Content

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus viverra, eros sed ullamcorper adipiscing, dolor ante aliquam justo, sed mollis turpis augue ut nisl. Nunc id orci metus, a rhoncus massa. In hac habitasse platea dictumst. Fusce sit amet arcu a dui mattis ultricies.

Publications

(*Student Advisee)

2019

  1. Shangyu Xie*, Yuan Hong and Peng-Jun Wan, A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid, in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '19), Montreal, Canada, May 13-17, 2019, Accepted.
  2. Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu and Yingjiu Li, LiveForen: Ensuring Live Forensic Integrity in the Cloud, IEEE Transactions on Information Forensics and Security (TIFS), 2019, Accepted. [Impact Factor: 5.824]

2018

  1. Meisam Mohammady*, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi, Preserving Both Privacy and Utility in Network Trace Anonymization, in Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), Toronto, Canada, Oct 15-19, 2018, pages 459-474.
  2. Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong and Xiaohua Jia, Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy, IEEE Transactions on Dependable and Secure Computing (TDSC), 2018, Accepted. [DOI, Impact Factor: 4.41]
  3. Yunlong Zhang, Yuan Hong and Ken Choi, Optimal Energy-dissipation Control for SOC based Balancing in Series connected Lithium-ion Battery Packs, Multimedia and Tools, Springer, 2018, Accepted. [Impact Factor: 1.541]
  4. Yuan Hong, Han Wang*, Shangyu Xie* and Bingyu Liu*, Privacy Preserving and Collusion Resistant Energy Sharing, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '18), Calgary, Canada, April 22-27, 2018, pages 6941-6945.
  5. Yanfeng Qu, Xin Liu, Dong Jin, Yuan Hong and Chen Chen, Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control, in Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security '18), Tempe, Arizona, USA, March 21, 2018.
  6. Weizhen Rao, Shengbin Wang and Yuan Hong, A Distance Matrix Based Algorithm for Solving the Traveling Salesman Problem, Operational Research, 2018, Accepted. [DOI, Impact Factor: 1.816]
  7. Haibing Lu, Wendong Zhu, Joseph Phan, M. Ghiassi, Yi Fang, Yuan Hong and Xiaoyun He, Fault-Tolerant Tile Mining, Expert Systems with Applications, 2018, Vol. 101, July 2018, pp. 25-42. [Impact Factor: 3.711]
  8. Shengbin Wang, Feng Liu, Lian Lian, Yuan Hong and Haozhe Chen, Integrated Post-Disaster Medical Assistance Team Scheduling and Relief Supply Distribution, International Journal of Logistics Management, 2018, Accepted. [Impact Factor: 2.437]
  9. Sanjay Goel, Yuan Hong, Justin Giboney and Pradeep Atrey (Eds.), Innovations in Information Security, World Scientific Publishing, ISBN 978-981-3147-02-7, 2018.

2017

  1. Yuan Hong, Wen Ming Liu and Lingyu Wang, Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 12(9), pp. 2227-2241, 2017. [PDF, Impact Factor: 5.824]
  2. Feng Liu, Shengbin Wang, Yuan Hong and Xiaohang Yue, On the Robust and Stable Flowshop Scheduling under Stochastic and Dynamic Disruptions, IEEE Transactions on Engineering Management (TEM), Vol. 64(4), pp. 539-553, 2017. [DOI: 10.1109/TEM.2017.2712611, Impact Factor: 1.416]
  3. Yuan Hong, Sanjay Goel, Haibing Lu and Shengbin Wang, Discovering Energy Communities for Microgrids on the Power Grid, in Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm '17), Dresden, Germany, Oct 23-26, 2017, pages 64-70. [PDF]
  4. Yuan Hong, Shengbin Wang and Ziyue Huang, Efficient Energy Consumption Scheduling: Towards Effective Load Leveling, Energies Journal, Vol. 10(1), 2017. [PDF, Impact Factor: 3.045]

2016

  1. Yuan Hong, Sanjay Goel and Wen Ming Liu, An Efficient and Privacy Preserving Scheme for Energy Exchange among Smart Microgrids, International Journal of Energy Research (IJER), Vol. 40(3), pp. 313-331, March 2016, Wiley. [Impact Factor: 3.009]
  2. Yuan Hong, Jaideep Vaidya, Haibing Lu and Wen Ming Liu, Accurate and Efficient Query Clustering via Top Ranked Search Results, Web Intelligence (WI '16) Journal, Vol. 14(2), pp. 119-138, 2016, IOS Press. [PDF]
  3. Ersin Dincelli*, Yuan Hong and Nic DePaula, Homophily Effects on Diffusion of Ideas and Opinion Change: The Case of the Gezi Park Protests, in Proceedings of the 2016 Annual Meeting of the Association for Information Science and Technology (ASIS&T '16), Copenhagen, Denmark, 2016. [PDF, ACM] 
  4. Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel, Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong and Haibing Lu, Usability Test of Personality Type within a Roommate Matching Website: A Case Study, Journal of International Technology and Information Managmeent (JITIM), Vol. 25(1), Article 5, 2016.
  5. Yumei Chen, Yuan Hong and Theresa Pardo, Integrating Data Masking Standards and Applications into Open Government Data, in Proceedings of 2016 IFIP EGOV/ePart (EGOV '16) Conference, Guimarães, Portugal, Page 384-385, IOS Press. [PDF]

2015

  1. Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel, Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12(5), pp. 504-518, 2015, IEEE Computer Society. [PDF, Impact Factor: 4.41]
  2. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, Towards User-Oriented RBAC Model, Journal of Computer Security (JCS), Vol. 23(1), pp. 107-129, 2015, IOS Press. [PDF]
  3. Nicholas Rizzo*, Ethan Sprissler*, Yuan Hong and Sanjay Goel, Privacy Preserving Driving Style Recognition, in Proceedings of 2015 IEEE International Conference on Connected Vehicles and Expo (ICCVE '15), Nov. 2015, Shenzhen, China. [PDF, Page 232-237, IEEE]
  4. Justin Giboney, Joseph Buckman and Yuan Hong, Social Media is Weakening Passwords, AIS SIGSEC Workshop in Information Security and Privacy (WISP '15), in Conjunction with the International Conference on Information Systems (ICIS '15), Ft. Worth, TX, 2015. [Article 3]
  5. Sanjay Goel and Yuan Hong, Cyber War Games: Strategic Jostling Among Traditional Adversaries (Chapter 1) in "Cyber Warfare: Building the Scientific Foundation", Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (Eds.), Springer, Berlin, ISBN 978-3-319-14038-4, 2015.
  6. Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou and Dariusz Kaloza (Eds.), Smart Grid Security, Springer, London, ISBN 978-1-4471-6662-7, 129 pages, 2015.

2014 and Before

  1. Yuan Hong and Jaideep Vaidya, An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Programs, Optimization Letters (Optim Lett), Vol. 8(1), pp. 267-277, 2014, Springer-Verlag. [PDF, Impact Factor: 1.013]
  2. Yuan Hong, Jaideep Vaidya and Shengbin Wang, A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications, Journal of Information Systems (JIS), Vol. 28(1), pp. 243-268, 2014. [PDF]
  3. Yuan Hong, Jaideep Vaidya, Haibing Lu and Lingyu Wang, Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure, in Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '14), July 14-16, 2014, Vienna, Austria. [PDF, Page 179-194, Springer]
  4. Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang and Lian Duan, Dynamic Workflow Adjustment with Security Constraints, in Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '14), July 14-16, 2014, Vienna, Austria. [PDF, Page 211-226, Springer]
  5. Jaideep Vaidya, Anirban Basu, Basit Shafiq and Yuan Hong, Differentially Private Naive Bayes Classification, in Proceedings of the 12th IEEE/WIC/ACM International Conference on Web Intelligence (WI '13), Nov. 17-20, 2013, Atlanta, GA, USA. [PDF, Page 571-576, IEEE]
  6. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, Towards User-Oriented RBAC Model, in Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '13), July 15-17, 2013, Newark, NJ, USA. [PDF, Page 81-96, Springer]
  7. Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong, Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition, IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Data & Application Security, Vol. 9(5), pp. 655-669, 2012, IEEE Computer Society. [PDF, Impact Factor: 4.41]
  8. Yuan Hong, Jaideep Vaidya, Haibing Lu and Mingrui Wu, Differentially Private Search Log Sanitization with Optimal Output Utility, in Proceedings of the 15th International Conference on Extending Database Technology (EDBT '12), March 26-30, 2012, Berlin, Germany. (Acceptance Rate: 22.5%) [PDF, Page 50-61, ACM]
  9. Yuan Hong, Jaideep Vaidya and Haibing Lu, Secure and Efficient Distributed Linear Programming, Journal of Computer Security (JCS), Vol. 20(5), pp. 583-634, 2012, IOS Press. [PDF]
  10. Haibing Lu, Yuan Hong, Nick Street, Fei Wang and Hanghang Tong, Overlapping Clustering with Sparseness Constraints, in Proceedings of the 2012 International Conference on Data Mining Workshops, December 10-13, 2012, Brussels, Belgium. [PDF, Page 486-494, IEEE]
  11. Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam and Vijay Atluri, Privacy Preserving Subgraph Discovery, in Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '12), July 11-13, 2012, Paris, France. [PDF, Page 161-176, Springer]
  12. Yuan Hong, Jaideep Vaidya and Haibing Lu, Search Engine Query Clustering using Top-k Search Results, in Proceedings of the 10th IEEE/WIC/ACM International Conference on Web Intelligence (WI '11), August 22-27, 2011, Lyon, France. (Acceptance Rate: 20.5%) [PDF, Page 112-119, IEEE]
  13. Yuan Hong, Jaideep Vaidya, Haibing Lu and Basit Shafiq, Privacy-preserving Tabu Search for Distributed Graph Coloring, in Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT '11), October 9-11, 2011, MIT, Boston, USA. (Acceptance Rate: 8%) [PDF, Page 951-958, IEEE]
  14. Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong, Extended Boolean Matrix Decomposition, in Proceedings of the 2009 International Conference on Data Mining (ICDM '09), December 6-9,2009, Miami, Florida, USA. (Acceptance Rate: 8.9%) [PDF, Page 317-326, IEEE]
  15. Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil Adam and Vijayalakshmi Atluri, Effective Anonymization of Query Logs, in Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM '09), November 2-6, 2009, Hong Kong, China. (Acceptance Rate: 20.2%) [PDF, Page 1465-1468, ACM]
  16. Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang and Rachida Dssouli,  Preserving Privacy in e-Health Systems using Hippocratic Databases, in Proceedings of the 32nd Annual International Computer Software and Applications Conference (COMPSAC 2008), July 28-August 1, 2008, Turku, Finland. [PDF, Page 692-697, IEEE]
  17. Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang and Rachida Dssouli,  Securing Tele-health Applications in a Web-based e-Health Portal, in Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008), March 4-7, 2008, Barcelona, Spain. (Acceptance Rate: 21.1%) [PDF, Page 3-9, IEEE]
  18. Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang and Rachida Dssouli, A Hierarchical Approach to the Specification of Privacy Preferences, in Proceedings of the 4th International Conference on Innovations in Information Technology, IEEE, Nov. 2007. [Page 660-664, IEEE]
  19. Shuo Lu, Yuan Hong, Qian Liu, Lingyu Wang and Rachida Dssouli, Access Control in e-Health Portal Systems, in Proceedings of the 4th International Conference on Innovations in Information Technology, IEEE, Nov. 2007. [Page 88-92, IEEE]