Publications

Peer-reviewed Papers in 2024

  1. K. Huang, Y. Cui, Q. Ye, Y. Zhao, X. Zhao, Y. Tian, K. Zheng, H. Hu, and X. Zhou. “TED+: Towards Discovering Top-k Edge-Diversified Patterns in a Graph Database.” IEEE Transactions on Knowledge and Data Engineering (TKDE), Volume 36, Issue 5, May 2024, 2224-2238.
  2. L. Tang, Q. Ye, H. Hu, Q. Xue, and Y. Xiao. “DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.” ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 1, February 2024, 1-26.
  3. H. Yan, A. Yan, L. Hu, J. Liang, and H. Hu. “MTL-Leak: Privacy Risk Assessment in Multi-task Learning”. IEEE Transactions on Dependable and Secure Computing (TDSC), Volume: 21, Issue: 1, Jan.-Feb. 2024, pp. 204-215.
  4. J. Huang, T. Huang, H. Wei, J. Zhang, H. Yan, D. Wong, H. Hu. “zkChain: A Privacy-Preserving Model Based on zk-SNARKs and Hash Chain for Efficient Transfer of Assets.” Transactions on Emerging Telecommunications Technologies (ETT), Volume 35, Number 4, pp.e4709, 2024.
  5. X. Sun, Q. Ye, H. Hu, J. Duan, Q. Xue, T. Wo, J. Xu. “PUTS: Privacy-Preserving and Utility-Enhancing Framework for Trajectory Synthesization.” IEEE Transactions on Knowledge and Data Engineering (TKDE), Volume: 36, Issue: 1, January 2024, 296 – 310.
  6. F. Ye, L. Yang, H. Lu, H. Hu, and Y. Wang. “Enterprise performance online evaluation based on extended belief rule-base model.” Expert Systems with Applications, Volume 247, 1 August 2024, 123255.
  7. H. Yan, H. Hu, Q. Ye, and J. Xu. “Multi-hop Sanitizable Signature for Collaborative Edge Computing.” Journal of Computer Security, accepted to appear, 2024.
  8. J. Duan, Q. Ye, H. Hu, and X. Sun. “LDPTube: Theoretical Utility Benchmark and Enhancement for LDP Mechanisms in High-dimensional Space.” IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted to appear, 2024.
  9. X. Ran, Q. Ye, H. Hu, X. Huang, J. Xu, and J. Fu. “Differentially Private Graph Neural Networks for Link Prediction.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.
  10. Y. Mao, Q. Ye, H. Hu, Q. Wang, and K. Huang. “PrivShape: Extracting Shapes in Time Series under User-Level Local Differential Privacy.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.
  11. Y. Fu, Q. Ye, R. Du, and H. Hu. “Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.
  12. H. Wang, C. Xu, X. Chen, C. Zhang, H. Hu, S. Tian, Y. Yan, and J. Xu. “Authenticating Multi-Chain Queries: Verifiable Virtual Filesystem Is All You Need.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.
  13. C. Zhang, C. Xu, H. Hu, and J. Xu. “COLE: A Column-based Learned Storage for Blockchain Systems.” Proc. of the 22nd USENIX Conference on File and Storage Technologies (FAST ’24), Santa Clara, CA, USA, 2024.
  14. L. Wang, Q. Ye, H. Hu, X. Meng, and K. Huang. “LDP-Purifier: Defending Against Poisoning Attacks in Local Differential Privacy.” 29th International Conference on Database Systems for Advanced Applications (DASFAA), Gifu, Japan, July 2024.
  15. H. Yan, H. Hu, and Q. Ye. “Time-Specific Integrity Service in MQTT Protocol.” 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’ 24), Hong Kong, May 2024.
  16. K. Huang, G. Ouyang, Q. Ye, H. Hu, B. Zheng, X. Zhao, R. Zhang, X. Zhou. “LDPGuard: Defenses against Data Poisoning Attacks to Local Differential Privacy Protocols.” IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted to appear, 2024.
  17. L. Yang, F. Ye, H. Hu, H. Lu, Y. Wang, and W. Chang. “A data-driven rule-base approach for carbon emission trend forecast with environmental regulation and efficiency improvement.” Sustainable Production and Consumption, Volume:45, March 2024, pp. 316-332.
  18. J. Fu, Q. Ye, H. Hu, Z. Chen, L. Wang, K. Wang, X. Ran. “DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.” Proceedings of the VLDB Volume 17 (PVLDB ’24), Guangzhou, China, August 2024.
  19. X. Sun, Q. Ye, H. Hu, J. Duan, T. Wo, J. Xu, and R. Yang. “LDPRecover: Recovering Frequencies from Poisoning Attacks against Local Differential Privacy.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.
  20. K. Huang, Y. Li, Q. Ye, Y. Tian, X. Zhao, Y. Cui, H. Hu, X. Zhou. “FRESH: Towards Efficient Graph Queries in an Outsourced Graph.” Proc. of the 40th IEEE International Conference on Data Engineering (ICDE ’24), Utrecht, Netherlands, May 2024.

Peer-reviewed Papers in 2023

  1. L. Wang, Q. Ye, H. Hu, X Meng. “EPS: Privacy Preserving Set-Valued Data Analysis in the Shuffle Model.” IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted to appear, 2023.
  2. Y. Mao, Q. Ye, Q. Wang, H. Hu. “Utility-Aware Time Series Data Release with Anomalies under TLDP”. IEEE Transactions on Mobile Computing (TMC), accepted to appear, 2023.
  3. H. Yan, H. Hu, and Q. Ye. “Partial Message Verification in Fog-based Industrial Internet of Things.” Computers & Security, Volume 135, December 2023, 103530.
  4. Y. Fu, Q. Ye, R. Du, and H. Hu. “Collecting Multi-type and Correlation-Constrained Streaming Sensor Data with Local Differential Privacy.” ACM Transactions on Sensor Networks (TOSN), accepted to appear, 2023.
  5. L. Tang, Q. Ye, H. Hu, M. H. Au. “Secure Traffic Monitoring with Spatio-temporal Metadata Protection Using Oblivious RAM.” IEEE Transactions on Intelligent Transportation Systems, Volume: 24, Issue: 12, December 2023, pp. 14903 – 14913.
  6. T. Li, C. Fung, H. Wong, T. Chan, H. Hu. “Functional Subspace Variational Autoencoder for Domain-Adaptive Fault Diagnosis.” Mathematics 2023, 11(13), 2910.
  7. L. Yang, T. Ren, F. Ye, H. Hu, H. Wang, and H. Zheng. “Extended belief rule base with ensemble imbalanced learning for lymph node metastasis diagnosis in endometrial carcinoma.” Engineering Applications of Artificial Intelligence 126: 106950, 2023.
  8. X. Sun, Q. Ye, H. Hu, Y. Wang, K. Huang, T. Wo, J. Xu. “Synthesizing Realistic Trajectory Data With Differential Privacy.” IEEE Transactions on Intelligent Transportation, Volume: 24, Issue: 5, May 2023, pp. 5502 – 5515.
  9. L. Yang, T. Ren, H. Hu, F. Ye, and Y. Wang. “Extended belief rule base inference model based on clustering ensemble and activation factor.” Control and Decision, 2023, 38(3): 815-824.
  10. L. Yao, X. Wang, H. Hu, and G. Wu. “A Utility-aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment.” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted to appear, 2023.
  11. H. Yan, S. Li, Y. Wang, Y. Zhang, K. Sharif, H. Hu, and Y. Li. “Membership Inference Attacks against Deep Learning Models via Logits Distribution”. IEEE Transactions on Dependable and Secure Computing (TDSC), Volume: 20, Issue: 5, 01 Sept.-Oct. 2023.
  12. Q. Qian, Q. Ye, H. Hu, K. Huang, T. Chan, and J. Li. “Collaborative Sampling for Partial Multi-dimensional Value Collection under Local Differential Privacy.” IEEE Transactions on Information Forensics & Security (TIFS), Volume 18, 3948 – 3961, June 2023.
  13. G. Zhang, J. Zhang, Y. Liu, H. Hu, J. Lee, and V. Aggarwal. “Adaptive Video Streaming with Automatic Quality-of-Experience Optimization.” IEEE Transactions on Mobile Computing (TMC), Volume: 22, Issue: 8, 01 August 2023.
  14. Q. Xue, Q. Ye, H. Hu, Y. Zhu, and J. Wang. “DDRM: A Continual Frequency Estimation Mechanism with Local Differential Privacy.” IEEE Transactions on Knowledge and Data Engineering (TKDE), Volume: 35, Issue: 7, July 2023, pp. 6784-6797.
  15. Z. Han, H. Hu, and Q. Ye. “ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.” IEEE Transactions on Cloud Computing (TCC), Volume: 11, Issue: 2, 01 April 2023, pp. 1474-1486.
  16. N. Fu, W. Ni, H. Hu, and S. Zhang. “Multidimensional Grid-based Clustering with Local Differential Privacy.” Information Sciences, Volume 623, April 2023, pp. 402-420.
  17. Q. Ye, H. Hu, X. Meng, H. Zheng, K. Huang, C. Fang, and J. Shi. “PrivKVM*: Revisiting Key-Value Statistics Estimation with Local Differential Privacy.” IEEE Transactions on Dependable and Secure Computing (TDSC), Volume: 20, Issue: 1, Jan., pp 17-35, 2023.
  18. Y. Zhang, Q. Ye, R. Che, H. Hu, and Q. Han. “Trajectory Data Collection with Local Differential Privacy.” Proceedings of the VLDB Volume 16 (PVLDB ’23), Vancouver, Canada, August 2023.
  19. H. Tian, H. Hu, and Q. Ye. “CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.” IEEE International Conference on Big Data (IEEE BigData), Sorrento, Italy, December 2023.
  20. H. Li, Q. Ye, H. Hu, J. Li, L. Wang, C. Fang, J. Shi. “3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.” IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2023, pp. 1893-1907.
  21. R. Du, Q. Ye, Y. Fu, H. Hu, J. Li, C. Fang, and J. Shi. “Differential Aggregation against General Colluding Attackers”. Proc. of the 39th IEEE International Conference on Data Engineering (ICDE ’23), Anaheim, CA, USA, April 2023.
  22. X. Sun, Q. Ye, H. Hu, Y. Wang, T. Wo, J. Xu. Synthesizing Realistic Trajectory Data with Differential Privacy. IEEE Transactions on Intelligent Transportation Systems (T-ITS), accepted to appear, 2023.
  23. K. Huang, H. Hu, Q. Ye, K. Tian, B. Zheng, and X. Zhou. “TED: Towards Discovering Top-𝑘 Edge-Diversified Patterns in a Graph Database.” 2023 ACM SIGMOD International Conference on Management of Data, Seattle, Washington, USA, June 2023.
  24. Q. Ye, H. Hu, K. Huang, M. H. Au, and Q. Xue. “Stateful Switch: Optimized Time Series Release with Local Differential Privacy”. IEEE International Conference on Computer Communications (INFOCOM), New York, USA, May 2023.
  25. Y. Yan, Q. Ye, H. Hu, R. Chen, Q. Han, and L. Wang. “Towards Defending Against Byzantine LDP Amplified Gain Attacks.” 28th International Conference on Database Systems for Advanced Applications (DASFAA), Tianjin, China, Apr 2023.
  26. B. C. Singh, Q. Ye, H. Hu, and B. Xiao. “Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.” Future Generation Computer Systems, Volume 139, February 2023, Pages 210-223.
  27. G. Zhang, K. Liu, H. Hu, V. Aggarwal, and Y. B. Lee. “Post-Streaming Wastage Analysis – A Data Wastage Aware Framework in Mobile Video Streaming.” IEEE Transactions on Mobile Computing (TMC), 22(1) January 2023, 389 – 401.
  28. Z. Han, Q. Ye, and H. Hu. “OTKI-F: An Efficient Memory-secure Multi-keyword Fuzzy Search Protocol.” Journal of Computer Security, vol. 31, no. 2, pp. 129-152, 2023.
  29. G. Zhang, J. Zhang, K. Liu, J. Guo, J. Lee, H. Hu, and V. Aggarwal. “DUASVS: A Mobile Data Saving Strategy in Short-form Video Streaming.” IEEE Transactions on Services Computing (TSC), Volume: 16, Issue: 2, 01 March 2023, pp. 1066 – 1078.

Peer-reviewed Papers in 2022

  1. Y. Xiao, Q. Ye, H. Hu, H. Zheng, C. Fang, and J. Shi. “MExMI: Pool-based Active Model Extraction Crossover Membership Inference.” 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, USA.
  2. J. Duan, Q. Ye, and H. Hu. “Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space.” Proc. of the 38th IEEE International Conference on Data Engineering (ICDE ’22), Kuala Lumpur, Malaysia, May 2022.
  3. K. Huang, Q. Ye, J. Zhao, X. Zhao, H. Hu, X. Zhou. “VINCENT: towards efficient exploratory subgraph search in graph databases.” Proceedings of the VLDB Endowment 15 (12), 3634-3637, 2022.
  4. X. Yang, M. Liu, M. H. Au, X. Luo, Q. Ye. “Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications.” IEEE Transactions on Information Forensics and Security (TIFS), 17: 1573-1582, 2022.
  5. N. Fu, W. Ni, H. Hu, and S. Zhang. “Multidimensional Grid-based Clustering with Local Differential Privacy.” Information Sciences, accepted to appear, 2022.
  6. Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. “LF-GDPR: A Framework for Estimating Graph Metrics with Local Differential Privacy.” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol 34, Issue 10, pages 4905 – 4920, 2022.
  7. Z. Peng, J. Xu, H. Hu, and L. Chen. “BlockShare: A Blockchain Empowered System for Privacy-Preserving Verifiable Data Sharing.” Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, June 2022, pp.14-24.
  8. L. Tang, Q. Ye, H. Zheng, H. Hu, Z. Han, and N-F. Law. “Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System.” IEEE Internet of Things Journal, Volume: 9, Issue: 19, 19373 – 19386, October 2022.
  9. H. Yan, H. Hu, Q. Ye, and L. Tang. “SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.” IEEE Transactions on Network and Service Management (TNSM), Volume: 19, Issue: 3, Page(s): 3453 – 3464, September 2022.
  10. H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “Protecting Decision Boundary of Machine Learning Model with Differentially Private Perturbation.” IEEE Transactions on Dependable and Secure Computing (TDSC), 19(3), pp. 2007-2022, May 2022.
  11. X. Pan, S. Nie, H. Hu, P. Yu, J. Guo, and L. Wu. “Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services.” IEEE Transactions on Services Computing (TSC), 15(2), pp 986-999, 2022.
  12. Y. Fu, Q. Ye, R. Du, and H. Hu. “Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in A Privacy-preserving Way.” The 6th APWeb-WAIM International Joint Conference on Web and Big Data (APWeb-WAIM), accepted to appear, 2022.
  13. K. Huang, H. Hu, S. Zhou, Q. Ye, and J. Guan. “Privacy and Efficiency Guaranteed Social Subgraph Matching.” The VLDB Journal (VLDBJ), Volume 31, pages 581–602, 2022.
  14. L. Yao, Z. Chen, H. Hu, G. Wu, and B. Wu. “Privacy Preservation for Trajectory Publication Based on Differential Privacy.” ACM Transactions on Intelligent Systems and Technology (TIST), Vol. 13, No. 3, Article 42, April 2022.

Peer-reviewed Papers in 2021

  1. M. Zhu, Q. Ye, X. Meng, X. Yang. Privacy Risk Quantification of Mobile Application Based on Requested Permissions. SCIENTIA SICINA:Informationis, 51(7): 1100-1115, 2021.
  2. G. Zhang, J. Lee, K. Liu, H. Hu, and V. Aggarwal, “A Unified Framework for Flexible Playback Latency Control in Live Video Streaming.” IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume: 32, Issue: 12, Dec 2021, 3024-3037.
  3. G. Zhang, K. Liu, H. Hu, V. Aggarwal, and Y. B. Lee. “Post-Streaming Wastage Analysis – A Data Wastage Aware Framework in Mobile Video Streaming.” IEEE Transactions on Mobile Computing (TMC), accepted to appear, 2021.
  4. D. K. Mondal, B. C. Singh, H. Hu, S.Biswas, Z. Alom, M. A. Azim. “SeizeMaliciousURL: A Novel Learning Approach to Detect Malicious URLs.” Journal of Information Security and Applications, Volume 62:102967, September 2021. 
  5. B. C. Singh, Z. Alom, H. Hu, M. M. Rahman, M. K. Baowal, Z. Aung, M. A. Azim, and M. Ali. “Moni *COVID-19 Pandemic Outbreak in the Subcontinent: A data-driven analysis.” Journal of Personalized Medicine, 2021, 11(9), 889.
  6. L. Yang, F. Ye, J. Liu, Y. Wang, and H. Hu. “An improved fuzzy rule-based system using evidential reasoning and subtractive clustering for environmental investment prediction.” Fuzzy Sets and Systems, 421, 44-61, 2021.
  7. L. Yang, S. Wang, F. Ye, J. Liu, Y. Wang, and H. Hu. “Environmental investment prediction using extended belief rule-based system and evidential reasoning rule.” Journal of Cleaner Production, Volume 289, 20 March 2021, 125661.
  8. Z. Han and H. Hu. “ProDB: A memory-secure database using hardware enclave and practical oblivious RAM.” Information Systems, Volume 96, February 2021, 101681.
  9. Q. Ye, H. Hu, N. Li, X. Meng, H. Zheng, H. Yan. “Beyond Value Perturbation: Differential Privacy in the Temporal Setting.” Proc. of IEEE International Conference on Computer Communications (INFOCOM’21), Virtual, May 2021.
  10. R. Du, Q. Ye, Y. Fu, and H. Hu. “Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.” Proc. of 18th IEEE International Conference on Sensing, Communication and Networking (SECON), Virtual, 2021.
  11. G. Zhang, K. Liu, H. Hu, and Jing Guo. “Short Video Streaming with Data Wastage Awareness.” (Poster) Proc. of IEEE International Conference on Multimedia and Expo (ICME) 2021, Virtual, July 5-9.
  12. T. Wen, H. Hu, and H. Zheng. “An extraction attack on image recognition model using VAE-kdtree model.” Proc. SPIE 11766, International Workshop on Advanced Imaging Technology (IWAIT) 2021. (Best Paper Award).
  13. L. Yao, Z. Chen, H. Hu, G. Wu, and B. Wu. “Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.” Distributed and Parallel Databases, Volume 39, pages 785–811, 2021.

Peer-Reviewed Papers in 2020

  1. X. Yang, W. Law, Q. Ye, M. H. Au, J. Liu, J. Cheng. “Practical Escrow Protocol for Bitcoin.” IEEE Transactions on Information Forensics and Security (TIFS),15: 3023-3034, 2020.
  2. H. Zheng, H. Hu, and Z. Han. “Preserving User Privacy For Machine Learning: Local Differential Privacy or Federated Machine Learning?” IEEE Intelligent Systems, accepted to appear, 2020.
  3. X. Pan, S. Nie, H. Hu, P. Yu, J. Guo, and L. Wu. “Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services.” IEEE Transactions on Services Computing (TSC), accepted to appear, 2020.
  4. L. Tang and H. Hu. “OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors.” Proc. of 29th ACM International Conference on Information and Knowledge Management (CIKM ’20) October 19-23, 2020.
  5. Y. Fu, M. H. Au, R. Du, H. Hu and D. Li. “Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.” (poster) Proc. of 40th IEEE International Conference on Distributed Computing Systems (ICDCS ’20) July 8 – 10, 2020, Singapore.
  6. Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. “Towards Locally Differentially Private Generic Graph Metric Estimation.” Proc. of the 36th IEEE International Conference on Data Engineering (ICDE ’20), Dallas, USA, Apr. 2020, pp 1922-1925.

Peer-Reviewed Papers in 2019

  1. H. Zheng and H. Hu. “MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.” IEEE Transactions on Information Forensics and Security (TIFS), Volume 15, September 2019, 3137 – 3151.
  2. H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “A Boundary Differential Private Layer against Machine Learning Model Extraction Attacks.” Proc. of the 24th European Symposium on Research in Computer Security (ESORICS ’19), Luxembourg, Sept 2019, pp 66-83.
  3. H. Zheng, H. Hu and Han Ziyang. “Preserving User Privacy For Machine Learning: Local Differential Privacy or Federated Machine Learning?” Proc. of 1st International Workshop on Federated Machine Learning for User Privacy and Data Confidentiality (FML’19), in conjunction with IJCAI’19. (Best Theory Paper Award)
  4. L. Yao, X. Wang, X. Wang, H. Hu, and G. Wu. “Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.” Proc. of 20th IEEE International Conference on Mobile Data Management (MDM’19), Hong Kong SAR, China. (Best Paper Award)
  5. Q. Ye, H. Hu, X. Meng, and H. Zheng. “PrivKV: Key-Value Data Collection with Local Differential Privacy.” Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019, pp 311-325.
  6. N. Li, Q. Ye. Mobile Data Collection and Analysis with Local Differential Privacy. Proc. of 20th IEEE International Conference on Mobile Data Management (MDM), pp 4-7, 2019.
  7. M. Zhu, Q. Ye, X. Yang, X. Meng, and H. Hu. “AppPrivacy: Analyzing Data Collection and Privacy Leakage from Mobile App.” (poster) Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019.
  8. Y. Ji, C. Xu, J. Xu, H. Hu. “vABS: Towards Verifiable Attribute-Based Search over Shared Cloud Data.” (demo) Proc. of 35th IEEE International Conference on Data Engineering (ICDE ’19), Macau SAR, China, Apr. 2019, pp 2028-2031.

Peer-Reviewed Papers in 2018

  1. Q. Ye, X. Meng, M. Zhu, Z. Huo. Survey on Local Differential Privacy. Journal of Software, 29(7):1981-2005, 2018.
  2. C. Liu, S. Zhou, H. Hu, Y. Tang, J. Guan, and Y. Ma. “CPP: Towards Comprehensive Privacy Preserving for Query Processing in Information Networks.” Information Sciences, Volume 467, October 2018, pages 296-311.
  3. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 30(4):630-644, Apr 2018.
  4. C. Xu, J. Xu, H. Hu, and M. H. Au. “When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.” Proc. of the 2018 ACM SIGMOD International Conference on Management of Data, Houston, USA, Jun 2018, pp 147-162.
  5. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” (poster) 34th IEEE International Conference on Data Engineering (ICDE ’18), Paris, France, Apr 2018.

Peer-Reviewed Papers in 2017

  1. Q. Zhu, H. Hu, C. Xu, J. Xu, and W. Lee. “Geo-Social Group Queries with Minimum Acquaintance Constraints”, The VLDB Journal, 26(5), 709-727, October 2017.
  2. X. Lin, J. Xu, H. Hu and Z. Fan, “Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowdsourcing”, IEEE Transactions on Knowledge and Data Engineering (TKDE), 29(10): 2290 – 2303, Oct. 2017.
  3. H. Hu, Q. Chen, J. Xu, and B. Choi, “Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure”, IEEE Transactions on Mobile Computing (TMC), 16(11): 3000-3013, November 2017.

Peer-Reviewed Papers in 2016

  1. Q. Ye, L. Yang, Y. Fu, X. Chen. “A Classification Approach Based on Improved Belief Rule-Base Reasoning”. Journal of Frontiers of Computer Science and Technology, 2016, 10(5):709-721.
  2. Z. Zhao, Y. Cheung, H. Hu, and X. Wu, “Corrupted and Occluded Face Recognition via Cooperative Sparse Representation”, Pattern Recognition, Vol. 56, pp. 77-87, August 2016.
  3. L. Chen, J. Xu, X. Lin, C. S. Jensen, and H. Hu. “Answering Why-Not Spatial Keyword Top-k Queries via Keyword Adaption.” Proc. of the 32nd IEEE International Conference on Data Engineering (ICDE ’16), Helsinki, Finland, May 2016, pp 697-708.

Peer-Reviewed Papers in 2015

  1. S. Gao, J. Xu, T. Haerder, B. He, B. Choi, and H. Hu. “PCMLogging: Optimizing Transaction Logging and Recovery Performance with PCM.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(12):3332-3346, December 2015.
  2. X. Lin, J. Xu, and H. Hu. “Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(11): 3056-3069, Nov. 2015.
  3. Y. Li, R. Chen, J. Xu, Q. Huang, H. Hu, and B. Choi. “Geo-Social K-Cover Group Queries for Collaborative Spatial Computing.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(10):2729 – 2742, October, 2015 (spotlight paper).
  4. Z. Fan, B. Choi, Q. Chen, J. Xu, H. Hu and S. S. Bhowmick. “Structure-Preserving Subgraph Query Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(08): 2275-2290, August, 2015.
  5. Z. Zhao, Y. Cheung, H. Hu, X Wu. “Expanding Dictionary for Robust Face Recognition: Pixel Is Not Necessary While Sparsity Is.” IET Computer Vision, 9 (5), 648-654, 2015.
  6. Z. Chen, H. Hu, and J. Yu. “Privacy-Preserving Large-Scale Location Monitoring Using Bluetooth Low Energy.” Proc. of 11th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2015), Shenzhen, China, December 2015, pp 69-78.
  7. Q. Chen, H. Hu, and J. Xu. “Authenticated Online Data Integration Services.” Proc. of the 2015 ACM SIGMOD International Conference on Management of Data, pp 167-181.
  8. L. Chen, X. Lin, H. Hu, C. S. Jensen, and J. Xu. “Answering Why-not Questions on Spatial Keyword Top-k Queries.” Proc. the 31th IEEE International Conference on Data Engineering (ICDE ’15), Seoul, Korea, April 2015.
  9. Lu Wang, X. Meng, H. Hu, and J. Xu. “Bichromatic Reverse Nearest Neighbor Query without Information Leakage.” Proc. the 20th International Conference on Database Systems and Applications (DASFAA’15), Hanoi, Vietnam, April 2015.

Invited Papers and Tutorials

Q. Ye and H. Hu. “Local Differential Privacy: Tools, Challenges, and Opportunities.” 20th International Conference on Web Information Systems Engineering (WISE 2019), pp. 13-23.