Haibing Lu
Title
Cited by
Cited by
Year
Optimal boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008
1662008
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
1082011
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile Computing 28, 122-134, 2016
772016
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014
602014
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
532012
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
412012
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
362012
Community detection in graphs through correlation
L Duan, WN Street, Y Liu, H Lu
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
352014
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Australasian conference on information security and privacy, 265-280, 2016
342016
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
312017
Practical inference control for data cubes
H Lu, Y Li
IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008
292008
Edge-RMP: Minimizing administrative assignments for role-based access control
J Vaidya, V Atluri, Q Guo, H Lu
Journal of Computer Security 17 (2), 211-235, 2009
272009
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
262015
An optimization framework for role mining
H Lu, J Vaidya, V Atluri
Journal of Computer Security 22 (1), 1-31, 2014
232014
Extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
2009 Ninth IEEE International Conference on Data Mining, 317-326, 2009
212009
Weighted rank-one binary matrix factorization
H Lu, J Vaidya, V Atluri, H Shin, L Jiang
Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011
192011
Fine-grained conditional proxy re-encryption and application
Y Yang, H Lu, J Weng, Y Zhang, K Sakurai
International Conference on Provable Security, 206-222, 2014
182014
Overlapping clustering with sparseness constraints
H Lu, Y Hong, WN Street, F Wang, H Tong
2012 IEEE 12th International Conference on Data Mining Workshops, 486-494, 2012
172012
Search engine query clustering using top-k search results
Y Hong, J Vaidya, H Lu
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
172011
Role mining in the presence of noise
J Vaidya, V Atluri, Q Guo, H Lu
IFIP Annual Conference on Data and Applications Security and Privacy, 97-112, 2010
172010
The system can't perform the operation now. Try again later.
Articles 1–20