Haibing Lu
Title
Cited by
Cited by
Year
Optimal boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008
1822008
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
1332011
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
922016
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014
712014
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
622012
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Australasian conference on information security and privacy, 265-280, 2016
452016
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
442012
Community detection in graphs through correlation
L Duan, WN Street, Y Liu, H Lu
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
392014
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
372017
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
372012
Edge-rmp: Minimizing administrative assignments for role-based access control
J Vaidya, V Atluri, Q Guo, H Lu
Journal of Computer Security 17 (2), 211-235, 2009
332009
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
302015
Practical inference control for data cubes
H Lu, Y Li
IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008
302008
An optimization framework for role mining
H Lu, J Vaidya, V Atluri
Journal of Computer Security 22 (1), 1-31, 2014
282014
Fine-grained conditional proxy re-encryption and application
Y Yang, H Lu, J Weng, Y Zhang, K Sakurai
International Conference on Provable Security, 206-222, 2014
222014
Extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
2009 Ninth IEEE International Conference on Data Mining, 317-326, 2009
212009
Role mining in the presence of noise
J Vaidya, V Atluri, Q Guo, H Lu
IFIP Annual Conference on Data and Applications Security and Privacy, 97-112, 2010
202010
Achieving revocable fine-grained cryptographic access control over cloud data
Y Yang, X Ding, H Lu, Z Wan, J Zhou
Information Security, 293-308, 2015
192015
Overlapping clustering with sparseness constraints
H Lu, Y Hong, WN Street, F Wang, H Tong
2012 IEEE 12th International Conference on Data Mining Workshops, 486-494, 2012
192012
Weighted rank-one binary matrix factorization
H Lu, J Vaidya, V Atluri, H Shin, L Jiang
Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20