Haibing Lu
Cited by
Cited by
Optimal boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE third international conference on cloud computing technology and …, 2011
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014
Overbooked and overlooked: machine learning and racial bias in medical appointment scheduling
M Samorani, SL Harris, LG Blount, H Lu, MA Santoro
Manufacturing & Service Operations Management 24 (6), 2825-2842, 2022
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
Dynamic pricing for electric vehicle extreme fast charging
C Fang, H Lu, Y Hong, S Liu, J Chang
IEEE Transactions on Intelligent Transportation Systems 22 (1), 531-541, 2020
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
Community detection in graphs through correlation
L Duan, WN Street, Y Liu, H Lu
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
Edge-rmp: Minimizing administrative assignments for role-based access control
J Vaidya, V Atluri, Q Guo, H Lu
Journal of Computer Security 17 (2), 211-235, 2009
Fine-grained conditional proxy re-encryption and application
Y Yang, H Lu, J Weng, Y Zhang, K Sakurai
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong …, 2014
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
An optimization framework for role mining
H Lu, J Vaidya, V Atluri
Journal of computer security 22 (1), 1-31, 2014
Practical inference control for data cubes
H Lu, Y Li
IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008
Stockout risk of production-inventory systems with compound Poisson demands
H Lu, JJ Shi
Omega 83, 181-198, 2019
Role mining in the presence of noise
J Vaidya, V Atluri, Q Guo, H Lu
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010
Weighted rank-one binary matrix factorization
H Lu, J Vaidya, V Atluri, H Shin, L Jiang
Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011
The system can't perform the operation now. Try again later.
Articles 1–20