The following is a list of my publication by type. You can find more information via:
Peer-Reviewed Journal Papers |
1.
B. C. Singh, Q. Ye, H. Hu, and B. Xiao.
“Efficient and lightweight indexing approach for multi-dimensional historical
data in blockchain.” Future Generation Computer Systems, Volume 139,
February 2023, Pages 210-223. |
2.
G. Zhang, K. Liu, H. Hu, V. Aggarwal,
and Y. B. Lee. “Post-Streaming Wastage Analysis – A Data Wastage Aware Framework
in Mobile Video Streaming.” IEEE Transactions
on Mobile Computing (TMC), 22(1) January 2023, 389 – 401. |
3.
H. Yan, S. Li, Y. Wang, Y. Zhang, K. Sharif,
H. Hu,
and Y. Li. “Membership Inference Attacks against Deep Learning Models via
Logits Distribution”. IEEE Transactions on Dependable and Secure Computing
(TDSC), accepted to appear, 2022. |
4.
N. Fu, W. Ni, H. Hu, and S. Zhang. “Multidimensional
Grid-based Clustering with Local Differential Privacy.” Information
Sciences, accepted to appear, 2022. |
5.
Q. Xue, Q. Ye, H.
Hu, Y.
Zhu, and J. Wang. “DDRM: A Continual Frequency Estimation Mechanism with
Local Differential Privacy.” IEEE Transactions on Knowledge and Data
Engineering (TKDE), accepted to appear, 2022. |
6.
T. Huang, J. Huang, H. Wei, J. Zhang, H. Yan,
D. Wong, H. Hu. “zkChain: A
Privacy-Preserving Model Based on zk-SNARKs and
Hash Chain for Efficient Transfer of Assets.” Transactions on Emerging
Telecommunications Technologies (ETT), accepted to appear, 2022. |
7.
Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao.
“LF-GDPR: A Framework for Estimating Graph Metrics with Local Differential
Privacy.” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol
34, Issue 10, pages 4905 – 4920, 2022. |
8.
Z. Han, Q. Ye, and H. Hu. “OTKI-F:
An Efficient Memory-secure Multi-keyword Fuzzy Search Protocol.” Journal
of Computer Security, accepted to appear, 2022. |
9.
Z. Peng, J. Xu, H. Hu, and L. Chen. “BlockShare: A Blockchain Empowered System for Privacy-Preserving
Verifiable Data Sharing.” Bulletin of the IEEE Computer Society Technical
Committee on Data Engineering, June 2022, pp.14-24. |
10.
G. Zhang, J. Zhang, Y. Liu, H. Hu, J. Lee,
and V. Aggarwal. “Adaptive Video Streaming with Automatic
Quality-of-Experience Optimization.” IEEE Transactions on Mobile Computing
(TMC), accepted to appear, 2022. |
11.
L. Tang, Q. Ye, H. Zheng, H. Hu, Z. Han, and
N-F. Law. “Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution
Video Surveillance System.” IEEE Internet of Things Journal, Volume:
9, Issue: 19, 19373 – 19386, October 2022. |
12.
H. Yan, H. Hu, Q. Ye, and L. Tang. “SPMAC:
Scalable Prefix Verifiable Message Authentication Code for Internet of Things.”
IEEE Transactions on Network and Service Management (TNSM), Volume:
19, Issue: 3, Page(s): 3453 – 3464, September 2022. |
13.
G. Zhang, J. Zhang, K. Liu, J. Guo, J.
Lee, H. Hu,
and V. Aggarwal. “DUASVS: A Mobile Data Saving Strategy in Short-form Video
Streaming.” IEEE Transactions on Services Computing (TSC), accepted to
appear, 2022. |
14.
H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi. “Protecting
Decision Boundary of Machine Learning Model with Differentially Private Perturbation.”
IEEE Transactions on Dependable and Secure Computing (TDSC), 19(3),
pp. 2007-2022, May
2022. |
15.
X. Pan, S. Nie,
H. Hu,
P. Yu, J. Guo, and L. Wu. “Reverse Nearest Neighbor Search in Semantic
Trajectories for Location based Services.” IEEE Transactions on Services Computing (TSC), 15(2), pp 986-999, 2022. |
16.
K. Huang, H. Hu, S. Zhou, Q. Ye, and J. Guan.
“Privacy and Efficiency Guaranteed Social Subgraph Matching.” The
VLDB Journal (VLDBJ), Volume 31, pages 581–602, 2022. |
17.
L. Yao, Z. Chen, H. Hu, G. Wu,
and B. Wu. “Privacy Preservation for Trajectory Publication Based on Differential
Privacy.” ACM Transactions on Intelligent Systems and Technology (TIST),
Vol. 13, No. 3, Article 42, April 2022. |
18.
Q. Ye, H. Hu, X. Meng, H. Zheng, K. Huang, C. Fang, and
J. Shi. “PrivKVM*: Revisiting Key-Value Statistics
Estimation with Local Differential Privacy.” IEEE Transactions on
Dependable and Secure Computing (TDSC), accepted to appear, 2021. |
19.
Z. Han, H. Hu, and Q. Ye. “ReFlat: A Robust Access Pattern Hiding Solution for General
Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.” IEEE
Transactions on Cloud Computing (TCC), accepted to appear, 2021. |
20.
G. Zhang, J. Lee, K. Liu, H. Hu, and V. Aggarwal,
“A Unified Framework for Flexible Playback Latency Control in Live Video
Streaming.” IEEE Transactions on Parallel and Distributed Systems (TPDS),
Volume: 32, Issue: 12, Dec 2021, 3024-3037. |
21.
D. K. Mondal, B. C. Singh, H. Hu, S.Biswas, Z. Alom,
M. A. Azim. “SeizeMaliciousURL: A Novel Learning
Approach to Detect Malicious URLs.” Journal of Information Security and
Applications, Volume 62:102967, September 2021. |
22.
B. C. Singh, Z. Alom,
H. Hu,
M. M. Rahman, M. K. Baowal, Z. Aung, M. A. Azim,
and M. Ali. “Moni *COVID-19 Pandemic Outbreak in the Subcontinent: A
data-driven analysis.” Journal of Personalized Medicine, 2021, 11(9),
889. |
23.
L. Yang, F. Ye, J. Liu, Y. Wang, and H.
Hu. “An improved fuzzy rule-based system using evidential reasoning and
subtractive clustering for environmental investment prediction.” Fuzzy Sets
and Systems, 421, 44-61, 2021. |
24.
L. Yang, S. Wang, F. Ye, J. Liu, Y. Wang,
and H. Hu. “Environmental investment prediction using extended belief
rule-based system and evidential reasoning rule.” Journal of Cleaner
Production, Volume 289, 20 March 2021, 125661. |
25.
Z. Han and H. Hu. “ProDB: A memory-secure database using hardware enclave
and practical oblivious RAM.” Information Systems, Volume 96, February
2021, 101681. |
26.
L. Yao, Z. Chen, H. Hu, G. Wu, and
B. Wu. “Sensitive attribute privacy preservation of trajectory data
publishing based on l-diversity.” Distributed and Parallel Databases, November 2020.
|
27.
H. Zheng, H. Hu, and Z. Han, “Preserving User
Privacy for Machine Learning: Local Differential Privacy or Federated Machine
Learning?” IEEE Intelligent Systems. 35(4): pp 5-14, 2020. |
28.
H. Zheng and H. Hu. “MISSILE: A System of Mobile Inertial Sensor-Based Sensitive
Indoor Location Eavesdropping.” IEEE
Transactions on Information Forensics and Security (TIFS), Volume 15, September 2019, 3137 – 3151. |
29.
C. Liu, S. Zhou, H. Hu,
Y. Tang, J. Guan, and Y. Ma. “CPP: Towards Comprehensive Privacy Preserving for
Query Processing in Information Networks.” Information Sciences, Volume 467, October 2018, pages 296-311. |
30.
C. Xu, Q. Chen, H. Hu,
J. Xu, and X. Hei. “Authenticating Aggregate
Queries over Set-Valued Data with Confidentiality.” IEEE Transactions on Knowledge and Data Engineering (TKDE), 30(4):630-644,
Apr 2018. |
31.
Q. Zhu, H. Hu,
C. Xu, J. Xu, and W. Lee. “Geo-Social Group Queries with Minimum Acquaintance
Constraints”, The VLDB Journal,
26(5), 709-727, October 2017. |
32.
X. Lin, J. Xu, H. Hu and Z. Fan, “Reducing Uncertainty
of Probabilistic Top-k Ranking via Pairwise Crowdsourcing”, IEEE Transactions on Knowledge and Data
Engineering (TKDE), 29(10): 2290 – 2303, Oct. 2017. |
33.
H.
Hu, Q. Chen, J. Xu, and B. Choi, “Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum
Location Disclosure”, IEEE Transactions
on Mobile Computing (TMC), 16(11): 3000-3013, November 2017. |
34.
Z. Zhao, Y. Cheung, H. Hu,
and X. Wu, “Corrupted and Occluded Face Recognition via Cooperative Sparse
Representation”, Pattern Recognition,
Vol. 56, pp. 77-87, August 2016. |
35.
S. Gao, J. Xu, T. Haerder,
B. He, B. Choi, and H. Hu. “PCMLogging: Optimizing Transaction Logging and Recovery
Performance with PCM.” IEEE
Transactions on Knowledge and Data Engineering (TKDE), 27(12):3332-3346,
December 2015. |
36. X. Lin, J. Xu, and
H. Hu. “Reverse Keyword
Search for Spatio-Textual Top-k Queries in Location-Based
Services.” IEEE Transactions on
Knowledge and Data Engineering (TKDE), 27(11): 3056-3069, Nov. 2015. |
37. Y. Li, R. Chen,
J. Xu, Q. Huang, H. Hu, and B.
Choi. “Geo-Social K-Cover Group Queries for Collaborative Spatial Computing.”
IEEE Transactions on Knowledge and Data
Engineering (TKDE), 27(10):2729 – 2742, October,
2015 (spotlight paper). |
38. Z. Fan, B. Choi,
Q. Chen, J. Xu, H. Hu
and S. S. Bhowmick. “Structure-Preserving Subgraph
Query Services.” IEEE Transactions on Knowledge and Data Engineering
(TKDE), 27(08): 2275-2290, August, 2015. |
39. Z. Zhao, Y.
Cheung, H. Hu, X Wu. “Expanding
Dictionary for Robust Face Recognition: Pixel Is Not Necessary While Sparsity
Is.” IET Computer Vision, 9
(5), 648-654, 2015. |
40. R. Chen, Y. Peng,
B. Choi, J. Xu, and H. Hu. “A
private DNA Motif Finding Algorithm.” Journal of
Biomedical Informatics (JBI), 50: 122-132, 2014. |
41. Y. Peng, B. Choi, J. Xu, H. Hu, and S. S. Bhowmick.
“Side-Effect Estimation: A Filtering Approach to the View Update Problem.”
IEEE Transactions on Knowledge and Data
Engineering (TKDE), 26(9): 2307 – 2322, August,
2014. |
42. X. Lin, J. Xu, H. Hu, and W.-C. Lee. “Authenticating
Location-Based Skyline Queries in Arbitrary Subspaces.” IEEE Transactions on Knowledge and Data
Engineering (TKDE), 26(6): 1479-1493, June 2014. |
43. J. Deng, B. Choi,
J. Xu, H. Hu, and S. S. Bhowmick.
“Incremental Maintenance of the Minimum Bisimulation
of Cyclic Graphs.” IEEE Transactions
on Knowledge and Data Engineering (TKDE), 25(11): 2536 – 2550, Nov 2013. |
44. X. Lin, J. Xu, and
H. Hu. “Range-based Skyline
Queries in Mobile Environments.” IEEE
Transactions on Knowledge and Data Engineering (TKDE), 25(4): 835-849,
April 2013. |
45. Y. Li, S. T. On, J.
Xu, B. Choi, and H.
Hu. “Optimizing Non-Indexed Join Processing in Flash Storage-Based Systems.”
IEEE Transactions on Computers (TC),
62(7): 1417-1431, July 2013. |
46. H. Li, H.
Hu, J.
Xu. “Nearby Friend Alert: Location Anonymity in Mobile Geo-Social Networks”. IEEE Pervasive Computing, 12(4): 62-70, 2013. |
47. S. T. On, J. Xu,
B. Choi, H. Hu,
and B. He. “Flag Commit: Supporting Efficient Transaction Recovery in
Flash-based DBMSs.” IEEE
Transactions on Knowledge and Data Engineering (TKDE), 24(9): 1624-1639, Sept 2012. |
48.
H. Hu, J. Xu, S. T. On, J. Du, and K. Y. Ng. “Privacy-Aware Location Data Publishing”.
ACM Transactions on Database Systems
(TODS), 35(3), July 2010. |
49.
H.
Hu and
J. Xu. “2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based
Services.” IEEE Transactions on Parallel and Distributed
Systems (TPDS), 21(10): 1458-1472,
October 2010 (spotlight paper). |
50.
H. Hu, J. Xu and D. L. Lee. “PAM: An Efficient and Privacy-Aware
Monitoring Framework for Continuously Moving Objects.” IEEE Transactions on Data and Knowledge
Engineering (TKDE), 22(3): 404-419, March 2010. |
51. J. Xu, X. Tang, H.
Hu and J. Du. “Privacy-Conscious Location-Based Queries in |
52. S. T. On, H. Hu, Y. Li, and J. Xu. “Flash-Optimized
B+-Tree.” Journal of Computer Science and
Technology (JCST), 25(3): 509-522, 2010. |
53.
H. Hu and D. L. Lee. “Range Nearest Neighbor Query.” IEEE Transactions on Data and Knowledge Engineering (TKDE), 18(1): 78-91, 2006. |
54.
H. Hu and D. L. Lee. “Energy-Efficient Monitoring of Spatial
Predicates over Moving
Objects.” IEEE Data Engineering Bulletin, 28(3): 19-26 (2005) |
55. D. L. Lee, M. Zhu and H.
Hu. “When location-based
services meet databases.” Mobile
Information Systems, Volume 1, Number 2, 2005. |
56. C.-W. Lin, H. Hu and D. L. Lee. “Adaptive realtime bandwidth allocation for wireless data delivery.”
ACM/Kluwer Journal of Wireless Networks
(WINET), 10(2), 103-120, March 2004. |
|
Peer-Reviewed Conference Papers |
57.
K. Huang, H. Hu, Q. Ye, K.
Tian, B. Zheng, and X. Zhou. “TED: Towards Discovering Top-𝑘 Edge-Diversified Patterns in a Graph Database.” 2023 ACM SIGMOD International Conference on
Management of Data, Seattle, Washington, USA, June 2023. |
58.
Q. Ye, H. Hu, K. Huang,
M. H. Au, and Q. Xue. “Stateful Switch: Optimized
Time Series Release with Local Differential Privacy”. IEEE International
Conference on Computer Communications (INFOCOM), New York, USA, May 2023. |
59.
Y. Yan, Q. Ye, H. Hu, R. Chen,
Q. Han, and L. Wang. “Towards Defending Against Byzantine LDP Amplified Gain
Attacks.” 28th International Conference on Database Systems for Advanced
Applications (DASFAA), Tianjin, China, Apr 2023. |
60.
Y. Xiao, Q. Ye, H. Hu, H. Zheng,
C. Fang, and J. Shi. “MExMI: Pool-based Active
Model Extraction Crossover Membership Inference.” 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans,
USA. |
62.
K. Huang, Q. Ye, J.
Zhao, X. Zhao, H. Hu,
X. Zhou. “VINCENT: towards efficient exploratory subgraph search in graph
databases.” Proceedings of the VLDB Endowment 15 (12), 3634-3637, 2022. |
63.
Y. Fu, Q. Ye, R. Du,
and H. Hu. “Unified Proof of Work: Delegating and Solving Customized
Computationally Bounded Problems in A Privacy-preserving Way.” The 6th APWeb-WAIM International Joint Conference on Web and Big
Data (APWeb-WAIM), accepted to appear, 2022. |
64.
Q. Ye, H. Hu, N. Li, X. Meng, H. Zheng, H. Yan. “Beyond Value Perturbation:
Differential Privacy in the Temporal Setting.” Proc. of IEEE International
Conference on Computer Communications (INFOCOM’21), Virtual, May 2021. |
65.
R. Du, Q. Ye, Y. Fu,
and H. Hu. “Collecting High-Dimensional and Correlation-Constrained Data
with Local Differential Privacy.” Proc. of 18th IEEE International
Conference on Sensing, Communication and Networking (SECON), Virtual,
2021. |
66.
G. Zhang, K. Liu, H.
Hu, and
Jing Guo. “Short Video Streaming with Data Wastage Awareness.” (Poster) Proc.
of IEEE International Conference on Multimedia and Expo (ICME) 2021, Virtual,
July 5-9. |
67.
T. Wen, H. Hu, and H. Zheng. “An extraction attack on image recognition model using
VAE-kdtree model.” Proc. SPIE 11766, International
Workshop on Advanced Imaging Technology (IWAIT) 2021. (Best Paper Award) |
68.
L. Tang and H. Hu.
“OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted
Sensors.” 29th ACM International Conference on Information and Knowledge
Management (CIKM ’20), Oct 19-23, 2020, Online, pp
1425–1434. |
69.
Y. Fu, M. H. Au, R. Du,
H. Hu and D. Li. Cloud Password Shield: A Secure
Cloud-based Firewall against DDoS on Authentication Servers (poster) Proc.
of 40th IEEE International Conference on Distributed Computing Systems (ICDCS
’20) July 8 – 10, 2020, Singapore. |
70.
Q. Ye, H. Hu, M. H. Au, X. Meng, X. Xiao. Towards Locally Differentially Private
Generic Graph Metric Estimation. Proc. of the 36th IEEE International
Conference on Data Engineering (ICDE ’20), Dallas, USA, Apr. 2020, pp 1922-1925. |
71.
H. Zheng, Q. Ye, H. Hu, F. Cheng, and J. Shi.
“A Boundary Differential Private Layer against Machine Learning Model Extraction
Attacks.” Proc. of the 24th European
Symposium on Research in Computer Security (ESORICS ’19), Luxembourg, Sept
2019, pp 66-83. |
72.
H. Zheng, H. Hu, and Han Ziyang. “Preserving
User Privacy For Machine Learning: Local Differential
Privacy or Federated Machine Learning?” Proc.
of 1st International Workshop on Federated Machine Learning for User Privacy
and Data Confidentiality (FML’19), in conjunction with IJCAI’19. (Best Theory Paper Award) |
73.
L. Yao, X. Wang, X.
Wang, H. Hu, and G. Wu. “Publishing Sensitive Trajectory
Data Under Enhanced l-Diversity Model.” Proc. of 20th IEEE International Conference on Mobile Data Management (MDM’19),
Hong Kong SAR, China. (Best Paper Award) |
74.
Q. Ye, H. Hu, X. Meng, and H. Zheng. “PrivKV: Key-Value Data
Collection with Local Differential Privacy.” Proc. of 40th IEEE Symposium on Security and Privacy (SP’19), San
Francisco, USA, May 2019, pp 311-325. |
75.
M. Zhu, Q. Ye, X. Yang,
X. Meng, and H. Hu. “AppPrivacy: Analyzing Data Collection and Privacy Leakage
from Mobile App.” (poster) Proc. of
40th IEEE Symposium on Security and Privacy (SP’19), San Francisco, USA,
May 2019. |
76.
Y. Ji, C. Xu, J. Xu, H. Hu. “vABS:
Towards Verifiable Attribute-Based Search over Shared Cloud Data.” (demo) Proc. of 35th IEEE International Conference on Data Engineering (ICDE ’19),
Macau SAR, China, Apr. 2019, pp 2028-2031. |
77.
C. Xu, J. Xu, H. Hu, and M. H. Au. “When Query
Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.”
Proc. of the 2018
ACM SIGMOD International Conference on Management of Data, Houston, USA, Jun 2018, pp 147-162. |
78.
C. Xu, Q. Chen, H. Hu, J. Xu, and X. Hei. “Authenticating Aggregate Queries over Set-Valued
Data with Confidentiality.” (poster) 34th
IEEE International Conference on Data Engineering (ICDE ’18), Paris,
France, Apr 2018. |
79.
L. Chen, J. Xu, X. Lin,
C. S. Jensen, and H. Hu.
“Answering Why-Not Spatial Keyword Top-k Queries via Keyword Adaption.”
Proc. of the 32nd IEEE International
Conference on Data Engineering (ICDE ’16), Helsinki, Finland, May 2016, pp
697-708. |
80.
Z. Chen, H. Hu, and J. Yu. “Privacy-Preserving
Large-Scale Location Monitoring Using Bluetooth Low Energy.” Proc. of 11th IEEE International Conference
on Mobile Ad-hoc and Sensor Networks (MSN 2015), Shenzhen, China, December
2015, pp 69-78. |
81.
Q. Chen, H. Hu, and J. Xu. “Authenticated Online Data Integration Services.” Proc. of the 2015 ACM SIGMOD International Conference on Management
of Data, pp 167-181. |
82.
L. Chen, X. Lin, H. Hu, C. S. Jensen, and J. Xu. “Answering
Why-not Questions on Spatial Keyword Top-k Queries.” Proc. the 31th
IEEE International Conference on Data Engineering (ICDE ‘15), Seoul, Korea, April 2015. |
83.
Lu Wang, X. Meng, H. Hu, and J. Xu. “Bichromatic Reverse Nearest Neighbor Query without Information
Leakage.” Proc. the 20th International
Conference on Database Systems and Applications (DASFAA‘15), Hanoi, Vietnam, April 2015. |
84.
H. Hu, J. Xu, X. Xu, K.
Pei, B. Choi, and S. Zhou. “Private Search on Key-Value Stores with Hierarchical
Indexes”, Proc.
of the 30th IEEE International
Conference on
Data Engineering (ICDE ‘14), Chicago, IL, USA,
April 2014, pp 628-639. |
85. Q. Chen, H. Hu,
and J. Xu. “Authenticating Top-k Queries in Location-based Services with
Confidentiality.” Proc. of
the VLDB Endowment (PVLDB ’14), 49-60. |
86. H.
Hu, Q. Chen, and J. Xu. “VERDICT: Privacy-Preserving Authentication
of Range
Queries in Location-based
Services” Proc. of the 29th
IEEE International Conference on Data Engineering (ICDE ‘13), demo paper, 1312 – 1315. |
87.
X. Lin, H. Hu, H. P. Li, J. Xu, and B. Choi.
“Private Proximity Detection and Monitoring with Vicinity Regions.”
Proceedings of 12th International ACM
SIGMOD Workshop on Data Engineering for Wireless and Mobile Access (MobiDE ’13), pp. 5-12, New York,
June 2013. |
88. Jing Wang, Zhong-Qiu
Zhao, Xuegang Hu, Yiu-ming Cheung, and Haibo
Hu. “Online Learning Towards Big Data
Analysis in Health Informatics”. The
2013 International Conference on Brain and Health Informatics, Special Session on Intelligent Healthcare
Data Analytics. |
89.
H. Hu, J. Xu, Q. Chen, and Z.
Yang. “Authenticating Location-based Services without Compromising Privacy.” Proc. of the 2012 ACM SIGMOD International Conference on
Management of Data, pp. 301 – 312. |
90. Z. Huo, X. Meng, H. Hu, and Y. Huang. “You Can Walk
Alone: Trajectory Privacy-preserving through Significant Stays Protection.” Proc. of the 17th International Conference
on Database Systems for Advanced Applications (DASFAA ’12), pp. 351 – 366. |
91. H.
Hu, J. Xu,
C. Ren, and B. Choi. “Processing Private Queries over
Untrusted Data Cloud through Privacy Homomorphism.” Proc. of the 27th IEEE International Conference on Data Engineering (ICDE ’11), pp. 601
– 612. |
92.
X. Lin, J. Xu, and H. Hu. “Authentication of Location-based Skyline Queries.” Proc.
of the 20th ACM Conference on Information and Knowledge
Management (CIKM ’11), pp. 1583 – 1588. |
93.
S. Gao, J. Xu, B. He, B. Choi, and H. Hu. “PCMLogging:
Reducing Transaction Logging Overhead with PCM.” Proc. of the 20th ACM Conference on
Information and Knowledge Management (CIKM ’11), poster. |
94.
Y. Li, J. Xu, B. Choi, and H. Hu. “StableBuffer:
Optimizing Write Performance for DBMS Applications on Flash Devices.” Proc. the 19th ACM International Conference
on Information and Knowledge Management (CIKM ’10), Toronto, Canada, October
2010. |
95. S.
Gao, Y. Li, J. Xu, B. Choi, and H.
Hu: “DigestJoin: Expediting Joins on Solid-State
Drives.” DASFAA 2010: 428-431. |
96. H. Hu and J. Xu. “Non-Exposure
Location Anonymity.” Proc. the 25th
IEEE
Int. Conf. on Data Engineering (ICDE ’09), |
97.
Y. Li, S. T. On, J. Xu, B. Choi, and H. Hu. “DigestJoin:
Exploiting Fast Random Reads for Flash-based Joins.” Proc. the 10th International Conference on
Mobile Data Management (MDM ’09), |
98.
S. T. On, H.
Hu, Y.
Li, and J. Xu. “Lazy-Update B+-Tree for Flash Devices.” Proc. the 10th International Conference on
Mobile Data Management (MDM ’09), |
99.
J. Du, J. Xu, X. Tang, and H. Hu.
“iPDA: Supporting Privacy-Preserving Location-Based
Mobile Services.” Proc. the 8th Int.
Conf. on Mobile Data Management (MDM ’07), |
100.
Chen,
C. Lai, X. Meng, J. Xu, and H. Hu. “Clustering Moving Objects
in Spatial Networks.” Proc. the 12th
Int. Conf. on Database Systems for Advanced Applications (DASFAA ’07), |
101.
H. Hu
and D. L. Lee. “Distance Indexing on Road Networks” Proc. of the 32th International Conference on Very Large
Data Bases, |
102.
H. Hu, D. L. Lee and J.
Xu. “Fast Nearest Neighbor Search on Road Networks” Proc. of the 10th Int. Conf. on Extending Database
Technology (EDBT’06), 186-203,Munich,
Germany, 2006. |
103. H.
Hu, J. Xu and D. L. Lee. “A Generic Framework for Monitoring
Continuous Spatial Queries over Moving Objects” Proc. of the 24th ACM SIGMOD International Conference on Management
of Data, |
104. H.
Hu, J. Xu, W. S. Wong, B. Zheng and D. L. Lee.
“Proactive
Caching for Spatial Queries in |
105.
H. Hu and D. L. Lee. “GAMMA: A Framework for Moving Object Simulation.”
Proc. of 9th Int. Symp.
on Spatial and Temporal Databases (SSTD’05), Angra
dos Reis, Brazil, pp. 37-54. |
106. H. Hu and D. L. Lee. “Semantic Location Modeling
for Location Navigation in |
107. H. Hu, M. Zhu and D. L. Lee. “Towards Real-time Parallel Processing of Spatial Queries.”
Proc. of the Int. Conf. on Parallel
Processing (ICPP ’03), |
108. H.
Hu, J. Xu and D. L. Lee. “Adaptive Power-Aware Prefetching Schemes
for |
|
Invited Papers and Tutorials |
109.
Q. Ye and H. Hu. “Local Differential Privacy: Tools, Challenges, and
Opportunities.” 20th
International Conference on Web Information Systems Engineering (WISE 2019),
pp. 13-23. |
|
Book Chapters and Editorials |
110. H. Hu, R. Sarkar, and Z.
Chen (Eds.) Introduction to the Special Issue on Retrieving and Learning from
Internet of Things Data, ACM Transactions on Data Science, Volume 1, Issue 4,
November 2020. |
111. S. Zhou, W. Qian, H. Hu (Eds.) Proceedings of the
Second International Workshop on Data Management for
Emerging Network Infrastructures (DaMEN 2013), Springer, April 2013. |
112. C. S. Jensen, H. Hu
and D. Wu (Eds.). Proceedings of the First International
Workshop on Next-Generation Location-Based Services (LBS n.0),
IEEE, June 2013. |
113. H. Hu, H. Wang, B. Zheng: Challenges in Managing and Mining Large,
Heterogeneous Data. DASFAA (2) 2011: 462. |
114. A. Zhou, Y. Ishikawa, H. Hu and W. Qian (Eds.) Proceedings of the First International
Workshop on Data Management for Emerging Network Infrastructures (DaMEN 2011), Springer, 2011. |
115. X. Meng, Z. Ding and H. Hu (Eds.) Proceedings of the
Third International Workshop on Cloud Data Management (CloudDB
2011), ACM, 2011. |
116. H. Hu, J. Zhou, J. Xu and K. Y.
Ng. “Positioning and Privacy in Location-based Services.” Handheld Computing for
|
117. H. Hu, J. Xu, and X. Tang. “Energy Efficient
Sensor Data Management.” Sensor Network and Configuration: Fundamentals, Standards, Platforms, and Experiments. N. P. Mahalik et al, the Springer-Verlag Publishing, Germany,
2007. |
118. J. Xu, H. Hu, X. Tang, and B. Zheng. “Mobile Cache
Management.” Wireless Information Highways, D. Katsaros, A. Nanopoulos, and Y.
Manolopoulos, Eds., Idea Group Publishing, 2005. |