Optimal boolean matrix decomposition: Application to role engineering H Lu, J Vaidya, V Atluri 2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008 | 208 | 2008 |
Multi-user private keyword search for cloud computing Y Yang, H Lu, J Weng 2011 IEEE third international conference on cloud computing technology and …, 2011 | 147 | 2011 |
Cloud based data sharing with fine-grained proxy re-encryption Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo Pervasive and Mobile computing 28, 122-134, 2016 | 122 | 2016 |
Overbooked and overlooked: machine learning and racial bias in medical appointment scheduling M Samorani, SL Harris, LG Blount, H Lu, MA Santoro Manufacturing & Service Operations Management 24 (6), 2825-2842, 2022 | 99 | 2022 |
Collaborative search log sanitization: Toward differential privacy and boosted utility Y Hong, J Vaidya, H Lu, P Karras, S Goel IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014 | 95 | 2014 |
Dynamic pricing for electric vehicle extreme fast charging C Fang, H Lu, Y Hong, S Liu, J Chang IEEE Transactions on Intelligent Transportation Systems 22 (1), 531-541, 2020 | 81 | 2020 |
Constraint-aware role mining via extended boolean matrix decomposition H Lu, J Vaidya, V Atluri, Y Hong IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012 | 73 | 2012 |
Towards lightweight anonymous entity authentication for IoT applications Y Yang, H Cai, Z Wei, H Lu, KKR Choo Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 63 | 2016 |
V2X security: A case study of anonymous authentication Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai Pervasive and Mobile Computing 41, 259-269, 2017 | 59 | 2017 |
Community detection in graphs through correlation L Duan, WN Street, Y Liu, H Lu Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014 | 50 | 2014 |
Secure and efficient distributed linear programming Y Hong, J Vaidya, H Lu Journal of Computer Security 20 (5), 583-634, 2012 | 48 | 2012 |
Differentially private search log sanitization with optimal output utility Y Hong, J Vaidya, H Lu, M Wu Proceedings of the 15th International Conference on Extending Database …, 2012 | 44 | 2012 |
Edge-rmp: Minimizing administrative assignments for role-based access control J Vaidya, V Atluri, Q Guo, H Lu Journal of Computer Security 17 (2), 211-235, 2009 | 43 | 2009 |
Fine-grained conditional proxy re-encryption and application Y Yang, H Lu, J Weng, Y Zhang, K Sakurai Provable Security: 8th International Conference, ProvSec 2014, Hong Kong …, 2014 | 40 | 2014 |
Towards user-oriented RBAC model H Lu, Y Hong, Y Yang, L Duan, N Badar Journal of Computer Security 23 (1), 107-129, 2015 | 37 | 2015 |
An optimization framework for role mining H Lu, J Vaidya, V Atluri Journal of Computer Security 22 (1), 1-31, 2014 | 36 | 2014 |
Practical inference control for data cubes H Lu, Y Li IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008 | 34 | 2008 |
Stockout risk of production-inventory systems with compound Poisson demands H Lu, JJ Shi Omega 83, 181-198, 2019 | 29 | 2019 |
Role mining in the presence of noise J Vaidya, V Atluri, Q Guo, H Lu Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010 | 25 | 2010 |
Weighted rank-one binary matrix factorization H Lu, J Vaidya, V Atluri, H Shin, L Jiang Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011 | 24 | 2011 |