Haibo Hu
Orcid: 0000-0002-9008-2112Affiliations:
- Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Kowloon
- Hong Kong Baptist University, Kowloon Tong
- Hong Kong University of Science and Technology
According to our database1,
Haibo Hu
authored at least 147 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on haibohu.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential Privacy Protocols.
IEEE Trans. Knowl. Data Eng., July, 2024
PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential Privacy.
Proc. VLDB Endow., July, 2024
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024
DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.
Proc. VLDB Endow., February, 2024
PUTS: Privacy-Preserving and Utility-Enhancing Framework for Trajectory Synthesization.
IEEE Trans. Knowl. Data Eng., January, 2024
ACM Trans. Priv. Secur., 2024
The Design of a Non-Contact Inspection System Integrated With the Time of Flight-Based Flaw Detection (TOFFD) Criterion to Investigate the Structural Integrity of the Rail Track.
IEEE Trans. Instrum. Meas., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Expert Syst. Appl., 2024
New Paradigm of Adversarial Training: Breaking Inherent Trade-Off between Accuracy and Robustness via Dummy Classes.
CoRR, 2024
Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models.
CoRR, 2024
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024
LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
PrivShape: Extracting Shapes in Time Series Under User-Level Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Interactive Trimming Against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 22nd USENIX Conference on File and Storage Technologies, 2024
TSFool: Crafting Highly-Imperceptible Adversarial Time Series Through Multi-Objective Attack.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the Database Systems for Advanced Applications, 2024
2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023
Comput. Secur., December, 2023
Extended belief rule base with ensemble imbalanced learning for lymph node metastasis diagnosis in endometrial carcinoma.
Eng. Appl. Artif. Intell., November, 2023
IEEE Trans. Mob. Comput., August, 2023
IEEE Trans. Knowl. Data Eng., July, 2023
IEEE Trans. Intell. Transp. Syst., May, 2023
IEEE Trans. Serv. Comput., 2023
Post-Streaming Wastage Analysis - A Data Wastage Aware Framework in Mobile Video Streaming.
IEEE Trans. Mob. Comput., 2023
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.
IEEE Trans. Cloud Comput., 2023
Proc. ACM Manag. Data, 2023
An ensemble model for efficiency evaluation of enterprise performance based on evidential reasoning approach.
J. Intell. Fuzzy Syst., 2023
J. Comput. Secur., 2023
Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Predicting Remaining Useful Life of Lithium-Ion Battery Using Extended Belief Rule Base Model.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Reverse Nearest Neighbor Search in Semantic Trajectories for Location-Based Services.
IEEE Trans. Serv. Comput., 2022
SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Knowl. Data Eng., 2022
ACM Trans. Intell. Syst. Technol., 2022
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022
Proc. VLDB Endow., 2022
Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System.
IEEE Internet Things J., 2022
BlockShare: A Blockchain Empowered System for Privacy-Preserving Verifiable Data Sharing.
IEEE Data Eng. Bull., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
J. Inf. Secur. Appl., 2021
Inf. Syst., 2021
An improved fuzzy rule-based system using evidential reasoning and subtractive clustering for environmental investment prediction.
Fuzzy Sets Syst., 2021
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021
Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
2020
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020
Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning?
IEEE Intell. Syst., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
2019
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup.
CoRR, 2019
Proceedings of the Web Information Systems Engineering, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
CPP: Towards comprehensive privacy preserving for query processing in information networks.
Inf. Sci., 2018
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
2017
Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure.
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Knowl. Data Eng., 2017
2016
Pattern Recognit., 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
2015
Reverse Keyword Search for Spatio-Textual Top-$k$ Queries in Location-Based Services.
IEEE Trans. Knowl. Data Eng., 2015
IEEE Trans. Knowl. Data Eng., 2015
IEEE Trans. Knowl. Data Eng., 2015
Expanding dictionary for robust face recognition: pixel is not necessary while sparsity is.
IET Comput. Vis., 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the Database Systems for Advanced Applications, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Knowl. Data Eng., 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Computers, 2013
Proc. VLDB Endow., 2013
IEEE Pervasive Comput., 2013
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Access, 2013
VERDICT: Privacy-preserving authentication of range queries in location-based services.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Brain and Health Informatics - International Conference, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012
You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection.
Proceedings of the Database Systems for Advanced Applications, 2012
2011
Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the Database Systems for Advanced Applications, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
IEEE Trans. Parallel Distributed Syst., 2010
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.
IEEE Trans. Knowl. Data Eng., 2010
Proceedings of the Computer and Information Sciences, 2010
Proceedings of the Database Systems for Advanced Applications, 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
2009
Proceedings of the MDM 2009, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the Advances in Databases: Concepts, 2007
2006
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006
Proceedings of the Advances in Database Technology, 2006
2005
IEEE Data Eng. Bull., 2005
Proceedings of the Advances in Spatial and Temporal Databases, 9th International Symposium, 2005
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
2004
Wirel. Networks, 2004
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004
2003
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003