Haibo Hu

Orcid: 0000-0002-9008-2112

Affiliations:
  • Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Kowloon
  • Hong Kong Baptist University, Kowloon Tong
  • Hong Kong University of Science and Technology


According to our database1, Haibo Hu authored at least 147 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EPS$^{2}$2: Privacy Preserving Set-Valued Data Analysis in the Shuffle Model.
IEEE Trans. Knowl. Data Eng., November, 2024

LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential Privacy Protocols.
IEEE Trans. Knowl. Data Eng., July, 2024

PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential Privacy.
Proc. VLDB Endow., July, 2024

Utility-Aware Time Series Data Release With Anomalies Under TLDP.
IEEE Trans. Mob. Comput., June, 2024

TED$^+$+: Towards Discovering Top-k Edge-Diversified Patterns in a Graph Database.
IEEE Trans. Knowl. Data Eng., May, 2024

zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.
Proc. VLDB Endow., February, 2024

PUTS: Privacy-Preserving and Utility-Enhancing Framework for Trajectory Synthesization.
IEEE Trans. Knowl. Data Eng., January, 2024

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur., 2024

The Design of a Non-Contact Inspection System Integrated With the Time of Flight-Based Flaw Detection (TOFFD) Criterion to Investigate the Structural Integrity of the Rail Track.
IEEE Trans. Instrum. Meas., 2024

Generating Location Traces With Semantic- Constrained Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment.
IEEE Trans. Dependable Secur. Comput., 2024

MTL-Leak: Privacy Risk Assessment in Multi-Task Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Enterprise performance online evaluation based on extended belief rule-base model.
Expert Syst. Appl., 2024

Differential Privacy for Time Series: A Survey.
IEEE Data Eng. Bull., 2024

New Paradigm of Adversarial Training: Breaking Inherent Trade-Off between Accuracy and Robustness via Dummy Classes.
CoRR, 2024

Alignment-Aware Model Extraction Attacks on Large Language Models.
CoRR, 2024

Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models.
CoRR, 2024

Time-Specific Integrity Service in MQTT Protocol.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024

LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Differentially Private Graph Neural Networks for Link Prediction.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

PrivShape: Extracting Shapes in Time Series Under User-Level Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

FRESH: Towards Efficient Graph Queries in an Outsourced Graph.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Interactive Trimming Against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

V2FS : A Verifiable Virtual Filesystem for Multi-Chain Query Authentication.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

COLE: A Column-based Learned Storage for Blockchain Systems.
Proceedings of the 22nd USENIX Conference on File and Storage Technologies, 2024

TSFool: Crafting Highly-Imperceptible Adversarial Time Series Through Multi-Objective Attack.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

LDP-Purifier: Defending against Poisoning Attacks in Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023

Partial message verification in fog-based industrial Internet of things.
Comput. Secur., December, 2023

Extended belief rule base with ensemble imbalanced learning for lymph node metastasis diagnosis in endometrial carcinoma.
Eng. Appl. Artif. Intell., November, 2023

Adaptive Video Streaming With Automatic Quality-of-Experience Optimization.
IEEE Trans. Mob. Comput., August, 2023

DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., July, 2023

Synthesizing Realistic Trajectory Data With Differential Privacy.
IEEE Trans. Intell. Transp. Syst., May, 2023

DUASVS: A Mobile Data Saving Strategy in Short-Form Video Streaming.
IEEE Trans. Serv. Comput., 2023

Post-Streaming Wastage Analysis - A Data Wastage Aware Framework in Mobile Video Streaming.
IEEE Trans. Mob. Comput., 2023

Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Membership Inference Attacks Against Deep Learning Models via Logits Distribution.
IEEE Trans. Dependable Secur. Comput., 2023

ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.
IEEE Trans. Cloud Comput., 2023

Trajectory Data Collection with Local Differential Privacy.
Proc. VLDB Endow., 2023

TED: Towards Discovering Top-k Edge-Diversified Patterns in a Graph Database.
Proc. ACM Manag. Data, 2023

An ensemble model for efficiency evaluation of enterprise performance based on evidential reasoning approach.
J. Intell. Fuzzy Syst., 2023

OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol.
J. Comput. Secur., 2023

Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Predicting Remaining Useful Life of Lithium-Ion Battery Using Extended Belief Rule Base Model.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023

Stateful Switch: Optimized Time Series Release with Local Differential Privacy.
Proceedings of the IEEE INFOCOM 2023, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Towards Defending Against Byzantine LDP Amplified Gain Attacks.
Proceedings of the Database Systems for Advanced Applications, 2023

CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Privacy and efficiency guaranteed social subgraph matching.
VLDB J., 2022

Reverse Nearest Neighbor Search in Semantic Trajectories for Location-Based Services.
IEEE Trans. Serv. Comput., 2022

SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.
IEEE Trans. Netw. Serv. Manag., 2022

LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2022

Privacy Preservation for Trajectory Publication Based on Differential Privacy.
ACM Trans. Intell. Syst. Technol., 2022

Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

VINCENT: Towards Efficient Exploratory Subgraph Search in Graph Databases.
Proc. VLDB Endow., 2022

Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System.
IEEE Internet Things J., 2022

BlockShare: A Blockchain Empowered System for Privacy-Preserving Verifiable Data Sharing.
IEEE Data Eng. Bull., 2022

MExMI: Pool-based Active Model Extraction Crossover Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
A Unified Framework for Flexible Playback Latency Control in Live Video Streaming.
IEEE Trans. Parallel Distributed Syst., 2021

SeizeMaliciousURL: A novel learning approach to detect malicious URLs.
J. Inf. Secur. Appl., 2021

ProDB: A memory-secure database using hardware enclave and practical oblivious RAM.
Inf. Syst., 2021

An improved fuzzy rule-based system using evidential reasoning and subtractive clustering for environmental investment prediction.
Fuzzy Sets Syst., 2021

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021

Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Short Video Streaming With Data Wastage Awareness.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020

Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning?
IEEE Intell. Syst., 2020

Towards Locally Differentially Private Generic Graph Metric Estimation.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup.
CoRR, 2019

Local Differential Privacy: Tools, Challenges, and Opportunities.
Proceedings of the Web Information Systems Engineering, 2019

PrivKV: Key-Value Data Collection with Local Differential Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

vABS: Towards Verifiable Attribute-Based Search Over Shared Cloud Data.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.
IEEE Trans. Knowl. Data Eng., 2018

CPP: Towards comprehensive privacy preserving for query processing in information networks.
Inf. Sci., 2018

When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018

Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
Geo-social group queries with minimum acquaintance constraints.
VLDB J., 2017

Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure.
IEEE Trans. Mob. Comput., 2017

Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2017

2016
Corrupted and occluded face recognition via cooperative sparse representation.
Pattern Recognit., 2016

Answering why-not spatial keyword top-k queries via keyword adaption.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Reverse Keyword Search for Spatio-Textual Top-$k$ Queries in Location-Based Services.
IEEE Trans. Knowl. Data Eng., 2015

Geo-Social K-Cover Group Queries for Collaborative Spatial Computing.
IEEE Trans. Knowl. Data Eng., 2015

PCMLogging: Optimizing Transaction Logging and Recovery Performance with PCM.
IEEE Trans. Knowl. Data Eng., 2015

Structure-Preserving Subgraph Query Services.
IEEE Trans. Knowl. Data Eng., 2015

Expanding dictionary for robust face recognition: pixel is not necessary while sparsity is.
IET Comput. Vis., 2015

Authenticated Online Data Integration Services.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Answering why-not questions on spatial keyword top-k queries.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Bichromatic Reverse Nearest Neighbor Query without Information Leakage.
Proceedings of the Database Systems for Advanced Applications, 2015

2014
Side-Effect Estimation: A Filtering Approach to the View Update Problem.
IEEE Trans. Knowl. Data Eng., 2014

Authenticating Location-Based Skyline Queries in Arbitrary Subspaces.
IEEE Trans. Knowl. Data Eng., 2014

A private DNA motif finding algorithm.
J. Biomed. Informatics, 2014

Geo-Social Group Queries with Minimum Acquaintance Constraint.
CoRR, 2014

Private search on key-value stores with hierarchical indexes.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

2013
Range-Based Skyline Queries in Mobile Environments.
IEEE Trans. Knowl. Data Eng., 2013

Incremental Maintenance of the Minimum Bisimulation of Cyclic Graphs.
IEEE Trans. Knowl. Data Eng., 2013

Optimizing Nonindexed Join Processing in Flash Storage-Based Systems.
IEEE Trans. Computers, 2013

Authenticating Top-k Queries in Location-based Services with Confidentiality.
Proc. VLDB Endow., 2013

Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks.
IEEE Pervasive Comput., 2013

Private proximity detection and monitoring with vicinity regions.
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Access, 2013

VERDICT: Privacy-preserving authentication of range queries in location-based services.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Online Learning towards Big Data Analysis in Health Informatics.
Proceedings of the Brain and Health Informatics - International Conference, 2013

2012
Flag Commit: Supporting Efficient Transaction Recovery in Flash-Based DBMSs.
IEEE Trans. Knowl. Data Eng., 2012

Authenticating location-based services without compromising location privacy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection.
Proceedings of the Database Systems for Advanced Applications, 2012

2011
Processing private queries over untrusted data cloud through privacy homomorphism.
Proceedings of the 27th International Conference on Data Engineering, 2011

Challenges in Managing and Mining Large, Heterogeneous Data.
Proceedings of the Database Systems for Advanced Applications, 2011

Report on the third international workshop on cloud datamanagement (CloudDB 2011).
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Authentication of location-based skyline queries.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

PCMLogging: reducing transaction logging overhead with PCM.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Privacy-Conscious Location-Based Queries in Mobile Environments.
IEEE Trans. Parallel Distributed Syst., 2010

2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services.
IEEE Trans. Parallel Distributed Syst., 2010

Privacy-aware location data publishing.
ACM Trans. Database Syst., 2010

PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.
IEEE Trans. Knowl. Data Eng., 2010

Flash-Optimized B+-Tree.
J. Comput. Sci. Technol., 2010

Data Engineering in Graph Databases.
Proceedings of the Computer and Information Sciences, 2010

DigestJoin: Expediting Joins on Solid-State Drives.
Proceedings of the Database Systems for Advanced Applications, 2010

StableBuffer: optimizing write performance for DBMS applications on flash devices.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Lazy-Update B+-Tree for Flash Devices.
Proceedings of the MDM 2009, 2009

DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins.
Proceedings of the MDM 2009, 2009

Non-Exposure Location Anonymity.
Proceedings of the 25th International Conference on Data Engineering, 2009

2007
iPDA: Supporting Privacy-Preserving Location-Based Mobile Services.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Clustering Moving Objects in Spatial Networks.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Range Nearest-Neighbor Query.
IEEE Trans. Knowl. Data Eng., 2006

Distance Indexing on Road Networks.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Fast Nearest Neighbor Search on Road Networks.
Proceedings of the Advances in Database Technology, 2006

2005
When location-based services meet databases.
Mob. Inf. Syst., 2005

Energy-Efficient Monitoring of Spatial Predicates over Moving Objects.
IEEE Data Eng. Bull., 2005

GAMMA: A Framework for Moving Object Simulation.
Proceedings of the Advances in Spatial and Temporal Databases, 9th International Symposium, 2005

A Generic Framework for Monitoring Continuous Spatial Queries over Moving Objects.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005

Proactive Caching for Spatial Queries in Mobile Environments.
Proceedings of the 21st International Conference on Data Engineering, 2005

2004
Adaptive Realtime Bandwidth Allocation for Wireless Data Delivery.
Wirel. Networks, 2004

Semantic Location Modeling for Location Navigation in Mobile Environment.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

2003
Adaptive Power-Aware Prefetching Schemes for Mobile Broadcast Environments.
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003

Towards Real-time Parallel Processing of Spatial Queries.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003


  Loading...