graph coloring Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 951-958. DOI: 10.1109/PASSAT/SocialCom.2011.116 |
0.332 |
|
2011 |
Uzun E, Atluri V, Lu H, Vaidya J. An optimization model for the extended role mining problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 76-89. DOI: 10.1007/978-3-642-22348-8_8 |
0.594 |
|
2011 |
Lu H, Vaidya J, Atluri V, Shin H, Jiang L. Weighted rank-one binary matrix factorization Proceedings of the 11th Siam International Conference On Data Mining, Sdm 2011. 283-294. |
0.561 |
|
2010 |
Vaidya J, Atluri V, Guo Q, Lu H. Role mining in the presence of noise Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 97-112. DOI: 10.1007/978-3-642-13739-6_7 |
0.525 |
|
2009 |
Vaidya J, Atluri V, Guo Q, Lu H. Edge-RMP: Minimizing administrative assignments for role-based access control Journal of Computer Security. 17: 211-235. DOI: 10.3233/Jcs-2009-0341 |
0.615 |
|
2009 |
Lu H, Li Y, Atluri V, Vaidya J. An efficient online auditing approach to limit private data disclosure Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 636-647. DOI: 10.1145/1516360.1516434 |
0.57 |
|
2009 |
Lu H, Vaidya J, Atluri V, Hong Y. Extended Boolean matrix decomposition Proceedings - Ieee International Conference On Data Mining, Icdm. 317-326. DOI: 10.1109/ICDM.2009.61 |
0.557 |
|
2008 |
Lu H, Li Y. Practical Inference Control for Data Cubes Ieee Transactions On Dependable and Secure Computing. 5: 87-98. DOI: 10.1109/Tdsc.2007.70217 |
0.413 |
|
2008 |
Lu H, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: Application to role engineering Proceedings - International Conference On Data Engineering. 297-306. DOI: 10.1109/ICDE.2008.4497438 |
0.587 |
|
Show low-probability matches. |