Optimal boolean matrix decomposition: Application to role engineering H Lu, J Vaidya, V Atluri 2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008 | 194 | 2008 |
Multi-user private keyword search for cloud computing Y Yang, H Lu, J Weng 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 138 | 2011 |
Cloud based data sharing with fine-grained proxy re-encryption Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo Pervasive and Mobile computing 28, 122-134, 2016 | 107 | 2016 |
Collaborative search log sanitization: Toward differential privacy and boosted utility Y Hong, J Vaidya, H Lu, P Karras, S Goel IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014 | 79 | 2014 |
Constraint-aware role mining via extended boolean matrix decomposition H Lu, J Vaidya, V Atluri, Y Hong IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012 | 64 | 2012 |
Towards lightweight anonymous entity authentication for IoT applications Y Yang, H Cai, Z Wei, H Lu, KKR Choo Australasian conference on information security and privacy, 265-280, 2016 | 50 | 2016 |
Secure and efficient distributed linear programming Y Hong, J Vaidya, H Lu Journal of Computer Security 20 (5), 583-634, 2012 | 44 | 2012 |
V2X security: A case study of anonymous authentication Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai Pervasive and Mobile Computing 41, 259-269, 2017 | 43 | 2017 |
Community detection in graphs through correlation L Duan, WN Street, Y Liu, H Lu Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014 | 42 | 2014 |
Differentially private search log sanitization with optimal output utility Y Hong, J Vaidya, H Lu, M Wu Proceedings of the 15th International Conference on Extending Database …, 2012 | 40 | 2012 |
Edge-rmp: Minimizing administrative assignments for role-based access control J Vaidya, V Atluri, Q Guo, H Lu Journal of Computer Security 17 (2), 211-235, 2009 | 35 | 2009 |
Towards user-oriented RBAC model H Lu, Y Hong, Y Yang, L Duan, N Badar Journal of Computer Security 23 (1), 107-129, 2015 | 34 | 2015 |
Practical inference control for data cubes H Lu, Y Li IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008 | 32 | 2008 |
An optimization framework for role mining H Lu, J Vaidya, V Atluri Journal of computer security 22 (1), 1-31, 2014 | 29 | 2014 |
Fine-grained conditional proxy re-encryption and application Y Yang, H Lu, J Weng, Y Zhang, K Sakurai International conference on provable security, 206-222, 2014 | 28 | 2014 |
Dynamic pricing for electric vehicle extreme fast charging C Fang, H Lu, Y Hong, S Liu, J Chang IEEE Transactions on Intelligent Transportation Systems 22 (1), 531-541, 2020 | 23 | 2020 |
Role mining in the presence of noise J Vaidya, V Atluri, Q Guo, H Lu IFIP Annual Conference on Data and Applications Security and Privacy, 97-112, 2010 | 21 | 2010 |
Extended boolean matrix decomposition H Lu, J Vaidya, V Atluri, Y Hong 2009 Ninth IEEE International Conference on Data Mining, 317-326, 2009 | 21 | 2009 |
Overlapping clustering with sparseness constraints H Lu, Y Hong, WN Street, F Wang, H Tong 2012 IEEE 12th International Conference on Data Mining Workshops, 486-494, 2012 | 20 | 2012 |
Weighted rank-one binary matrix factorization H Lu, J Vaidya, V Atluri, H Shin, L Jiang Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011 | 20 | 2011 |