Publication

The following is a list of my publication by category (tabs are in the bottom). And you can find more information via:

Peer-Reviewed Journal Papers

  1. Q. Ye, H. Hu, X. Meng, H. Zheng, K. Huang, C. Fang, and J. Shi. “PrivKVM*: Revisiting Key-Value Statistics Estimation with Local Differential Privacy.” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted to appear, 2021.
  2. L. Yao, Z. Chen, H. Hu, G. Wu, and B. Wu. “Privacy Preservation for Trajectory Publication Based on Differential Privacy.” ACM Transactions on Intelligent Systems and Technology (TIST), accepted to appear, 2021.
  3. G. Zhang, J. Lee, K. Liu, H. Hu, and V. Aggarwal, “A Unified Framework for Flexible Playback Latency Control in Live Video Streaming.” IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted to appear, 2021.
  4. G. Zhang, K. Liu, H. Hu, V. Aggarwal, and Y. B. Lee. “Post-Streaming Wastage Analysis – A Data Wastage Aware Framework in Mobile Video Streaming.” IEEE Transactions on Mobile Computing (TMC), accepted to appear, 2021.
  5. L. Yang, F. Ye, J. Liu, Y. Wang, and H. Hu. “An improved fuzzy rule-based system using evidential reasoning and subtractive clustering for environmental investment prediction.” Fuzzy Sets and Systems, accepted to appear, 2021.
  6. L. Yang, S. Wang, F. Ye, J. Liu, Y. Wang, and H. Hu. “Environmental investment prediction using extended belief rule-based system and evidential reasoning rule.” Journal of Cleaner Production, Volume 289, 20 March 2021, 125661.
  7. Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. “LF-GDPR: Graph Metric Estimation with Local Differential Privacy.” IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted to appear, 2020.
  8. H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “Protecting Decision Boundary of Machine Learning Model with Differentially Private Perturbation.” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted to appear, 2020.
  9. Z. Han and H. Hu. “ProDB: A memory-secure database using hardware enclave and practical oblivious RAM.” Information Systems, Volume 96, February 2021, 101681.
  10. L. Yao, Z. Chen, H. Hu, G. Wu, and B. Wu. “Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.” Distributed and Parallel Databases, November 2020.
  11. H. Zheng, H. Hu, and Z. Han, “Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning?” IEEE Intelligent Systems. 35(4): pp 5-14, 2020.
  12. X. Pan, S. Nie, H. Hu, P. Yu, J. Guo, and L. Wu. “Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services.” IEEE Transactions on Services Computing (TSC), accepted to appear, 2020.
  13. H. Zheng and H. Hu. “MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping.” IEEE Transactions on Information Forensics and Security (TIFS), Volume 15, September 2019, 3137 – 3151.
  14. C. Liu, S. Zhou, H. Hu, Y. Tang, J. Guan, and Y. Ma. “CPP: Towards Comprehensive Privacy Preserving for Query Processing in Information Networks.” Information Sciences, Volume 467, October 2018, pages 296-311.
  15. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 30(4):630-644, Apr 2018.
  16. Q. Zhu, H. Hu, C. Xu, J. Xu, and W. Lee. “Geo-Social Group Queries with Minimum Acquaintance Constraints”, The VLDB Journal, 26(5), 709-727, October 2017.
  17. X. Lin, J. Xu, H. Hu and Z. Fan, “Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowdsourcing”, IEEE Transactions on Knowledge and Data Engineering (TKDE), 29(10): 2290 – 2303, Oct. 2017.
  18. H. Hu, Q. Chen, J. Xu, and B. Choi, “Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure”, IEEE Transactions on Mobile Computing (TMC), 16(11): 3000-3013, November 2017.
  19. Z. Zhao, Y. Cheung, H. Hu, and X. Wu, “Corrupted and Occluded Face Recognition via Cooperative Sparse Representation”, Pattern Recognition, Vol. 56, pp. 77-87, August 2016.
  20. S. Gao, J. Xu, T. Haerder, B. He, B. Choi, and H. Hu. “PCMLogging: Optimizing Transaction Logging and Recovery Performance with PCM.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(12):3332-3346, December 2015.
  21. X. Lin, J. Xu, and H. Hu. “Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(11): 3056-3069, Nov. 2015.
  22. Y. Li, R. Chen, J. Xu, Q. Huang, H. Hu, and B. Choi. “Geo-Social K-Cover Group Queries for Collaborative Spatial Computing.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(10):2729 – 2742, October, 2015 (spotlight paper).
  23. Z. Fan, B. Choi, Q. Chen, J. Xu, H. Hu and S. S. Bhowmick. “Structure-Preserving Subgraph Query Services.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 27(08): 2275-2290, August, 2015.
  24. Z. Zhao, Y. Cheung, H. Hu, X Wu. “Expanding Dictionary for Robust Face Recognition: Pixel Is Not Necessary While Sparsity Is.” IET Computer Vision, 9 (5), 648-654, 2015.
  25. R. Chen, Y. Peng, B. Choi, J. Xu, and H. Hu. “A private DNA Motif Finding Algorithm.” Journal of Biomedical Informatics (JBI), 50: 122-132, 2014.
  26. Y. Peng, B. Choi, J. Xu, H. Hu, and S. S. Bhowmick. “Side-Effect Estimation: A Filtering Approach to the View Update Problem.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(9): 2307 – 2322, August, 2014.
  27. X. Lin, J. Xu, H. Hu, and W.-C. Lee. “Authenticating Location-Based Skyline Queries in Arbitrary Subspaces.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(6): 1479-1493, June 2014.
  28. J. Deng, B. Choi, J. Xu, H. Hu, and S. S. Bhowmick. “Incremental Maintenance of the Minimum Bisimulation of Cyclic Graphs.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 25(11): 2536 – 2550, Nov 2013.
  29. X. Lin, J. Xu, and H. Hu. “Range-based Skyline Queries in Mobile Environments.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 25(4): 835-849, April 2013.
  30. Y. Li, S. T. On, J. Xu, B. Choi, and H. Hu. “Optimizing Non-Indexed Join Processing in Flash Storage-Based Systems.” IEEE Transactions on Computers (TC), 62(7): 1417-1431, July 2013.
  31. H. Li, H. Hu, J. Xu. “Nearby Friend Alert: Location Anonymity in Mobile Geo-Social Networks”. IEEE Pervasive Computing, 12(4): 62-70, 2013.
  32. S. T. On, J. Xu, B. Choi, H. Hu, and B. He. “Flag Commit: Supporting Efficient Transaction Recovery in Flash-based DBMSs.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 24(9): 1624-1639, Sept 2012.
  33. H. Hu, J. Xu, S. T. On, J. Du, and K. Y. Ng. “Privacy-Aware Location Data Publishing”. ACM Transactions on Database Systems (TODS), 35(3), July 2010.
  34. H. Hu and J. Xu. “2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services.” IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(10): 1458-1472, October 2010 (spotlight paper).
  35. H. Hu, J. Xu and D. L. Lee. “PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.” IEEE Transactions on Data and Knowledge Engineering (TKDE), 22(3): 404-419, March 2010.
  36. J. Xu, X. Tang, H. Hu and J. Du. “Privacy-Conscious Location-Based Queries in Mobile Environments.” IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(3): 313-326, March 2010.
  37. S. T. On, H. Hu, Y. Li, and J. Xu. “Flash-Optimized B+-Tree.” Journal of Computer Science and Technology (JCST), 25(3): 509-522, 2010.
  38. H. Hu and D. L. Lee. “Range Nearest Neighbor Query.” IEEE Transactions on Data and Knowledge Engineering (TKDE), 18(1): 78-91, 2006.
  39. H. Hu and D. L. Lee. “Energy-Efficient Monitoring of Spatial Predicates over Moving Objects.” IEEE Data Engineering Bulletin, 28(3): 19-26 (2005)
  40. D. L. Lee, M. Zhu and H. Hu. “When location-based services meet databases.” Mobile Information System, Volume 1, Number 2, 2005.
  41. C.-W. Lin, H. Hu and D. L. Lee. “Adaptive realtime bandwidth allocation for wireless data delivery.” ACM/Kluwer Journal of Wireless Networks (WINET), 10(2), 103-120, March 2004.

Peer-Reviewed Conference Papers

  1. Q. Ye, H. Hu, N. Li, X. Meng, H. Zheng, H. Yan. “Beyond Value Perturbation: Differential Privacy in the Temporal Setting.” Proc. of IEEE International Conference on Computer Communications (INFOCOM’21), May 2021.
  2. R. Du, Q. Ye, Y. Fu, and H. Hu. “Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.” Proc. of 18th IEEE International Conference on Sensing, Communication and Networking (SECON), accepted to appear, 2021.
  3. G. Zhang, K. Liu, H. Hu, and Jing Guo. “Short Video Streaming with Data Wastage Awareness.” (Poster) Proc. of IEEE International Conference on Multimedia and Expo (ICME) 2021, July 5-9.
  4. T. Wen, H. Hu, and H. Zheng. “An extraction attack on image recognition model using VAE-kdtree model.” Proc. SPIE 11766, International Workshop on Advanced Imaging Technology (IWAIT) 2021. (Best Paper Award)
  5. L. Tang and H. Hu. “OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors.” 29th ACM International Conference on Information and Knowledge Management (CIKM ’20), Oct 19-23, 2020, Online, pp 1425–1434.
  6. Y. Fu, M. H. Au, R. Du, H. Hu and D. Li. Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers (poster) Proc. of 40th IEEE International Conference on Distributed Computing Systems (ICDCS ’20) July 8 – 10, 2020, Singapore.
  7. Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. Towards Locally Differentially Private Generic Graph Metric Estimation. Proc. of the 36th IEEE International Conference on Data Engineering (ICDE ’20), Dallas, USA, Apr. 2020, pp 1922-1925.
  8. H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “A Boundary Differential Private Layer against Machine Learning Model Extraction Attacks.” Proc. of the 24th European Symposium on Research in Computer Security (ESORICS ’19), Luxembourg, Sept 2019, pp 66-83.
  9. H. Zheng, H. Hu and Han Ziyang. “Preserving User Privacy For Machine Learning: Local Differential Privacy or Federated Machine Learning?” Proc. of 1st International Workshop on Federated Machine Learning for User Privacy and Data Confidentiality (FML’19), in conjunction with IJCAI’19. (Best Theory Paper Award)
  10. L. Yao, X. Wang, X. Wang, H. Hu, and G. Wu. “Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.” Proc. of 20th IEEE International Conference on Mobile Data Management (MDM’19), Hong Kong SAR, China. (Best Paper Award)
  11. Q. Ye, H. Hu, X. Meng, and H. Zheng. “PrivKV: Key-Value Data Collection with Local Differential Privacy.” Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019, pp 311-325.
  12. M. Zhu, Q. Ye, X. Yang, X. Meng, and H. Hu. “AppPrivacy: Analyzing Data Collection and Privacy Leakage from Mobile App.” (poster) Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA, May 2019.
  13. Y. Ji, C. Xu, J. Xu, H. Hu. “vABS: Towards Verifiable Attribute-Based Search over Shared Cloud Data.” (demo) Proc. of 35th IEEE International Conference on Data Engineering (ICDE ’19), Macau SAR, China, Apr. 2019, pp 2028-2031.
  14. C. Xu, J. Xu, H. Hu, and M. H. Au. “When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.” Proc. of the 2018 ACM SIGMOD International Conference on Management of Data, Houston, USA, Jun 2018, pp 147-162.
  15. C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued Data with Confidentiality.” (poster) 34th IEEE International Conference on Data Engineering (ICDE ’18), Paris, France, Apr 2018.
  16. L. Chen, J. Xu, X. Lin, C. S. Jensen, and H. Hu. “Answering Why-Not Spatial Keyword Top-k Queries via Keyword Adaption.” Proc. of the 32nd IEEE International Conference on Data Engineering (ICDE ’16), Helsinki, Finland, May 2016, pp 697-708.
  17. Z. Chen, H. Hu, and J. Yu. “Privacy-Preserving Large-Scale Location Monitoring Using Bluetooth Low Energy.” Proc. of 11th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2015), Shenzhen, China, December 2015, pp 69-78.
  18. Q. Chen, H. Hu, and J. Xu. “Authenticated Online Data Integration Services.” Proc. of the 2015 ACM SIGMOD International Conference on Management of Data, pp 167-181.
  19. L. Chen, X. Lin, H. Hu, C. S. Jensen, and J. Xu. “Answering Why-not Questions on Spatial Keyword Top-k Queries.” Proc. the 31th IEEE International Conference on Data Engineering (ICDE ’15), Seoul, Korea, April 2015.
  20. Lu Wang, X. Meng, H. Hu, and J. Xu. “Bichromatic Reverse Nearest Neighbor Query without Information Leakage.” Proc. the 20th International Conference on Database Systems and Applications (DASFAA’15), Hanoi, Vietnam, April 2015.
  21. H. Hu, J. Xu, X. Xu, K. Pei, B. Choi, and S. Zhou. “Private Search on Key-Value Stores with Hierarchical Indexes”, Proc. of the 30th IEEE International Conference on Data Engineering (ICDE ’14), Chicago, IL, USA, April 2014, pp 628-639.
  22. Q. Chen, H. Hu, and J. Xu. “Authenticating Top-k Queries in Location-based Services with Confidentiality.” Proc. of the VLDB Endowment (PVLDB ’14), 49-60.
  23. H. Hu, Q. Chen, and J. Xu. “VERDICT: Privacy-Preserving Authentication of Range Queries in Location-based Services” Proc. of the 29th IEEE International Conference on Data Engineering (ICDE ’13), demo paper, 1312 – 1315.
  24. X. Lin, H. Hu, H. P. Li, J. Xu, and B. Choi. “Private Proximity Detection and Monitoring with Vicinity Regions.” Proceedings of 12th International ACM SIGMOD Workshop on Data Engineering for Wireless and Mobile Access (MobiDE ’13), pp. 5-12, New York, June 2013.
  25. Jing Wang, Zhong-Qiu Zhao, Xuegang Hu, Yiu-ming Cheung, and Haibo Hu. “Online Learning Towards Big Data Analysis in Health Informatics”. The 2013 International Conference on Brain and Health Informatics, Special Session on Intelligent Healthcare Data Analytics.
  26. H. Hu, J. Xu, Q. Chen, and Z. Yang. “Authenticating Location-based Services without Compromising Privacy.” Proc. of the 2012 ACM SIGMOD International Conference on Management of Data, pp. 301 – 312.
  27. Z. Huo, X. Meng, H. Hu, and Y. Huang. “You Can Walk Alone: Trajectory Privacy-preserving through Significant Stays Protection.” Proc. of the 17th International Conference on Database Systems for Advanced Applications (DASFAA ’12), pp. 351 – 366.
  28. H. Hu, J. Xu, C. Ren, and B. Choi. “Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism.” Proc. of the 27th IEEE International Conference on Data Engineering (ICDE ’11), pp. 601 – 612.
  29. X. Lin, J. Xu, and H. Hu. “Authentication of Location-based Skyline Queries.” Proc. of the 20th ACM Conference on Information and Knowledge Management (CIKM ’11), pp. 1583 – 1588.
  30. S. Gao, J. Xu, B. He, B. Choi, and H. Hu. “PCMLogging: Reducing Transaction Logging Overhead with PCM.” Proc. of the 20th ACM Conference on Information and Knowledge Management (CIKM ’11), poster.
  31. Y. Li, J. Xu, B. Choi, and H. Hu. “StableBuffer: Optimizing Write Performance for DBMS Applications on Flash Devices.” Proc. the 19th ACM International Conference on Information and Knowledge Management (CIKM ’10), Toronto, Canada, October 2010.
  32. S. Gao, Y. Li, J. Xu, B. Choi, and H. Hu: “DigestJoin: Expediting Joins on Solid-State Drives.” DASFAA 2010: 428-431.
  33. H. Hu and J. Xu. “Non-Exposure Location Anonymity.” Proc. the 25th IEEE Int. Conf. on Data Engineering (ICDE ’09), Shanghai, China, pp. 1120-1131.
  34. Y. Li, S. T. On, J. Xu, B. Choi, and H. Hu. “DigestJoin: Exploiting Fast Random Reads for Flash-based Joins.” Proc. the 10th International Conference on Mobile Data Management (MDM ’09), Taipei, Taiwan, May 2009.
  35. S. T. On, H. Hu, Y. Li, and J. Xu. “Lazy-Update B+-Tree for Flash Devices.” Proc. the 10th International Conference on Mobile Data Management (MDM ’09), Taipei, Taiwan, May 2009.
  36. J. Du, J. Xu, X. Tang, and H. Hu. “iPDA: Supporting Privacy-Preserving Location-Based Mobile Services.” Proc. the 8th Int. Conf. on Mobile Data Management (MDM ’07), Mannheim, Germany, May 2007. (Demo)
  37. Chen, C. Lai, X. Meng, J. Xu, and H. Hu. “Clustering Moving Objects in Spatial Networks.” Proc. the 12th Int. Conf. on Database Systems for Advanced Applications (DASFAA ’07), Bangkok, Thailand, April 2007.
  38. H. Hu and D. L. Lee. “Distance Indexing on Road Networks” Proc. of the 32th International Conference on Very Large Data Bases, Seoul, Korea, 2006, pp. 894-905.
  39. H. Hu, D. L. Lee and J. Xu. “Fast Nearest Neighbor Search on Road Networks” Proc. of the 10th Int. Conf. on Extending Database Technology (EDBT’06), 186-203,Munich, Germany, 2006.
  40. H. Hu, J. Xu and D. L. Lee. “A Generic Framework for Monitoring Continuous Spatial Queries over Moving Objects” Proc. of the 24th ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, 2005, pp. 479-490.
  41. H. Hu, J. Xu, W. S. Wong, B. Zheng and D. L. Lee. “Proactive Caching for Spatial Queries in Mobile Environments.” Proc. of the 21th IEEE International Conference on Data Engineering (ICDE ’05), Tokyo, Japan, pp. 403-414.
  42. H. Hu and D. L. Lee. “GAMMA: A Framework for Moving Object Simulation.” Proc. of 9th Int. Symp. on Spatial and Temporal Databases (SSTD’05), Angra dos Reis, Brazil, pp. 37-54.
  43. H. Hu and D. L. Lee. “Semantic Location Modeling for Location Navigation in Mobile Environment.” Proc. of the 5th Int. Conf. on Mobile Data Management (MDM ’04), Berkeley, California, USA, 2004, pp. 52-61.
  44. H. Hu, M. Zhu and D. L. Lee. “Towards Real-time Parallel Processing of Spatial Queries.” Proc. of the Int. Conf. on Parallel Processing (ICPP ’03), Kaohsiung, Taiwan, 2003, pp. 565-572.
  45. H. Hu, J. Xu and D. L. Lee. “Adaptive Power-Aware Prefetching Schemes for Mobile Environments.” Proc. of the 4th Int. Conf. on Mobile Data Management (MDM ’03), Melbourne, Australia, Jan. 2003, Springer-Verlag LNCS, vol. 2574, pp. 374-380.

Invited Papers and Tutorials

  1. Q. Ye and H. Hu. “Local Differential Privacy: Tools, Challenges, and Opportunities.” 20th International Conference on Web Information Systems Engineering (WISE 2019), pp. 13-23.

Book Chapters

  1. Shuigeng Zhou, W. Qian, H. Hu (Eds.) Proceedings of the Second International Workshop on Data Management for Emerging Network Infrastructures (DaMEN 2013), Springer, April 2013.
  2. C. S. Jensen, H. Hu and D. Wu (Eds.). Proceedings of the First International Workshop on Next-Generation Location-Based Services (LBS n.0), IEEE, June 2013.
  3. H. Hu, H. Wang, B. Zheng: Challenges in Managing and Mining Large, Heterogeneous Data. DASFAA (2) 2011: 462.
  4. A. Zhou, Y. Ishikawa, H. Hu and W. Qian (Eds.) Proceedings of the First International Workshop on Data Management for Emerging Network Infrastructures (DaMEN 2011), Springer, 2011.
  5. X. Meng, Z. Ding and H. Hu (Eds.) Proceedings of the Third International Workshop on Cloud Data Management (CloudDB 2011), ACM, 2011.
  6. H. Hu, J. Zhou, J. Xu and K. Y. Ng. “Positioning and Privacy in Location-based Services.” Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies. Wen-Chen Hu and Yanjun Zuo, Eds., IGI Global, 2010.
  7. H. Hu, J. Xu, and X. Tang. “Energy Efficient Sensor Data Management.” Sensor Network and Configuration: Fundamentals, Standards, Platforms, and Experiments. N. P. Mahalik et al, the Springer-Verlag Publishing, Germany, 2007.
  8. J. Xu, H. Hu, X. Tang, and B. Zheng. “Mobile Cache Management.” Wireless Information Highways, D. Katsaros, A. Nanopoulos, and Y. Manolopoulos, Eds., Idea Group Publishing, 2005.