default search action
Haibing Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Tianxin Zhou, Xiang Li, Haibing Lu:
A Dual Power Grid Cascading Failure Model for the Vulnerability Analysis. CoRR abs/2405.11311 (2024) - 2023
- [j27]Xin Tang, Haibing Lu, Wei Huang, Shulin Liu:
Investment decisions and pricing strategies of crowdfunding players: In a two-sided crowdfunding market. Electron. Commer. Res. 23(2): 1209-1240 (2023) - [j26]Shamik Sural, Haibing Lu:
Guest editors' introduction. J. Comput. Secur. 31(6): 647 (2023) - [i5]Sihang Li, Kuangzheng Li, Haibing Lu:
National Origin Discrimination in Deep-learning-powered Automated Resume Screening. CoRR abs/2307.08624 (2023) - 2022
- [j25]Michele Samorani, Shannon L. Harris, Linda Goler Blount, Haibing Lu, Michael A. Santoro:
Overbooked and Overlooked: Machine Learning and Racial Bias in Medical Appointment Scheduling. Manuf. Serv. Oper. Manag. 24(6): 2825-2842 (2022) - [j24]Guojie Song, Yizhou Zhang, Lingjun Xu, Haibing Lu:
Domain Adaptive Network Embedding. IEEE Trans. Big Data 8(5): 1220-1232 (2022) - [e1]Shamik Sural, Haibing Lu:
Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13383, Springer 2022, ISBN 978-3-031-10683-5 [contents] - 2021
- [j23]Shan Liu, Wayne Wei Huang, Haibing Lu, Richard Watson:
PACIS 2019: Emerging technology, business, and application in digital economy. Inf. Manag. 58(6): 103466 (2021) - [j22]Yilin Zhang, Haibing Lu, Zhili Zhou, Zhen Yang, Shengjun Xu:
Analysis and optimisation of perishable inventory with stocks-sensitive stochastic demand and two-stage pricing: A discrete-event simulation study. J. Simulation 15(4): 326-337 (2021) - [j21]Haibing Lu, Shan Liu, Wayne Huang, Jian Mou:
Challenges and Opportunities for Information Systems Research During and After Coronavirus. Pac. Asia J. Assoc. Inf. Syst. 13(2): 1 (2021) - [j20]Haibing Lu, Xi Chen, Qi Liu, Michele Samorani, Guojie Song, Yanjiang Yang:
Stochastic Workflow Authorizations With Queueing Constraints. IEEE Trans. Dependable Secur. Comput. 18(4): 1605-1619 (2021) - [j19]Cheng Fang, Haibing Lu, Yuan Hong, Shan Liu, Jasmine Chang:
Dynamic Pricing for Electric Vehicle Extreme Fast Charging. IEEE Trans. Intell. Transp. Syst. 22(1): 531-541 (2021) - [c31]Tianxin Zhou, Xiang Li, Haibing Lu:
Power Grid Cascading Failure Prediction Based on Transformer. CSoNet 2021: 156-167 - [c30]Haibing Lu, Xi Chen, Jiangpeng Dai, Bin Wu, Yi Fang, Michele Samorani, Zhen Li:
Game Theoretic Approach to Extreme Fast Charging Location. ISCAS 2021: 1-5 - 2020
- [j18]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020)
2010 – 2019
- 2019
- [j17]Xi Chen, Cheng Fang, Jasmine Chang, Yanjiang Yang, Yuan Hong, Haibing Lu:
Chinese address standardisation via hybrid approach combining statistical and rule-based methods. Int. J. Internet Enterp. Manag. 9(2): 179-193 (2019) - [i4]Shangyu Xie, Han Wang, Shengbin Wang, Haibing Lu, Yuan Hong, Dong Jin, Qi Liu:
Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy. CoRR abs/1902.03916 (2019) - 2018
- [j16]Haibing Lu, Wendong Zhu, Joseph Phan, Manoochehr Ghiassi, Yi Fang, Yuan Hong, Xiaoyun He:
Fault-tolerant tile mining. Expert Syst. Appl. 101: 25-42 (2018) - [i3]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Securely Solving the Distributed Graph Coloring Problem. CoRR abs/1803.05606 (2018) - 2017
- [j15]Lian Duan, Yanchi Liu, W. Nick Street, Haibing Lu:
Utilizing advances in correlation analysis for community structure detection. Expert Syst. Appl. 84: 74-91 (2017) - [j14]Yanjiang Yang, Zhuo Wei, Youcheng Zhang, Haibing Lu, Kim-Kwang Raymond Choo, Haibin Cai:
V2X security: A case study of anonymous authentication. Pervasive Mob. Comput. 41: 259-269 (2017) - [c29]Yuan Hong, Sanjay Goel, Haibing Lu, Shengbin Wang:
Discovering energy communities for microgrids on the power grid. SmartGridComm 2017: 64-70 - 2016
- [j13]Xiaoyun He, Haibing Lu:
Catch a Fad or Capture a Value?: Social Media Leverage in SMEs. J. Organ. End User Comput. 28(3): 67-81 (2016) - [j12]Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Weng, Youcheng Zhang, Kim-Kwang Raymond Choo:
Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28: 122-134 (2016) - [j11]Yuan Hong, Jaideep Vaidya, Haibing Lu, Wen Ming Liu:
Accurate and efficient query clustering via top ranked search results. Web Intell. 14(2): 119-138 (2016) - [c28]Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. ACISP (1) 2016: 265-280 - [c27]Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. AsiaCCS 2016: 141-151 - [c26]Yi Fang, Archana Godavarthy, Haibing Lu:
A Utility Maximization Framework for Privacy Preservation of User Generated Content. ICTIR 2016: 281-290 - 2015
- [j10]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [j9]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards user-oriented RBAC model. J. Comput. Secur. 23(1): 107-129 (2015) - [j8]Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel:
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. IEEE Trans. Dependable Secur. Comput. 12(5): 504-518 (2015) - 2014
- [j7]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
An optimization framework for role mining. J. Comput. Secur. 22(1): 1-31 (2014) - [c25]Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. DBSec 2014: 179-194 - [c24]Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan:
Dynamic Workflow Adjustment with Security Constraints. DBSec 2014: 211-226 - [c23]Lian Duan, William Nick Street, Yanchi Liu, Haibing Lu:
Community detection in graphs through correlation. KDD 2014: 1376-1385 - [c22]Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222 - 2013
- [c21]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards User-Oriented RBAC Model. DBSec 2013: 81-96 - [c20]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ISC 2013: 238-247 - [c19]Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. ISC 2013: 293-308 - [i2]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng:
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. IACR Cryptol. ePrint Arch. 2013: 207 (2013) - 2012
- [j6]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Secure and efficient distributed linear programming. J. Comput. Secur. 20(5): 583-634 (2012) - [j5]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. IEEE Trans. Dependable Secur. Comput. 9(5): 655-669 (2012) - [c18]Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:
Differentially private search log sanitization with optimal output utility. EDBT 2012: 50-61 - [c17]Haibing Lu, Yuan Hong, W. Nick Street, Fei Wang, Hanghang Tong:
Overlapping Clustering with Sparseness Constraints. ICDM Workshops 2012: 486-494 - [c16]Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou:
A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284 - 2011
- [j4]Yingjiu Li, Haibing Lu:
Privacy Risk Assessment with Bounds Deduced from Bounds. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(4): 685-715 (2011) - [j3]Xiaoyun He, Haibing Lu, Jaideep Vaidya, Nabil R. Adam:
Secure construction and publication of contingency tables from distributed data. J. Comput. Secur. 19(3): 453-484 (2011) - [c15]Yanjiang Yang, Haibing Lu, Jian Weng:
Multi-User Private Keyword Search for Cloud Computing. CloudCom 2011: 264-271 - [c14]Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya:
An Optimization Model for the Extended Role Mining Problem. DBSec 2011: 76-89 - [c13]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Efficient Distributed Linear Programming with Limited Disclosure. DBSec 2011: 170-185 - [c12]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Heechang Shin, Lili Jiang:
Weighted Rank-One Binary Matrix Factorization. SDM 2011: 283-294 - [c11]Yuan Hong, Jaideep Vaidya, Haibing Lu, Basit Shafiq:
Privacy-Preserving Tabu Search for Distributed Graph Coloring. SocialCom/PASSAT 2011: 951-958 - [c10]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Search Engine Query Clustering Using Top-k Search Results. Web Intelligence 2011: 112-119 - [r1]Nabil R. Adam, Haibing Lu, Jaideep Vaidya, Basit Shafiq:
Statistical Databases. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1256-1260 - [i1]Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:
Differentially Private Search Log Sanitization with Optimal Output Utility. CoRR abs/1108.0186 (2011) - 2010
- [c9]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. DBSec 2010: 97-112
2000 – 2009
- 2009
- [j2]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. J. Comput. Secur. 17(2): 211-235 (2009) - [c8]Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 - [c7]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Extended Boolean Matrix Decomposition. ICDM 2009: 317-326 - 2008
- [j1]Haibing Lu, Yingjiu Li:
Practical Inference Control for Data Cubes. IEEE Trans. Dependable Secur. Comput. 5(2): 87-98 (2008) - [c6]Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam:
Secure Construction of Contingency Tables from Distributed Data. DBSec 2008: 144-157 - [c5]Yingjiu Li, Haibing Lu:
Disclosure Analysis and Control in Statistical Databases. ESORICS 2008: 146-160 - [c4]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Boolean Matrix Decomposition: Application to Role Engineering. ICDE 2008: 297-306 - 2006
- [c3]Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). ICISS 2006: 349-352 - [c2]Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Analysis for Two-Way Contingency Tables. Privacy in Statistical Databases 2006: 57-67 - [c1]Yingjiu Li, Haibing Lu, Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract). S&P 2006: 115-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint