Hong Zhu
Orcid: 0000-0003-2943-7997Affiliations:
- Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
According to our database1,
Hong Zhu
authored at least 71 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Collaborative-Enhanced Prediction of Spending on Newly Downloaded Mobile Games under Consumption Uncertainty.
Dataset, March, 2024
Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving.
Inf. Sci., January, 2024
Efficient and Deployable Knowledge Infusion for Open-World Recommendations via Large Language Models.
CoRR, 2024
CoRR, 2024
Collaborative-Enhanced Prediction of Spending on Newly Downloaded Mobile Games under Consumption Uncertainty.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Towards Open-World Recommendation with Knowledge Augmentation from Large Language Models.
Proceedings of the 18th ACM Conference on Recommender Systems, 2024
2023
Trans. Recomm. Syst., March, 2023
IEEE Trans. Ind. Electron., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Neural Comput. Appl., 2022
Improving Out-of-Distribution Generalization by Adversarial Training with Structured Priors.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Regularization Penalty Optimization for Addressing Data Quality Variance in OoD Algorithms.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
An effective and efficient fuzzy approach for managing natural noise in recommender systems.
Inf. Sci., 2021
Non-invasive Self-attention for Side Information Fusion in Sequential Recommendation.
CoRR, 2021
IEEE Access, 2021
Proceedings of the RecSys '21: Fifteenth ACM Conference on Recommender Systems, Amsterdam, The Netherlands, 27 September 2021, 2021
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020
Proceedings of the RecSys 2020: Fourteenth ACM Conference on Recommender Systems, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release.
IEEE Access, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 3rd International Conference on High Performance Compilation, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud.
Inf. Sci., 2018
2017
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service.
Frontiers Comput. Sci., 2017
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017
Proceedings of the Computational Intelligence and Intelligent Systems, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Secur. Commun. Networks, 2016
Knowl. Based Syst., 2016
Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2016
Int. Arab J. Inf. Technol., 2016
Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Database and Expert Systems Applications, 2016
2015
Secur. Commun. Networks, 2015
Comput. Sci. Inf. Syst., 2015
Comput. J., 2015
2014
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Proceedings of the 2nd International Conference on Systems and Informatics, 2014
Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
2013
Secur. Commun. Networks, 2013
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
Proceedings of the Ninth International Conference on Natural Computation, 2013
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2010
J. Zhejiang Univ. Sci. C, 2010
2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the 12th International Database Engineering and Applications Symposium (IDEAS 2008), 2008
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007
Proceedings of the Data Management. Data, 2007
2006
J. Comput. Inf. Technol., 2006
An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006