Haibing Lu
Titolo
Citata da
Citata da
Anno
Optimal boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
2008 IEEE 24th International Conference on Data Engineering, 297-306, 2008
1792008
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
1322011
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
872016
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2014
672014
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
602012
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
442012
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Australasian conference on information security and privacy, 265-280, 2016
382016
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
372012
Community detection in graphs through correlation
L Duan, WN Street, Y Liu, H Lu
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
362014
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
342017
Edge-rmp: Minimizing administrative assignments for role-based access control
J Vaidya, V Atluri, Q Guo, H Lu
Journal of Computer Security 17 (2), 211-235, 2009
332009
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
302015
Practical inference control for data cubes
H Lu, Y Li
IEEE Transactions on Dependable and Secure Computing 5 (2), 87-98, 2008
302008
An optimization framework for role mining
H Lu, J Vaidya, V Atluri
Journal of Computer Security 22 (1), 1-31, 2014
242014
Fine-grained conditional proxy re-encryption and application
Y Yang, H Lu, J Weng, Y Zhang, K Sakurai
International Conference on Provable Security, 206-222, 2014
212014
Extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
2009 Ninth IEEE International Conference on Data Mining, 317-326, 2009
212009
Role mining in the presence of noise
J Vaidya, V Atluri, Q Guo, H Lu
IFIP Annual Conference on Data and Applications Security and Privacy, 97-112, 2010
202010
Weighted rank-one binary matrix factorization
H Lu, J Vaidya, V Atluri, H Shin, L Jiang
Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011
192011
Achieving revocable fine-grained cryptographic access control over cloud data
Y Yang, X Ding, H Lu, Z Wan, J Zhou
Information Security, 293-308, 2015
182015
Overlapping clustering with sparseness constraints
H Lu, Y Hong, WN Street, F Wang, H Tong
2012 IEEE 12th International Conference on Data Mining Workshops, 486-494, 2012
172012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20