Haibing Lu, Ph.D. - Publications

Affiliations: 
2011 Graduate School - Newark Rutgers The State University of New Jersey - Newark, United States 
Area:
Information Science

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Hong Y, Lu H, Fang C, Yang Y, Chang J, Chen X. Chinese address standardisation via hybrid approach combining statistical and rule-based methods International Journal of Internet and Enterprise Management. 9: 179. DOI: 10.1504/Ijiem.2019.10024752  0.336
2018 Lu H, Zhu W, Phan J, Ghiassi M, Fang Y, Hong Y, He X. Fault-tolerant tile mining Expert Systems With Applications. 101: 25-42. DOI: 10.1016/J.Eswa.2018.02.007  0.334
2017 He X, Lu H. Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework Journal of Information Privacy and Security. 13: 104-119. DOI: 10.1080/15536548.2017.1357383  0.327
2017 Yang Y, Wei Z, Zhang Y, Lu H, Choo KR, Cai H. V2X security: A case study of anonymous authentication Pervasive and Mobile Computing. 41: 259-269. DOI: 10.1016/J.Pmcj.2017.03.009  0.31
2016 Almasrahi A, Shin H, Lu H. Towards trajectory anonymisation using multi-dimensional index structures International Journal of Business Continuity and Risk Management. 6: 304. DOI: 10.1504/Ijbcrm.2016.081258  0.534
2015 Lu H, Hong Y, Yang Y, Duan L, Badar N. Towards user-oriented RBAC model Journal of Computer Security. 23: 107-129. DOI: 10.3233/Jcs-140519  0.45
2015 Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607  0.569
2015 Hong Y, Vaidya J, Lu H, Karras P, Goel S. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility Ieee Transactions On Dependable and Secure Computing. 12: 504-518. DOI: 10.1109/Tdsc.2014.2369034  0.437
2015 Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KKR. Cloud based data sharing with fine-grained proxy re-encryption Pervasive and Mobile Computing. DOI: 10.1016/J.Pmcj.2015.06.017  0.386
2014 Lu H, Vaidya J, Atluri V. An optimization framework for role mining Journal of Computer Security. 22: 1-31. DOI: 10.3233/Jcs-130484  0.611
2012 Hong Y, Vaidya J, Lu H. Secure and efficient distributed linear programming Journal of Computer Security. 20: 583-634. DOI: 10.3233/Jcs-2012-0452  0.39
2012 Lu H, Vaidya J, Atluri V, Hong Y. Constraint-aware role mining via extended Boolean matrix decomposition Ieee Transactions On Dependable and Secure Computing. 9: 655-669. DOI: 10.1109/Tdsc.2012.21  0.624
2011 He X, Lu H, Vaidya J, Adam N. Secure construction and publication of contingency tables from distributed data Journal of Computer Security. 19: 453-484. DOI: 10.3233/Jcs-2010-0417  0.377
2011 LI Y, LU H. PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 19: 685-715. DOI: 10.1142/S0218488511007180  0.329
2011 Hong Y, Vaidya J, Lu H, Shafiq B. Privacy-preserving tabu search for distributed graph coloring Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 951-958. DOI: 10.1109/PASSAT/SocialCom.2011.116  0.332
2011 Uzun E, Atluri V, Lu H, Vaidya J. An optimization model for the extended role mining problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 76-89. DOI: 10.1007/978-3-642-22348-8_8  0.594
2011 Lu H, Vaidya J, Atluri V, Shin H, Jiang L. Weighted rank-one binary matrix factorization Proceedings of the 11th Siam International Conference On Data Mining, Sdm 2011. 283-294.  0.561
2010 Vaidya J, Atluri V, Guo Q, Lu H. Role mining in the presence of noise Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 97-112. DOI: 10.1007/978-3-642-13739-6_7  0.525
2009 Vaidya J, Atluri V, Guo Q, Lu H. Edge-RMP: Minimizing administrative assignments for role-based access control Journal of Computer Security. 17: 211-235. DOI: 10.3233/Jcs-2009-0341  0.615
2009 Lu H, Li Y, Atluri V, Vaidya J. An efficient online auditing approach to limit private data disclosure Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 636-647. DOI: 10.1145/1516360.1516434  0.57
2009 Lu H, Vaidya J, Atluri V, Hong Y. Extended Boolean matrix decomposition Proceedings - Ieee International Conference On Data Mining, Icdm. 317-326. DOI: 10.1109/ICDM.2009.61  0.557
2008 Lu H, Li Y. Practical Inference Control for Data Cubes Ieee Transactions On Dependable and Secure Computing. 5: 87-98. DOI: 10.1109/Tdsc.2007.70217  0.413
2008 Lu H, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: Application to role engineering Proceedings - International Conference On Data Engineering. 297-306. DOI: 10.1109/ICDE.2008.4497438  0.587
Show low-probability matches.