Publications

Peer-Reviewed Papers in 2020

  1. H. Zheng, H. Hu, and Z. Han. “Preserving User Privacy For Machine Learning: Local Differential Privacy or Federated Machine Learning?” IEEE Intelligent Systems, accepted to appear, 2020.
  2. X. Pan, S. Nie, H. Hu, P. Yu, J. Guo, and L. Wu. “Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services.” IEEE Transactions on Services Computing (TSC), accepted to appear, 2020.
  3. L. Tang and H. Hu. “OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors.” Proc. of 29th ACM International Conference on Information and Knowledge Management (CIKM ’20) October 19-23, 2020.
  4. Y. Fu, M. H. Au, R. Du, H. Hu and D. Li. “Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.” (poster) Proc. of 40th IEEE International Conference on Distributed Computing Systems (ICDCS ’20) July 8 – 10, 2020, Singapore.
  5. Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. “Towards Locally Differentially Private Generic Graph Metric Estimation.” Proc. of the 36th IEEE International Conference on Data Engineering (ICDE ’20), Dallas, USA, Apr. 2020, pp 1922-1925.

Peer-Reviewed Papers in 2019

  1. H. Zheng and H. Hu. “MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.” IEEE Transactions on Information Forensics and Security (TIFS), Volume 15, September 2019, 3137 – 3151.
  2. H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “A Boundary Differential Private Layer against Machine Learning Model Extraction Attacks.” Proc. of the 24th European Symposium on Research in Computer Security (ESORICS ’19), Luxembourg, Sept 2019, pp 66-83.
  3. H. Zheng, H. Hu and Han Ziyang. “Preserving User Privacy For Machine Learning: Local Differential Privacy or Federated Machine Learning?” Proc. of 1st International Workshop on Federated Machine Learning for User Privacy and Data Confidentiality (FML’19), in conjunction with IJCAI’19. (Best Theory Paper Award)
  4. L. Yao, X. Wang, X. Wang, H. Hu, and G. Wu. “Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.” Proc. of 20th IEEE International Conference on Mobile Data Management (MDM’19), Hong Kong SAR, China. (Best Paper Award)
  5. Q. Ye, H. Hu, X. Meng, and H. Zheng. “PrivKV: Key-Value Data Collection with Local Differential Privacy.” Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019, pp 311-325.
  6. M. Zhu, Q. Ye, X. Yang, X. Meng, and H. Hu. “AppPrivacy: Analyzing Data Collection and Privacy Leakage from Mobile App.” (poster) Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019.
  7. Y. Ji, C. Xu, J. Xu, H. Hu. “vABS: Towards Verifiable Attribute-Based Search over Shared Cloud Data.” (demo) Proc. of 35th IEEE International Conference on Data Engineering (ICDE ’19), Macau SAR, China, Apr. 2019, pp 2028-2031.

Peer-Reviewed Papers in 2018

  1. C. Liu, S. Zhou, H. Hu, Y. Tang, J. Guan, and Y. Ma. “CPP: Towards Comprehensive Privacy Preserving for Query Processing in Information Networks.” Information Sciences, Volume 467, October 2018, pages 296-311.
  2. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 30(4):630-644, Apr 2018.
  3. C. Xu, J. Xu, H. Hu, and M. H. Au. “When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.” Proc. of the 2018 ACM SIGMOD International Conference on Management of Data, Houston, USA, Jun 2018, pp 147-162.
  4. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” (poster) 34th IEEE International Conference on Data Engineering (ICDE ’18), Paris, France, Apr 2018.

Peer-Reviewed Papers in 2017

  1. Q. Zhu, H. Hu, C. Xu, J. Xu, and W. Lee. “Geo-Social Group Queries with Minimum Acquaintance Constraints”, The VLDB Journal, 26(5), 709-727, October 2017.
  2. X. Lin, J. Xu, H. Hu and Z. Fan, “Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowdsourcing”, IEEE Transactions on Knowledge and Data Engineering (TKDE), 29(10): 2290 – 2303, Oct. 2017.
  3. H. Hu, Q. Chen, J. Xu, and B. Choi, “Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure”, IEEE Transactions on Mobile Computing (TMC), 16(11): 3000-3013, November 2017.

Peer-Reviewed Papers in 2016

  1. Z. Zhao, Y. Cheung, H. Hu, and X. Wu, “Corrupted and Occluded Face Recognition via Cooperative Sparse Representation”, Pattern Recognition, Vol. 56, pp. 77-87, August 2016.
  2. L. Chen, J. Xu, X. Lin, C. S. Jensen, and H. Hu. “Answering Why-Not Spatial Keyword Top-k Queries via Keyword Adaption.” Proc. of the 32nd IEEE International Conference on Data Engineering (ICDE ’16), Helsinki, Finland, May 2016, pp 697-708.

Peer-Reviewed Papers in 2015

  1. S. Gao, J. Xu, T. Haerder, B. He, B. Choi, and H. Hu. “PCMLogging: Optimizing Transaction Logging and Recovery Performance with PCM.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(12):3332-3346, December 2015.
  2. X. Lin, J. Xu, and H. Hu. “Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(11): 3056-3069, Nov. 2015.
  3. Y. Li, R. Chen, J. Xu, Q. Huang, H. Hu, and B. Choi. “Geo-Social K-Cover Group Queries for Collaborative Spatial Computing.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(10):2729 – 2742, October, 2015 (spotlight paper).
  4. Z. Fan, B. Choi, Q. Chen, J. Xu, H. Hu and S. S. Bhowmick. “Structure-Preserving Subgraph Query Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(08): 2275-2290, August, 2015.
  5. Z. Zhao, Y. Cheung, H. Hu, X Wu. “Expanding Dictionary for Robust Face Recognition: Pixel Is Not Necessary While Sparsity Is.” IET Computer Vision, 9 (5), 648-654, 2015.
  6. Z. Chen, H. Hu, and J. Yu. “Privacy-Preserving Large-Scale Location Monitoring Using Bluetooth Low Energy.” Proc. of 11th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2015), Shenzhen, China, December 2015, pp 69-78.
  7. Q. Chen, H. Hu, and J. Xu. “Authenticated Online Data Integration Services.” Proc. of the 2015 ACM SIGMOD International Conference on Management of Data, pp 167-181.
  8. L. Chen, X. Lin, H. Hu, C. S. Jensen, and J. Xu. “Answering Why-not Questions on Spatial Keyword Top-k Queries.” Proc. the 31th IEEE International Conference on Data Engineering (ICDE ’15), Seoul, Korea, April 2015.
  9. Lu Wang, X. Meng, H. Hu, and J. Xu. “Bichromatic Reverse Nearest Neighbor Query without Information Leakage.” Proc. the 20th International Conference on Database Systems and Applications (DASFAA’15), Hanoi, Vietnam, April 2015.

Invited Papers and Tutorials

Q. Ye and H. Hu. “Local Differential Privacy: Tools, Challenges, and Opportunities.” 20th International Conference on Web Information Systems Engineering (WISE 2019), pp. 13-23.