var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=lihuixidian.github.io%2Flihui.bib&commas=true&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=lihuixidian.github.io%2Flihui.bib&commas=true&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=lihuixidian.github.io%2Flihui.bib&commas=true&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n One Size Cannot Fit All: a Self-Adaptive Dispatcher for Skewed Hash Join in Shared-nothing RDBMSs.\n \n \n \n\n\n \n Yang, J., Li, H., Song, W., Si, Y., Zhang, H., Zhao, K., Wei, K., Liu, Y., & Cui, J.\n\n\n \n\n\n\n In Database Systems for Advanced Applications - 29th International Conference, DASFAA 2024, Gifu, Japan, July 2-5, 2020, of Lecture Notes in Computer Science, 2024. Springer\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DASFAA2024-PnR,\r\n  author    = {Jinxin Yang and Hui Li and Wenlong Song and Yiming Si and Hui Zhang and Kankan Zhao and Kewei Wei and Yingfan Liu and Jiangtao Cui},\r\n  title     = {One Size Cannot Fit All: a Self-Adaptive Dispatcher for Skewed Hash Join in Shared-nothing RDBMSs},\r\n  booktitle = {Database Systems for Advanced Applications - 29th International Conference,\r\n               {DASFAA} 2024, Gifu, Japan, July 2-5, 2020},\r\n  series    = {Lecture Notes in Computer Science},\r\n  volume    = {},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2024},\r\n    bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Enc$^2$DB: A Hybrid and Adaptive Encrypted Query Processing Framework.\n \n \n \n\n\n \n Li, H., Shi, J., Tian, Q., Li, Z., Fu, Y., Shen, B., & Tu, Y.\n\n\n \n\n\n\n In Database Systems for Advanced Applications - 29th International Conference, DASFAA 2024, Gifu, Japan, July 2-5, 2020, of Lecture Notes in Computer Science, 2024. Springer\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DASFAA2024-EncDB,\r\n  author    = {Hui Li and Jingwen Shi and Qi Tian and Zheng Li and Yan Fu and Bingqing Shen and Yaofeng Tu},\r\n  title     = {Enc$^2$DB: A Hybrid and Adaptive Encrypted Query Processing Framework},\r\n  booktitle = {Database Systems for Advanced Applications - 29th International Conference,\r\n               {DASFAA} 2024, Gifu, Japan, July 2-5, 2020},\r\n  series    = {Lecture Notes in Computer Science},\r\n  volume    = {},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2024},\r\n    bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SLSM: An Efficient Strategy for Lazy Schema Migration on Shared-Nothing Databases.\n \n \n \n\n\n \n Zeng, Z., Li, H., Gao, X., Zhang, H., Zhang, H., & Cui, J.\n\n\n \n\n\n\n In Database Systems for Advanced Applications - 29th International Conference, DASFAA 2024, Gifu, Japan, July 2-5, 2020, of Lecture Notes in Computer Science, 2024. Springer\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DASFAA2024-SLSM,\r\n  author    = {Zhilin Zeng and Hui Li and Xiyue Gao and Hui Zhang and Huiquan Zhang and Jiangtao Cui},\r\n  title     = {SLSM: An Efficient Strategy for Lazy Schema Migration on Shared-Nothing Databases},\r\n  booktitle = {Database Systems for Advanced Applications - 29th International Conference,\r\n               {DASFAA} 2024, Gifu, Japan, July 2-5, 2020},\r\n  series    = {Lecture Notes in Computer Science},\r\n  volume    = {},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2024},\r\n    bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Quartet: A Query Aware Database Adaptive Compilation Decision System.\n \n \n \n\n\n \n Wang, Z., Cui, J., Gao, X., Li, H., Peng, Y., Liu, Z., Zhang, H., & Zhao, K.\n\n\n \n\n\n\n Expert Systems With Applications. 2024.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{quratlet2024,\r\n  author    = {Zhibin Wang and Jiangtao Cui and Xiyue Gao and Hui Li and Yanguo Peng and Zhuang Liu and Hui Zhang and Kankan Zhao},\r\n  journal = {Expert Systems With Applications},\r\n  title     = {Quartet: A Query Aware Database Adaptive Compilation Decision System},\r\n  year = {2024},\r\n  volume = {},\r\n  number = {},\r\n  pages = {},\r\n  publisher = {},\r\n  month = {},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n DP-starJ: A Differential Private Scheme towards Analytical Star-Join Queries.\n \n \n \n\n\n \n Fu, C., Li, H., Lou, J., & Cui, J.\n\n\n \n\n\n\n In Proceedings of the 2024 International Conference on Management of Data, SIGMOD Conference 2024, Santiago, Chile, June 9 - June 15, 2024, 2024. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CF_SIGMOD24,\r\n  author    = {Congcong Fu and\r\n               Hui Li and\r\n               Jian Lou and\r\n               Jiangtao Cui},\r\n  title     = {DP-starJ: A Differential Private Scheme towards Analytical Star-Join Queries},\r\n  booktitle = {Proceedings of the 2024 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2024, Santiago, Chile, June 9 - June 15, 2024},\r\n  pages     = {},\r\n  doi = {},\r\n  publisher = {{ACM}},\r\n  year      = {2024},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Fuzzy Differential Privacy Theory and Its Applications in Subgraph Counting.\n \n \n \n\n\n \n Hou, Y., Xia, X., Li, H., Cui, J., & Mardani, A.\n\n\n \n\n\n\n IEEE Transactions on Fuzzy Systems, 31(2): 356-369. 2023.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9730083,\r\n  author={Hou, Yongchao and Xia, Xiaofang and Li, Hui and Cui, Jiangtao and Mardani, Abbas},\r\n  journal={IEEE Transactions on Fuzzy Systems}, \r\n  title={Fuzzy Differential Privacy Theory and Its Applications in Subgraph Counting}, \r\n  year={2023},\r\n  volume={31},\r\n  number={2},\r\n  pages={356-369},\r\n  doi={10.1109/TFUZZ.2022.3157385},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PIANO: Influence Maximization Meets Deep Reinforcement Learning.\n \n \n \n\n\n \n Li, H., Xu, M., Bhowmick, S. S., Rayhan, J. S., Sun, C., & Cui, J.\n\n\n \n\n\n\n IEEE Transactions on Computational Social Systems, 10(3): 1288-1300. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9769766,\r\n  author={Li, Hui and Xu, Mengting and Bhowmick, Sourav S. and Rayhan, Joty Shafiq and Sun, Changsheng and Cui, Jiangtao},\r\n  journal={IEEE Transactions on Computational Social Systems}, \r\n  title={PIANO: Influence Maximization Meets Deep Reinforcement Learning}, \r\n  year={2023},\r\n  volume={10},\r\n  number={3},\r\n  pages={1288-1300},\r\n  doi={10.1109/TCSS.2022.3164667},\r\n  bibbase_note = {<a href="https://github.com/lihuixidian/PIANO"><i class="big github icon"></i></a>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n RUG:收益驱动的单向共享汽车用户重定位.\n \n \n \n\n\n \n 马毓哲, 王蒙, 李辉, 崔江涛, 刘俊华, & 李瑞蒙\n\n\n \n\n\n\n 地球信息科学学报, 25(12): 1-14. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{WM_2023Geo,\r\n  author  = {马毓哲 and 王蒙 and 李辉 and 崔江涛 and 刘俊华 and 李瑞蒙},\r\n  title   = {RUG:收益驱动的单向共享汽车用户重定位},\r\n  journal = {地球信息科学学报},\r\n  year    = {2023},\r\n  volume = {25},\r\n  number = {12},\r\n  pages   = {1-14},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n CoSTUR:面向用户评级的空间文本竞争选址研究.\n \n \n \n\n\n \n 李晨伟, 王蒙, 李辉, 王西汉, & 崔江涛\n\n\n \n\n\n\n In The 40th National Database Conference, China (NDBC'2023), 2023. \n \n\nBest Student Paper\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{ndbc23,\r\n  author    = {李晨伟 and 王蒙 and 李辉 and 王西汉 and 崔江涛},\r\n  title     = {CoSTUR:面向用户评级的空间文本竞争选址研究},\r\n  booktitle = {The 40th National Database Conference, China (NDBC'2023)},\r\n  year      = {2023},\r\n  bibbase_note = {<b class="ui label red"><i class="trophy icon"></i>Best Student Paper</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 数据库系统参数调优方法综述.\n \n \n \n\n\n \n 曹蓉, 鲍亮, 崔江涛, 李辉, & 周恒\n\n\n \n\n\n\n 计算机研究与发展, 60(3): 635-653. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{2023BLCR,\r\n  author  = {曹蓉 and 鲍亮 and 崔江涛 and 李辉 and 周恒},\r\n  title   = {数据库系统参数调优方法综述},\r\n  journal = {计算机研究与发展},\r\n  year    = {2023},\r\n  volume = {60},\r\n  number = {3},\r\n  pages   = {635-653},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARENA: Alternative Relational Query Plan Exploration for Database Education.\n \n \n \n\n\n \n Wang, H., Li, H., Bhowmick, S. S, & Xu, B.\n\n\n \n\n\n\n In Proceedings of the 2023 International Conference on Management of Data, SIGMOD Conference 2023, Seattle, WA, USA, June 18 - June 23, 2023, 2023. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{HW_SIGMOD23,\r\n  author    = {Hu Wang and\r\n               Hui Li and\r\n               Sourav S Bhowmick and\r\n               Baochao Xu},\r\n  title     = {ARENA: Alternative Relational Query Plan Exploration for Database Education},\r\n  booktitle = {Proceedings of the 2023 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2023, Seattle, WA, USA, June 18 - June 23, 2023},\r\n  pages     = {},\r\n  doi = {},\r\n  publisher = {{ACM}},\r\n  year      = {2023},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b><a href="https://youtu.be/CmdYBmSOuMU"><i class="big youtube icon"></i></a><a href="https://dbedu.xidian.edu.cn" target="_blank"><img src="images/dbedu.png" class="ui spaced tiny image"></a>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Balancing the Efficiency and Effectiveness in k-Facility Relocation Problem.\n \n \n \n\n\n \n Wang, H., Li, H., Wang, M., & Cui, J.\n\n\n \n\n\n\n ACM Trans. Intell. Syst. Technol., preprint. 2023.\n \n\nMALOS project homepage\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{tist_wh2023,\r\n  author = {Wang, Hu and Li, Hui and Wang, Meng and Cui, Jiangtao},\r\n  title = {Towards Balancing the Efficiency and Effectiveness in k-Facility Relocation Problem},\r\n  year = {2023},\r\n  issue_date = {February 2023},\r\n  publisher = {Association for Computing Machinery},\r\n  address = {New York, NY, USA},\r\n  volume = {preprint},\r\n  number = {},\r\n  issn = {},\r\n  doi = {},\r\n  journal = {ACM Trans. Intell. Syst. Technol.},\r\n  articleno = {},\r\n  numpages = {24},\r\n  bibbase_note = {<b class="ui primary basic mini button"><a href="/malos">MALOS project homepage</a></b>}, \r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation.\n \n \n \n\n\n \n Wang, P., Yang, C., Xie, D., Zhao, J., Li, H., Tao, J., & Guan, X.\n\n\n \n\n\n\n In Proceedings of the 2023 International Conference on Management of Data, SIGMOD Conference 2023, Seattle, WA, USA, June 18 - June 23, 2023, 2023. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PHW_SIGMOD23,\r\n  author    = {Pinghui Wang and\r\n               Chengjin Yang and \r\n               Dongdong Xie and\r\n               Junzhou Zhao and\r\n               Hui Li and\r\n               Jing Tao and\r\n               Xiaohong Guan},\r\n  title     = {An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation},\r\n  booktitle = {Proceedings of the 2023 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2023, Seattle, WA, USA, June 18 - June 23, 2023},\r\n  pages     = {},\r\n  doi = {},\r\n  publisher = {{ACM}},\r\n  year      = {2023},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n LS-RQ: A lightweight and forward-secure range query on geographically encrypted data.\n \n \n \n\n\n \n Peng, Y., Wang, L., Cui, J., Liu, X., Li, H., & Ma, J.\n\n\n \n\n\n\n IEEE Transactions on Dependable and Secure Computing, 19(1): 388-401. 2022.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9000727, \r\n  author={Y. {Peng} and L. {Wang} and J. {Cui} and X. {Liu} and H. {Li} and J. {Ma}}, \r\n  journal={IEEE Transactions on Dependable and Secure Computing}, \r\n  title={LS-RQ: A lightweight and forward-secure range query on geographically encrypted data}, \r\n  year={2022}, \r\n  volume={19}, \r\n  number={1}, \r\n  pages={388-401}, \r\n  doi={10.1109/TDSC.2020.2974218}, \r\n  ISSN={2160-9209}, \r\n  month={},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Technology-Enabled Learning of Relational Query Processing.\n \n \n \n\n\n \n Bhowmick, S. S, & Li, H.\n\n\n \n\n\n\n IEEE Data Engineering Bulletin, 45(3): 29-46. sep 2022.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TCDE2022,\r\n  author    = {Sourav S Bhowmick and\r\n               Hui Li},\r\n  journal = {IEEE Data Engineering Bulletin},\r\n  title     = {Towards Technology-Enabled Learning of Relational Query Processing},\r\n  year = {2022},\r\n  volume = {45},\r\n  number = {3},\r\n  pages = {29-46},\r\n  publisher = {IEEE Computer Society},\r\n  month = {sep},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.\n \n \n \n\n\n \n Sun, L., Li, H., Yu, S., Ma, X., Peng, Y., & Cui, J.\n\n\n \n\n\n\n In 25th Information Security Conference (ISC), Bali, Indonesia, Dec 18 - 22, 2022, 2022. Springer\n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SLL_ISC22,\r\n  author    = {Longlong Sun and\r\n               Hui Li and\r\n               Shiwen Yu and\r\n               Xindi Ma and \r\n               Yanguo Peng and\r\n               Jiangtao Cui},\r\n  title     = {HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud},\r\n  booktitle = {25th Information Security Conference (ISC), Bali, Indonesia, Dec 18 - 22, 2022},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks.\n \n \n \n\n\n \n Sun, L., Li, H., Peng, Y., & Cui, J.\n\n\n \n\n\n\n In 31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022, 2022. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SLL_CIKM22,\r\n  author    = {Longlong Sun and\r\n               Hui Li and\r\n               Yanguo Peng and\r\n               Jiangtao Cui},\r\n  title     = {Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks},\r\n  booktitle = {31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n DP-HORUS: Differentially Private Hierarchical Count Histograms under Untrusted Server.\n \n \n \n\n\n \n Fu, C., Li, H., Lou, J., & Cui, J.\n\n\n \n\n\n\n In 31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022, 2022. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{FCC_CIKM22,\r\n  author    = {Congcong Fu and\r\n               Hui Li and\r\n               Jian Lou and\r\n               Jiangtao Cui},\r\n  title     = {DP-HORUS: Differentially Private Hierarchical Count Histograms under Untrusted Server},\r\n  booktitle = {31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n DBinsight: A Tool for Interactively Understanding the Query Processing Pipeline in RDBMSs.\n \n \n \n\n\n \n Rong, Y., Li, H., Zhao, K., Gao, X., & Cui, J.\n\n\n \n\n\n\n In 31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022, 2022. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{RY_CIKM22,\r\n  author    = {Ying Rong and\r\n               Hui Li and\r\n               Kankan Zhao and\r\n               Xiyue Gao and\r\n               Jiangtao Cui},\r\n  title     = {DBinsight: A Tool for Interactively Understanding the Query Processing Pipeline in RDBMSs},\r\n  booktitle = {31st ACM International Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia, USA, Oct 17 - 21, 2022},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b><a href="https://youtu.be/EPTJl8Qohgs"><i class="big youtube icon"></i></a>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n LANTERN: Boredom-conscious Natural Language Description Generation of Query Execution Plans for Database Education.\n \n \n \n\n\n \n Chen, P., Li, H., Bhowmick, S. S, Joty, S., & Wang, W.\n\n\n \n\n\n\n In Proceedings of the 2022 International Conference on Management of Data, SIGMOD Conference 2022, Philadelphia, PA, USA, June 12 - June 17, 2022, 2022. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PC_SIGMOD22,\r\n  author    = {Peng Chen and\r\n               Hui Li and\r\n               Sourav S Bhowmick and\r\n               Shafiq Joty and\r\n               Weiguo Wang},\r\n  title     = {LANTERN: Boredom-conscious Natural Language Description Generation of Query Execution Plans for Database Education},\r\n  booktitle = {Proceedings of the 2022 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2022, Philadelphia, PA, USA, June 12 - June 17, 2022},\r\n  pages     = {},\r\n  doi = {10.1145/3514221.3520165},\r\n  publisher = {{ACM}},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b><a href="https://youtu.be/0pNOOnR-Ezk"><i class="big youtube icon"></i></a><a href="https://dbedu.xidian.edu.cn" target="_blank"><img src="images/dbedu.png" class="ui spaced tiny image"></a>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions.\n \n \n \n\n\n \n Li, H., Yang, Q., & Cui, J.\n\n\n \n\n\n\n In 15th ACM International WSDM Conference (WSDM), Phoenix, AZ, US, Feb 21 - 25, 2022, 2022. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{qt_WSDM22,\r\n  author    = {Hui Li and\r\n               Qiting Yang and\r\n               Jiangtao Cui},\r\n  title     = {a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions},\r\n  booktitle = {15th ACM International WSDM Conference (WSDM), Phoenix, AZ, US, Feb 21 - 25, 2022},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2022},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b><a href="https://youtu.be/ptNXTdL3Ehw"><i class="big youtube icon"></i></a>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering.\n \n \n \n\n\n \n Li, Y., Li, H., Wang, Z., Liu, B., Cui, J., & Fei, H.\n\n\n \n\n\n\n IEEE Transactions on Knowledge and Data Engineering, 34(2): 617-630. Feb. 2022.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{ESAcluster2020, \r\n  author={Y. {Li} and H. {Li} and Z. {Wang} and B. {Liu} and J. {Cui} and H. {Fei}}, \r\n  journal={IEEE Transactions on Knowledge and Data Engineering}, \r\n  title={ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering}, \r\n  year={2022}, \r\n  volume={34}, \r\n  number={2}, \r\n  pages={617-630}, \r\n  ISSN={2326-3865}, \r\n  month={Feb.},\r\n  doi={10.1109/TKDE.2020.2990196},\r\n  ISSN={1041-4347}, \r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Sustainable Ensemble Learning Driving Intrusion Detection Model.\n \n \n \n\n\n \n Li, X., Zhu, M., Yang, L. T., Xu, M., Ma, Z., Zhong, C., Li, H., & Xiang, Y.\n\n\n \n\n\n\n IEEE Transactions on Dependable and Secure Computing, (01): 1-1. mar 2021.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE {9380306,\r\nauthor = {X. Li and M. Zhu and L. T. Yang and M. Xu and Z. Ma and C. Zhong and H. Li and Y. Xiang},\r\njournal = {IEEE Transactions on Dependable and Secure Computing},\r\ntitle = {Sustainable Ensemble Learning Driving Intrusion Detection Model},\r\nyear = {2021},\r\nvolume = {},\r\nnumber = {01},\r\nissn = {1941-0018},\r\npages = {1-1},\r\ndoi = {10.1109/TDSC.2021.3066202},\r\npublisher = {IEEE Computer Society},\r\nmonth = {mar},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Addressing the Hardness of k-Facility Relocation Problem: a Pair of Approximate Solutions.\n \n \n \n\n\n \n Wang, H., Li, H., Wang, M., & Cui, J.\n\n\n \n\n\n\n In 30th ACM International Conference on Information and Knowledge Management (CIKM), Online, Australia, Nov 1 - 5, 2021, 2021. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{WH_CIKM21,\r\n  author    = {Hu Wang and\r\n               Hui Li and\r\n               Meng Wang and\r\n               Jiangtao Cui},\r\n  title     = {Addressing the Hardness of k-Facility Relocation Problem: a Pair of Approximate Solutions},\r\n  booktitle = {30th ACM International Conference on Information and Knowledge Management (CIKM), Online, Australia, Nov 1 - 5, 2021},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SaDes: An Interactive System for Sensitivity-aware Desensitization towards Tabular Data.\n \n \n \n\n\n \n Zhao, K., Li, H., Gong, Z., & Cui, J.\n\n\n \n\n\n\n In 30th ACM International Conference on Information and Knowledge Management (CIKM), Online, Australia, Nov 1 - 5, 2021, 2021. ACM\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ZKC_CIKM21,\r\n  author    = {Kechun Zhao and\r\n               Hui Li and\r\n               Zheng Gong and\r\n               Jiangtao Cui},\r\n  title     = {SaDes: An Interactive System for Sensitivity-aware Desensitization towards Tabular Data},\r\n  booktitle = {30th ACM International Conference on Information and Knowledge Management (CIKM), Online, Australia, Nov 1 - 5, 2021},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Enhancing Database Education: Natural Language Generation Meets Query Execution Plans.\n \n \n \n\n\n \n Wang, W., Bhowmick, S. S, Li, H., Joty, S., Liu, S., & Chen, P.\n\n\n \n\n\n\n In Proceedings of the 2021 International Conference on Management of Data, SIGMOD Conference 2021, Virtual Event, China, June 20 - June 25, 2021, 2021. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{WGW_SIGMODD21,\r\n  author    = {Weiguo Wang and\r\n               Sourav S Bhowmick and\r\n               Hui Li and\r\n               Shafiq Joty and\r\n               Siyuan Liu and\r\n               Peng Chen},\r\n  title     = {Towards Enhancing Database Education: Natural Language Generation Meets Query Execution Plans},\r\n  booktitle = {Proceedings of the 2021 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2021, Virtual Event, China, June 20 - June 25, 2021},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Community Hiding by Link Perturbation in Social Networks.\n \n \n \n\n\n \n Chen, X., Jiang, Z., Li, H., Ma, J., & Yu, P. S.\n\n\n \n\n\n\n IEEE Trans. Comput. Soc. Syst., 8(3): 704–715. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tcss/ChenJLMY21,\r\n  author    = {Xianyu Chen and\r\n               Zhongyuan Jiang and\r\n               Hui Li and\r\n               Jianfeng Ma and\r\n               Philip S. Yu},\r\n  title     = {Community Hiding by Link Perturbation in Social Networks},\r\n  journal   = {{IEEE} Trans. Comput. Soc. Syst.},\r\n  volume    = {8},\r\n  number    = {3},\r\n  pages     = {704--715},\r\n  year      = {2021},\r\n  doi       = {10.1109/TCSS.2021.3054115},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering (Extended Abstract).\n \n \n \n\n\n \n Li, Y., Li, H., Wang, Z., Liu, B., Cui, J., & Fei, H.\n\n\n \n\n\n\n In 37th IEEE International Conference on Data Engineering, ICDE 2021, Chania, Crete, Greece, April 19-23, 2021, 2021. \n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ESAcluster2021ICDEp, \r\n  author={Y. {Li} and H. {Li} and Z. {Wang} and B. {Liu} and J. {Cui} and H. {Fei}}, \r\n  title={ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering (Extended Abstract)}, \r\n  booktitle = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021, Chania, Crete, Greece, April 19-23, 2021},\r\n  pages     = {},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 3E-LDA: Three Enhancements to Linear Discriminant Analysis.\n \n \n \n\n\n \n Li, Y., Liu, B., Yu, Y., Li, H., Sun, J., & Cui, J.\n\n\n \n\n\n\n ACM Trans. Knowl. Discov. Data,in press. 2021.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ynLi2021TKDD,\r\n  author    = {Yanni Li and\r\n               Bing Liu and\r\n               Yongbo Yu and\r\n               Hui Li and\r\n               Jiacan Sun and\r\n               Jiangtao Cui},\r\n  title     = {3E-LDA: Three Enhancements to Linear Discriminant Analysis},\r\n  journal   = {{ACM} Trans. Knowl. Discov. Data},\r\n  volume    = {},\r\n  number    = {},\r\n  pages     = {in press},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SQE-GAN: a Supervised Query Expansion Scheme via GAN.\n \n \n \n\n\n \n Fu, T., Tian, Q., & Li, H.\n\n\n \n\n\n\n In Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2021, Lucca, Italy, March 28-April 1, 2021, Proceedings, Part I, pages in press, 2021. \n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{tlFu2021ECIR,\r\n  author    = {Tianle Fu and\r\n               Qi Tian and\r\n               Hui Li},\r\n  title     = {SQE-GAN: a Supervised Query Expansion Scheme via GAN},\r\n  booktitle = {Advances in Information Retrieval - 42nd European Conference on {IR}\r\n               Research, {ECIR} 2021, Lucca, Italy, March 28-April 1, 2021, Proceedings,\r\n               Part {I}},\r\n  pages     = {in press},\r\n  year      = {2021},\r\n  bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Publicly Verifiable Databases with All Efficient Updating Operations.\n \n \n \n\n\n \n Chen, X., Li, H., Li, J., Wang, Q., Huang, X., Susilo, W., & Xiang, Y.\n\n\n \n\n\n\n IEEE Transactions on Knowledge and Data Engineering,1-1. 2020.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9007366, \r\n  author={X. {Chen} and H. {Li} and J. {Li} and Q. {Wang} and X. {Huang} and W. {Susilo} and Y. {Xiang}}, \r\n  journal={IEEE Transactions on Knowledge and Data Engineering}, \r\n  title={Publicly Verifiable Databases with All Efficient Updating Operations}, \r\n  year={2020}, \r\n  volume={}, \r\n  number={}, \r\n  pages={1-1}, \r\n  doi={10.1109/TKDE.2020.2975777}, \r\n  ISSN={2326-3865}, \r\n  month={},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 面向加密数据的安全图像分类模型研究综述.\n \n \n \n\n\n \n 孙隆隆, 李辉, 于诗文, & 王迎雪\n\n\n \n\n\n\n 密码学报, 7(4): 525. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{sll525,\r\nauthor = {孙隆隆 and 李辉 and 于诗文 and 王迎雪},\r\ntitle = {面向加密数据的安全图像分类模型研究综述},\r\npublisher = {密码学报},\r\nyear = {2020},\r\njournal = {密码学报},\r\nvolume = {7},\r\nnumber = {4},\r\neid = {525},\r\nnumpages = {15},\r\npages = {525},\r\nkeywords = {图像分类;深度学习;隐私保护;同态加密;安全多方计算},\r\ndoi = {10.13868/j.cnki.jcr.000387}\r\n}    \r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Influential facilities placement over moving objects.\n \n \n \n\n\n \n Zhou, Y., Li, H., Li, D., Wang, M., & Cui, J.\n\n\n \n\n\n\n Distributed and Parallel Databases. Sep 2020.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Zhou2020,\r\nauthor={Zhou, Ying\r\nand Li, Hui\r\nand Li, Dan\r\nand Wang, Meng\r\nand Cui, Jiangtao},\r\ntitle={Influential facilities placement over moving objects},\r\njournal={Distributed and Parallel Databases},\r\nyear={2020},\r\nmonth={Sep},\r\nday={20},\r\nissn={1573-7578},\r\ndoi={10.1007/s10619-020-07311-0},\r\n  bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n   \r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Instance-aware Evaluation of Sensitive Columns in Tabular Dataset.\n \n \n \n\n\n \n Gong, Z., Zhao, K., Li, H., & Wang, Y.\n\n\n \n\n\n\n In Web and Big Data - the 4th International Joint Conference, APWeb-WAIM 2020, Tianjin, China, August 12-14, 2020, Proceedings, Part I, 2020. \n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SenseScore,\r\n  author    = {Zheng Gong and\r\n               Kechun Zhao and\r\n               Hui Li and\r\n               Yingxue Wang},\r\n  title     = {Instance-aware Evaluation of Sensitive Columns in Tabular Dataset},\r\n  booktitle = {Web and Big Data - the 4th International Joint Conference, APWeb-WAIM\r\n               2020, Tianjin, China, August 12-14, 2020, Proceedings, Part {I}},\r\n  pages     = {},\r\n  year      = {2020},\r\n    bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the vulnerability and generality of K-anonymity location privacy under continuous LBS requests.\n \n \n \n\n\n \n Dai, H., Li, H., Meng, X., & Wang, Y.\n\n\n \n\n\n\n In Web and Big Data - the 4th International Joint Conference, APWeb-WAIM 2020, Tianjin, China, August 12-14, 2020, Proceedings, Part I, 2020. \n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ktrajpriv,\r\n  author    = {Hanbo Dai and\r\n               Hui Li and\r\n               Xue Meng and\r\n               Yingxue Wang},\r\n  title     = {On the vulnerability and generality of K-anonymity location privacy under continuous LBS requests},\r\n  booktitle = {Web and Big Data - the 4th International Joint Conference, APWeb-WAIM\r\n               2020, Tianjin, China, August 12-14, 2020, Proceedings, Part {I}},\r\n  pages     = {},\r\n  year      = {2020},\r\n    bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n CHASSIS: Conformity Meets Online Information Diffusion.\n \n \n \n\n\n \n Li, H., Li, H., & Bhowmick, S. S\n\n\n \n\n\n\n In Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, Portland, OR, USA, June 14-19, 2020, 2020. ACM\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Lihui_SIGMODD20,\r\n  author    = {Hui Li and\r\n               Hui Li and\r\n               Sourav S Bhowmick},\r\n  title     = {CHASSIS: Conformity Meets Online Information Diffusion},\r\n  booktitle = {Proceedings of the 2020 International Conference on Management of\r\n               Data, {SIGMOD} Conference 2020, Portland, OR, USA, June 14-19, 2020},\r\n  pages     = {},\r\n  publisher = {{ACM}},\r\n  year      = {2020},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Target Privacy Preserving for Social Networks.\n \n \n \n\n\n \n Jiang, Z., Sun, L., Yu, P. S, Li, H., Ma, J., & Shen, Y.\n\n\n \n\n\n\n In 36th IEEE International Conference on Data Engineering, ICDE 2020, Dallas, Texas, USA, April 20-24, 2020, 2020. \n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Jiang_icde2020,\r\n  author    = {Zhongyuan Jiang and\r\n              Lichao Sun and\r\n              Philip S Yu and\r\n              Hui Li and\r\n              Jianfeng Ma and\r\n              Yulong Shen},\r\n  title     = {Target Privacy Preserving for Social Networks},\r\n  booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020, Dallas, Texas, USA, April 20-24, 2020},\r\n  pages     = {},\r\n  year      = {2020},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media.\n \n \n \n\n\n \n Li, H., Li, H., & Bhowmick, S. S\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Singapore, May 11-14, 2020, Proceedings, Part I, of Lecture Notes in Computer Science, 2020. Springer\n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Lihui_PAKDD20,\r\n  author    = {Hui Li and\r\n               Hui Li and\r\n               Sourav S Bhowmick},\r\n  title     = {BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media},\r\n  booktitle = {Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia\r\n               Conference, {PAKDD} 2020, Singapore, May 11-14, 2020, Proceedings,\r\n               Part {I}},\r\n  series    = {Lecture Notes in Computer Science},\r\n  volume    = {},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2020},\r\n    bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud.\n \n \n \n\n\n \n Wang, W., Li, H., Peng, Y., Bhowmick, S. S, Chen, P., Chen, X., & Cui, J.\n\n\n \n\n\n\n In Database Systems for Advanced Applications - 25th International Conference, DASFAA 2020, Jeju, Korea, May 21-24, 2020, of Lecture Notes in Computer Science, 2020. Springer\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DASFAA2020-SCALE,\r\n  author    = {Weiguo Wang and Hui Li and Yanguo Peng and Sourav S Bhowmick and Peng Chen and Xiaofeng Chen and Jiangtao Cui},\r\n  title     = {SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud},\r\n  booktitle = {Database Systems for Advanced Applications - 25th International Conference,\r\n               {DASFAA} 2020, Jeju, Korea, May 21-24, 2020},\r\n  series    = {Lecture Notes in Computer Science},\r\n  volume    = {},\r\n  pages     = {},\r\n  publisher = {Springer},\r\n  year      = {2020},\r\n    bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n MALOS: A Movement-Aware Location Selection System.\n \n \n \n\n\n \n Yang, D., Li, H., Li, D., Wang, M., & Cui, J.\n\n\n \n\n\n\n In Joint 2020 EDBT/ICDT Conferences, EDBT '20 Proceedings, Copenhagen, Denmark, March 30-April 2, 2020, 2020. \n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/edbt/Li20,\r\n  author    = {Di Yang and Hui Li and Dan Li and Meng Wang and Jiangtao Cui},\r\n  title     = {{MALOS:} A Movement-Aware Location Selection System},\r\n  booktitle = {Joint 2020 {EDBT/ICDT} Conferences, {EDBT} '20 Proceedings, Copenhagen, Denmark, March 30-April 2, 2020},\r\n  year      = {2020},\r\n  pages     = {},\r\n  bibbase_note = {<b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Mining the frequency of time-constrained serial episodes over massive data sequences and streams.\n \n \n \n\n\n \n Li, H., Li, Z., Peng, S., Li, J., & Tungom, C. E.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 110: 849–863. 2020.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/LiLPLT20,\r\n  author    = {Hui Li and\r\n               Zhe Li and\r\n               Sizhe Peng and\r\n               Jingjing Li and\r\n               Chia Emmanuel Tungom},\r\n  title     = {Mining the frequency of time-constrained serial episodes over massive\r\n               data sequences and streams},\r\n  journal   = {Future Gener. Comput. Syst.},\r\n  volume    = {110},\r\n  pages     = {849--863},\r\n  year      = {2020},\r\n  doi       = {10.1016/j.future.2019.11.008},\r\n  bibbase_note = {<a href="https://github.com/lihuixidian/ONCESpark"><i class="big github icon"></i></a><b class="ui primary basic mini button"><a href="/once">ONCE project homepage</a></b>},\r\n  bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n FROST: Movement History–Conscious Facility Relocation.\n \n \n \n\n\n \n Wang, M., Li, H., Cui, J., Bhowmick, S. S., & Liu, P.\n\n\n \n\n\n\n ACM Trans. Intell. Syst. Technol., 11(1). January 2020.\n \n\nMALOS project homepage\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{10.1145/3361740,\r\n  author = {Wang, Meng and Li, Hui and Cui, Jiangtao and Bhowmick, Sourav S. and Liu, Ping},\r\n  title = {FROST: Movement History–Conscious Facility Relocation},\r\n  year = {2020},\r\n  issue_date = {February 2020},\r\n  publisher = {Association for Computing Machinery},\r\n  address = {New York, NY, USA},\r\n  volume = {11},\r\n  number = {1},\r\n  issn = {2157-6904},\r\n  doi = {10.1145/3361740},\r\n  journal = {ACM Trans. Intell. Syst. Technol.},\r\n  month = jan,\r\n  articleno = {Article 9},\r\n  numpages = {26},\r\n  bibbase_note = {<a href="https://github.com/lihuixidian/frost-tist"><i class="big github icon"></i></a><b class="ui primary basic mini button"><a href="/malos">MALOS project homepage</a></b>}, \r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 基于最优排序的局部敏感哈希索引.\n \n \n \n\n\n \n 冯小康, 彭延国, 崔江涛, 刘英帆, & 李辉\n\n\n \n\n\n\n 计算机学报, 43(5): 930-947. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{xkf_xuebao,\r\n  author    = {冯小康 and 彭延国 and 崔江涛 and 刘英帆 and 李辉},\r\n  title     = {基于最优排序的局部敏感哈希索引},\r\n  journal = {计算机学报},\r\n  year    = {2020},\r\n  volume = {43},\r\n  number = {5},\r\n  pages   = {930-947},\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Pruneable sharding-based blockchain protocol.\n \n \n \n\n\n \n Feng, X., Ma, J., Miao, Y., Meng, Q., Liu, X., Jiang, Q., & Li, H.\n\n\n \n\n\n\n Peer-to-Peer Networking and Applications, 12(4): 934–950. 2019.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ppna/FengMMML0019,\r\n  author    = {Xiaoqin Feng and\r\n               Jianfeng Ma and\r\n               Yinbin Miao and\r\n               Qian Meng and\r\n               Ximeng Liu and\r\n               Qi Jiang and\r\n               Hui Li},\r\n  title     = {Pruneable sharding-based blockchain protocol},\r\n  journal   = {Peer-to-Peer Networking and Applications},\r\n  volume    = {12},\r\n  number    = {4},\r\n  pages     = {934--950},\r\n  year      = {2019},\r\n  doi       = {10.1007/s12083-018-0685-6},\r\n  bibbase_note = {<b class="ui blue label">CCF C</b>},\r\n  \r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Counting the frequency of time-constrained serial episodes in a streaming sequence.\n \n \n \n\n\n \n Li, H., Peng, S., Li, J., Li, J., Cui, J., & Ma, J.\n\n\n \n\n\n\n Inf. Sci., 505: 422–439. 2019.\n \n\nONCE project homepageCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LI2019insONCE,\r\n  author    = {Hui Li and\r\n               Sizhe Peng and\r\n               Jian Li and\r\n               Jingjing Li and\r\n               Jiangtao Cui and\r\n               Jianfeng Ma},\r\n  title     = {Counting the frequency of time-constrained serial episodes in a streaming\r\n               sequence},\r\n  journal   = {Inf. Sci.},\r\n  volume    = {505},\r\n  pages     = {422--439},\r\n  year      = {2019},\r\n  bibbase_note = {<a href="https://github.com/lihuixidian/ONCE-"><i class="big github icon"></i></a><b class="ui primary basic mini button"><a href="/once">ONCE project homepage</a></b><b class="ui purple label">CCF B</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n k-Collective Influential Facility Placement Over Moving Object.\n \n \n \n\n\n \n Li, D., Li, H., Wang, M., & Cui, J.\n\n\n \n\n\n\n In 20th IEEE International Conference on Mobile Data Management, MDM 2019, Hong Kong, SAR, China, June 10-13, 2019, pages 191–200, 2019. \n \n\nBest Paper Award Runner-upMALOS project homepageCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mdm/Li00C19,\r\n  author    = {Dan Li and\r\n               Hui Li and\r\n               Meng Wang and\r\n               Jiangtao Cui},\r\n  title     = {k-Collective Influential Facility Placement Over Moving Object},\r\n  booktitle = {20th {IEEE} International Conference on Mobile Data Management, {MDM}\r\n               2019, Hong Kong, SAR, China, June 10-13, 2019},\r\n  pages     = {191--200},\r\n  year      = {2019},\r\n  bibbase_note = {<b class="ui label red"><i class="trophy icon"></i>Best Paper Award Runner-up</b><b class="ui primary basic mini button"><a href="/malos">MALOS project homepage</a></b><b class="ui blue label">CCF C</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n IHP: improving the utility in differential private histogram publication.\n \n \n \n\n\n \n Li, H., Cui, J., Meng, X., & Ma, J.\n\n\n \n\n\n\n Distributed and Parallel Databases, 37(4): 721–750. Dec 2019.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Li2019_DAPD,\r\nauthor="Li, Hui\r\nand Cui, Jiangtao\r\nand Meng, Xue\r\nand Ma, Jianfeng",\r\ntitle="IHP: improving the utility in differential private histogram publication",\r\njournal="Distributed and Parallel Databases",\r\nyear="2019",\r\nmonth="Dec",\r\nday="01",\r\nvolume="37",\r\nnumber="4",\r\npages="721--750",\r\nissn="1573-7578",\r\ndoi="10.1007/s10619-018-07255-6",\r\nbibbase_note ={<b class="ui blue label">CCF C</b>}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An efficient LSH indexing on discriminative short codes for high-dimensional nearest neighbors.\n \n \n \n\n\n \n Feng, X., Cui, J., Li, H., & Liu, Y.\n\n\n \n\n\n\n Multimedia Tools Appl., 78(17): 24407–24429. 2019.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/FengCLL19,\r\n  author    = {Xiaokang Feng and\r\n               Jiangtao Cui and\r\n               Hui Li and\r\n               Yingfan Liu},\r\n  title     = {An efficient {LSH} indexing on discriminative short codes for high-dimensional\r\n               nearest neighbors},\r\n  journal   = {Multimedia Tools Appl.},\r\n  volume    = {78},\r\n  number    = {17},\r\n  pages     = {24407--24429},\r\n  year      = {2019},\r\n  doi       = {10.1007/s11042-018-6987-0},\r\n  bibbase_note ={<b class="ui blue label">CCF C</b>}\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys.\n \n \n \n\n\n \n Ma, X., Ma, J., Li, H., Jiang, Q., & Gao, S.\n\n\n \n\n\n\n IEEE Transactions on Services Computing,1. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@ARTICLE{8454831,\r\nauthor = {X. Ma and J. Ma and H. Li and Q. Jiang and S. Gao},\r\njournal = {IEEE Transactions on Services Computing},\r\ntitle = {PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys},\r\nyear = {2018},\r\nvolume = {},\r\nnumber = {},\r\npages = {1},\r\nkeywords={Cryptography;Machine learning;Training;Privacy;Data models;Data privacy;Computational modeling},\r\ndoi = {10.1109/TSC.2018.2868750},\r\nISSN = {1939-1374},\r\nmonth={}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 基于最优排序的局部敏感哈希索引.\n \n \n \n\n\n \n 冯小康, 彭延国, 崔江涛, 刘英帆, & 李辉\n\n\n \n\n\n\n In The 35th National Database Conference, China (NDBC'2018), 2018. \n \n\nBest Paper Award Runner-up Best Student Paper\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{ndbc18,\r\n  author    = {冯小康 and 彭延国 and 崔江涛 and 刘英帆 and 李辉},\r\n  title     = {基于最优排序的局部敏感哈希索引},\r\n  booktitle = {The 35th National Database Conference, China (NDBC'2018)},\r\n  year      = {2018},\r\n  bibbase_note = {<b class="ui label red"><i class="trophy icon"></i>Best Paper Award Runner-up</b> <b class="ui label red"><i class="trophy icon"></i>Best Student Paper</b>},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Targeted Influential Nodes Selection in Location-Aware Social Networks.\n \n \n \n\n\n \n Yang, S., Li, H., & Jiang, Z.\n\n\n \n\n\n\n Complexity, 2018: 1–10. nov 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Yang2018,\r\n  author  = {Susu Yang and Hui Li and Zhongyuan Jiang},\r\n  title   = {Targeted Influential Nodes Selection in Location-Aware Social Networks},\r\n  journal = {Complexity},\r\n  year    = {2018},\r\n  volume  = {2018},\r\n  pages   = {1--10},\r\n  month   = {nov},\r\n  doi     = {10.1155/2018/6101409},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Place Your Next Branch with MILE-RUN: Min-dist Location Selection over User Movement .\n \n \n \n\n\n \n Cui, J., Wang, M., Li, H., & Cai, Y.\n\n\n \n\n\n\n Information Sciences , 463–464: 1 - 20. 2018.\n \n\nMALOS project homepageCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Cui20181,\r\ntitle = "Place Your Next Branch with MILE-RUN: Min-dist Location Selection over User Movement ",\r\njournal = "Information Sciences ",\r\nvolume = "463–464",\r\nnumber = "",\r\npages = "1 - 20",\r\nyear = "2018",\r\nnote = "",\r\nissn = "0020-0255",\r\ndoi = "https://doi.org/10.1016/j.ins.2018.06.036",\r\nauthor = "Jiangtao Cui and Meng Wang and Hui Li and Yang Cai",\r\nbibbase_note = {<a href="https://github.com/lihuixidian/MILE-RUN"><i class="big github icon"></i></a><b class="ui primary basic mini button"><a href="/malos">MALOS project homepage</a></b><b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 一种面向位置信息的安全Skyline查询方案.\n \n \n \n\n\n \n 王维国, & 李辉\n\n\n \n\n\n\n 密码学报, 5(2): 218-230. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{wwg218,\r\nauthor = {王维国 and 李辉},\r\ntitle = {一种面向位置信息的安全Skyline查询方案},\r\npublisher = {密码学报},\r\nyear = {2018},\r\njournal = {密码学报},\r\nvolume = {5},\r\nnumber = {2},\r\nnumpages = {12},\r\npages = {218-230},\r\nkeywords = {Skyline计算;云计算;保序加密;R*树;位置信息},\r\ndoi = {10.13868/j.cnki.jcr.000233}\r\n}    \r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.\n \n \n \n\n\n \n Ma, X., Ma, J., Li, H., Jiang, Q., & Gao, S.\n\n\n \n\n\n\n Peer-to-Peer Networking and Applications, 11(3): 473–485. May 2018.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Ma2018aa,\r\nauthor="Ma, Xindi\r\nand Ma, Jianfeng\r\nand Li, Hui\r\nand Jiang, Qi\r\nand Gao, Sheng",\r\ntitle="AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service",\r\njournal="Peer-to-Peer Networking and Applications",\r\nyear="2018",\r\nmonth="May",\r\nday="01",\r\nvolume="11",\r\nnumber="3",\r\npages="473--485",\r\ndoi="10.1007/s12083-017-0545-9",\r\nbibbase_note ={<b class="ui blue label">CCF C</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.\n \n \n \n\n\n \n Ma, X., Ma, J., Li, H., Jiang, Q., & Gao, S.\n\n\n \n\n\n\n Future Generation Computer Systems, 79(1): 82 - 94. 2018.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Mali2018,\r\ntitle = "ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks",\r\njournal = "Future Generation Computer Systems",\r\nvolume = "79",\r\nnumber = "1",\r\npages = "82 - 94",\r\nyear = "2018",\r\nissn = "0167-739X",\r\nauthor = "Xindi Ma and Jianfeng Ma and Hui Li and Qi Jiang and Sheng Gao",\r\nbibbase_note ={<b class="ui blue label">CCF C</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Hidden Community Identification in Location-based Social Network via Probabilistic Venue Sequences .\n \n \n \n\n\n \n Li, H., Deng, K., Cui, J., Dong, Z., Ma, J., & Huang, J.\n\n\n \n\n\n\n Information Sciences , 422: 188 - 203. 2018.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Li2017,\r\ntitle = "Hidden Community Identification in Location-based Social Network via Probabilistic Venue Sequences ",\r\njournal = "Information Sciences ",\r\nvolume = "422",\r\nnumber = "",\r\npages = "188 - 203",\r\nyear = "2018",\r\nnote = "",\r\nissn = "0020-0255",\r\ndoi = "https://doi.org/10.1016/j.ins.2017.09.019",\r\nauthor = "Hui Li and Ke Deng and Jiangtao Cui and Zhenhua Dong and Jianfeng Ma and Jianbin Huang",\r\nbibbase_note ={<b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments.\n \n \n \n\n\n \n Xue, W., Li, H., Peng, Y., Cui, J., & Shi, Y.\n\n\n \n\n\n\n IEEE Trans. Big Data, 4(4): 586–599. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tbd/XueLPCS18,\r\n  author    = {Wenzhuo Xue and\r\n               Hui Li and\r\n               Yanguo Peng and\r\n               Jiangtao Cui and\r\n               Yu Shi},\r\n  title     = {Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced\r\n               Environments},\r\n  journal   = {{IEEE} Trans. Big Data},\r\n  volume    = {4},\r\n  number    = {4},\r\n  pages     = {586--599},\r\n  year      = {2018},\r\n  doi       = {10.1109/TBDATA.2017.2740954},\r\n  timestamp = {Sun, 23 Dec 2018 08:29:11 +0100},\r\n  biburl    = {https://dblp.org/rec/bib/journals/tbd/XueLPCS18},\r\n  bibsource = {dblp computer science bibliography, https://dblp.org}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n 支持用户撤销的多关键字密文查询方案.\n \n \n \n\n\n \n 伍祈应, 马建峰, 李辉, 张俊伟, 姜奇, & 苗银宾\n\n\n \n\n\n\n 通信学报, 38(08): 187-197. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{WQY_2017,\r\n  author  = {伍祈应 and 马建峰 and 李辉 and 张俊伟 and 姜奇 and 苗银宾},\r\n  title   = {支持用户撤销的多关键字密文查询方案},\r\n  journal = {通信学报},\r\n  year    = {2017},\r\n  volume = {38},\r\n  number = {08},\r\n  pages   = {187-197},\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Different strategies for differentially private histogram publication.\n \n \n \n\n\n \n Meng, X., Li, H., & Cui, J.\n\n\n \n\n\n\n Journal of Communications and Information Networks, 2(3): 68–77. Sep 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Meng2017,\r\nauthor="Meng, Xue\r\nand Li, Hui\r\nand Cui, Jiangtao",\r\ntitle="Different strategies for differentially private histogram publication",\r\njournal="Journal of Communications and Information Networks",\r\nyear="2017",\r\nmonth="Sep",\r\nday="01",\r\nvolume="2",\r\nnumber="3",\r\npages="68--77",\r\nissn="2509-3312",\r\ndoi="10.1007/s41650-017-0014-x",\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Spatiotemporal correlation-Aware dummy-Based privacy protection scheme for location-based services.\n \n \n \n\n\n \n Liu, H., Li, X., Li, H., Ma, J., & Ma, X.\n\n\n \n\n\n\n In 36th Annual IEEE International Conference on Computer Communications, INFOCOM 2017, Atalanta, GA, USA, May 1-4, 2017, pages 316–324, 2017. \n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/infocom/XHLi17,\r\n  author       = {Hai Liu and Xinghua Li and Hui Li and Jian-feng Ma and Xindi Ma},\r\n  title        = {Spatiotemporal correlation-Aware dummy-Based privacy protection scheme for location-based services},\r\n  booktitle    = {36th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2017, Atalanta, GA, USA, May 1-4, 2017},\r\n  year         = {2017},\r\n  pages        = {316--324},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n  crossref     = {DBLP:conf/infocom/2017},\r\n  doi          = {10.1109/INFOCOM.2016.7524331},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PINOCCHIO: Probabilistic Influence-Based Location Selection over Moving Objects.\n \n \n \n\n\n \n Wang, M., Li, H., Cui, J., Deng, K., Bhowmick, S. S., & Dong, Z.\n\n\n \n\n\n\n In 33rd IEEE International Conference on Data Engineering, ICDE 2017, San Diego, CA, USA, April 19-22, 2017, pages 21–22, 2017. \n \n\nCCF AMALOS project homepage\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/icde/Wang0CDBD17,\r\n  author       = {Meng Wang and Hui Li and Jiangtao Cui and Ke Deng and Sourav S. Bhowmick and Zhenhua Dong},\r\n  title        = {{PINOCCHIO:} Probabilistic Influence-Based Location Selection over Moving Objects},\r\n  booktitle    = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017, San Diego, CA, USA, April 19-22, 2017},\r\n  year         = {2017},\r\n  pages        = {21--22},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b><a href="https://github.com/lihuixidian/PINOCCHIO"><i class="big github icon"></i></a><b class="ui primary basic mini button"><a href="/malos">MALOS project homepage</a></b>},\r\n  bibsource    = {dblp computer science bibliography, http://dblp.org},\r\n  biburl       = {http://dblp.uni-trier.de/rec/bib/conf/icde/Wang0CDBD17},\r\n  crossref     = {DBLP:conf/icde/2017},\r\n  doi          = {10.1109/ICDE.2017.17},\r\n  timestamp    = {Wed, 24 May 2017 11:31:57 +0200},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Effective optimizations of cluster-based nearest neighbor search in high-dimensional space.\n \n \n \n\n\n \n Feng, X., Cui, J., Liu, Y., & Li, H.\n\n\n \n\n\n\n Multimedia Syst., 23(1): 139–153. 2017.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/mms/FengCLL17,\r\n  author    = {Xiaokang Feng and Jiangtao Cui and Yingfan Liu and Hui Li},\r\n  title     = {Effective optimizations of cluster-based nearest neighbor search in high-dimensional space},\r\n  journal   = {Multimedia Syst.},\r\n  year      = {2017},\r\n  volume    = {23},\r\n  number    = {1},\r\n  pages     = {139--153},\r\n  doi       = {10.1007/s00530-014-0444-3},\r\n  timestamp = {Fri, 26 May 2017 22:54:49 +0200},\r\n    bibbase_note ={<b class="ui blue label">CCF C</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 轻量级位置感知推荐系统隐私保护框架.\n \n \n \n\n\n \n 马鑫迪, 李辉, 马建峰, 习宁, 姜奇, 高胜, & 卢笛\n\n\n \n\n\n\n 计算机学报, (05): 1017-1030. may 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{xidima17,\r\n  author  = {马鑫迪 and 李辉 and 马建峰 and 习宁 and 姜奇 and 高胜 and 卢笛},\r\n  title   = {轻量级位置感知推荐系统隐私保护框架},\r\n  journal = {计算机学报},\r\n  year    = {2017},\r\n  number  = {05},\r\n  pages   = {1017-1030},\r\n  month   = {may},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 支持高效撤销的多机构属性加密方案.\n \n \n \n\n\n \n 张凯, 马建峰, 李辉, 张俊伟, & 张涛\n\n\n \n\n\n\n 通信学报, (03): 83-91. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{kaizhang17,\r\n  author  = {张凯 and 马建峰 and 李辉 and 张俊伟 and 张涛},\r\n  title   = {支持高效撤销的多机构属性加密方案},\r\n  journal = {通信学报},\r\n  year    = {2017},\r\n  number  = {03},\r\n  pages   = {83-91},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n APPLET: a privacy-preserving framework for location-aware recommender system.\n \n \n \n\n\n \n Ma, X., Li, H., Ma, J., Jiang, Q., Gao, S., Lu, D., & Xi, N.\n\n\n \n\n\n\n SCIENCE CHINA Information Sciences, 60(9): 092101:1–092101:16. 2017.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/chinaf/MaXD17,\r\n  author  = {Xindi Ma and Hui Li and Jianfeng Ma and Qi Jiang and Sheng Gao and Di Lu and Ning Xi},\r\n  title   = {APPLET: a privacy-preserving framework for location-aware recommender system},\r\n  journal = {{SCIENCE} {CHINA} Information Sciences},\r\n  year    = {2017},\r\n  volume  = {60},\r\n  number  = {9},\r\n  pages   = {092101:1--092101:16},\r\n    bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n hOPE: improved order preserving encryption with the power to homomorphic operations of ciphers.\n \n \n \n\n\n \n Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., & Peng, C.\n\n\n \n\n\n\n SCIENCE CHINA Information Sciences, 60(6): 062101:1–062101:15. 2017.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/chinaf/PengYG17,\r\n  author  = {Peng, Yanguo and Li, Hui and Cui, Jiangtao and Zhang, Junwei and Ma, Jianfeng and Peng, Changgen},\r\n  title   = {hOPE: improved order preserving encryption with the power to homomorphic operations of ciphers},\r\n  journal = {{SCIENCE} {CHINA} Information Sciences},\r\n  year    = {2017},\r\n  volume  = {60},\r\n  number  = {6},\r\n  pages   = {062101:1--062101:15},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.\n \n \n \n\n\n \n Peng, Y., Cui, J., Li, H., & Ma, J.\n\n\n \n\n\n\n Inf. Sci., 387: 146–164. 2017.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/isci/PengCLM17,\r\n  author    = {Yanguo Peng and Jiangtao Cui and Hui Li and Jianfeng Ma},\r\n  title     = {A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud},\r\n  journal   = {Inf. Sci.},\r\n  year      = {2017},\r\n  volume    = {387},\r\n  pages     = {146--164},\r\n  doi       = {10.1016/j.ins.2016.07.069},\r\n  timestamp = {Sat, 27 May 2017 14:24:43 +0200},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.\n \n \n \n\n\n \n Zhang, K., Li, H., Ma, J., & Liu, X.\n\n\n \n\n\n\n Science China Information Sciences, 61(3): 032102. Jun 2017.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Zhang2017,\r\n  author  = {Zhang, Kai and Li, Hui and Ma, Jianfeng and Liu, Ximeng},\r\n  title   = {Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability},\r\n  journal = {Science China Information Sciences},\r\n  year    = {2017},\r\n  volume  = {61},\r\n  number  = {3},\r\n  pages   = {032102},\r\n  month   = {Jun},\r\n  day     = {29},\r\n  doi     = {10.1007/s11432-016-9019-8},\r\n  issn    = {1869-1919},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., Cui, J., & Ma, J.\n\n\n \n\n\n\n CoRR, abs/1705.10977. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/corr/LiBCM17,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Jiangtao Cui and Jianfeng Ma},\r\n  title     = {Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization},\r\n  journal   = {CoRR},\r\n  year      = {2017},\r\n  volume    = {abs/1705.10977},\r\n  timestamp = {Wed, 07 Jun 2017 14:42:12 +0200},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n RTRC: a reputation-based incentive game model for trustworthy crowdsourcing service.\n \n \n \n\n\n \n Ma, X., Ma, J., Li, H., Jiang, Q., & Gao, S.\n\n\n \n\n\n\n China Communications, 13(12): 199-215. December 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{7897544,\r\n  author   = {X. Ma and J. Ma and H. Li and Q. Jiang and S. Gao},\r\n  title    = {RTRC: a reputation-based incentive game model for trustworthy crowdsourcing service},\r\n  journal  = {China Communications},\r\n  year     = {2016},\r\n  volume   = {13},\r\n  number   = {12},\r\n  pages    = {199-215},\r\n  month    = {December},\r\n  doi      = {10.1109/CC.2016.7897544},\r\n  issn     = {1673-5447},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm.\n \n \n \n\n\n \n Li, Y., Li, H., Duan, T., Wang, S., Wang, Z., & Cheng, Y.\n\n\n \n\n\n\n In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016, pages 1725–1734, 2016. \n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/kdd/LiLDWWC16,\r\n  author       = {Yanni Li and Hui Li and Tihua Duan and Sheng Wang and Zhi Wang and Yang Cheng},\r\n  title        = {A Real Linear and Parallel Multiple Longest Common Subsequences {(MLCS)} Algorithm},\r\n  booktitle    = {Proceedings of the 22nd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016},\r\n  year         = {2016},\r\n  pages        = {1725--1734},\r\n  bibbase_note = {<b class="ui orange label">CCF A</b>},\r\n  bibsource    = {dblp computer science bibliography, http://dblp.org},\r\n  biburl       = {http://dblp.uni-trier.de/rec/bib/conf/kdd/LiLDWWC16},\r\n  crossref     = {DBLP:conf/kdd/2016},\r\n  doi          = {10.1145/2939672.2939842},\r\n  timestamp    = {Tue, 09 Aug 2016 09:42:25 +0200},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Improving the utility in differential private histogram publishing: Theoretical study and practice.\n \n \n \n\n\n \n Li, H., Cui, J., Lin, X., & Ma, J.\n\n\n \n\n\n\n In 2016 IEEE International Conference on Big Data, BigData 2016, Washington DC, USA, December 5-8, 2016, pages 1100–1109, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/bigdataconf/LiCLM16,\r\n  author    = {Hui Li and Jiangtao Cui and Xiaobin Lin and Jianfeng Ma},\r\n  title     = {Improving the utility in differential private histogram publishing: Theoretical study and practice},\r\n  booktitle = {2016 {IEEE} International Conference on Big Data, BigData 2016, Washington DC, USA, December 5-8, 2016},\r\n  year      = {2016},\r\n  pages     = {1100--1109},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/bigdataconf/LiCLM16},\r\n  crossref  = {DBLP:conf/bigdataconf/2016},\r\n  doi       = {10.1109/BigData.2016.7840713},\r\n  timestamp = {Fri, 26 May 2017 00:51:47 +0200},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PINOCCHIO: Probabilistic Influence-Based Location Selection over Moving Objects.\n \n \n \n\n\n \n Wang, M., Li, H., Cui, J., Deng, K., Bhowmick, S. S., & Dong, Z.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 28(11): 3068–3082. 2016.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/tkde/Wang0CDBD16,\r\n  author       = {Meng Wang and Hui Li and Jiangtao Cui and Ke Deng and Sourav S. Bhowmick and Zhenhua Dong},\r\n  title        = {{PINOCCHIO:} Probabilistic Influence-Based Location Selection over Moving Objects},\r\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\r\n  year         = {2016},\r\n  volume       = {28},\r\n  number       = {11},\r\n  pages        = {3068--3082},\r\n  doi          = {10.1109/TKDE.2016.2580138},\r\n  timestamp    = {Sat, 20 May 2017 00:24:23 +0200},\r\n    bibbase_note ={<b class="ui orange label">CCF A</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An intelligent movie recommendation system through group-level sentiment analysis in microblogs.\n \n \n \n\n\n \n Li, H., Cui, J., Shen, B., & Ma, J.\n\n\n \n\n\n\n Neurocomputing, 210: 164–173. 2016.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/ijon/LiCSM16,\r\n  author    = {Hui Li and Jiangtao Cui and Bingqing Shen and Jianfeng Ma},\r\n  title     = {An intelligent movie recommendation system through group-level sentiment analysis in microblogs},\r\n  journal   = {Neurocomputing},\r\n  year      = {2016},\r\n  volume    = {210},\r\n  pages     = {164--173},\r\n  doi       = {10.1016/j.neucom.2015.09.134},\r\n  timestamp = {Sat, 20 May 2017 00:24:57 +0200},\r\n    bibbase_note ={<b class="ui blue label">CCF C</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dimensionality reduction for histogram features: A distance-adaptive approach.\n \n \n \n\n\n \n Cui, M., Cui, J., & Li, H.\n\n\n \n\n\n\n Neurocomputing, 173: 181–195. 2016.\n \n\nCCF C\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/ijon/CuiC016,\r\n  author    = {Miaomiao Cui and Jiangtao Cui and Hui Li},\r\n  title     = {Dimensionality reduction for histogram features: {A} distance-adaptive approach},\r\n  journal   = {Neurocomputing},\r\n  year      = {2016},\r\n  volume    = {173},\r\n  pages     = {181--195},\r\n  doi       = {10.1016/j.neucom.2015.03.123},\r\n  timestamp = {Sat, 20 May 2017 00:25:00 +0200},\r\n    bibbase_note ={<b class="ui blue label">CCF C</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.\n \n \n \n\n\n \n Zhang, K., Ma, J., Liu, J., & Li, H.\n\n\n \n\n\n\n SCIENCE CHINA Information Sciences, 59(9): 99105. 2016.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/chinaf/ZhangMLL16,\r\n  author    = {Kai Zhang and Jianfeng Ma and Jiajia Liu and Hui Li},\r\n  title     = {Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption},\r\n  journal   = {{SCIENCE} {CHINA} Information Sciences},\r\n  year      = {2016},\r\n  volume    = {59},\r\n  number    = {9},\r\n  pages     = {99105},\r\n  doi       = {10.1007/s11432-016-0012-9},\r\n  timestamp = {Wed, 17 May 2017 14:25:36 +0200},\r\n    bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.\n \n \n \n\n\n \n Ying, Z., Li, H., Ma, J., Zhang, J., & Cui, J.\n\n\n \n\n\n\n SCIENCE CHINA Information Sciences, 59(4): 042701:1–042701:16. 2016.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/chinaf/Ying0MZC16,\r\n  author    = {Zuobin Ying and Hui Li and Jianfeng Ma and Junwei Zhang and Jiangtao Cui},\r\n  title     = {Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating},\r\n  journal   = {{SCIENCE} {CHINA} Information Sciences},\r\n  year      = {2016},\r\n  volume    = {59},\r\n  number    = {4},\r\n  pages     = {042701:1--042701:16},\r\n  doi       = {10.1007/s11432-015-5428-1},\r\n  timestamp = {Wed, 17 May 2017 14:25:35 +0200},\r\n    bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., Cui, J., Gao, Y., & Ma, J.\n\n\n \n\n\n\n In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31 - June 4, 2015, pages 1525–1537, 2015. \n \n\nBest Paper Award Nomination CCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/sigmod/LiBCGM15,\r\n  author       = {Hui Li and Sourav S. Bhowmick and Jiangtao Cui and Yunjun Gao and Jianfeng Ma},\r\n  title        = {GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks},\r\n  booktitle    = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on Management of Data, Melbourne, Victoria, Australia, May 31 - June 4, 2015},\r\n  year         = {2015},\r\n  pages        = {1525--1537},\r\n  bibbase_note = {<b class="ui label red"><i class="trophy icon"></i>Best Paper Award Nomination</b> <b class="ui orange label">CCF A</b>},\r\n  bibsource    = {dblp computer science bibliography, http://dblp.org},\r\n  biburl       = {http://dblp.uni-trier.de/rec/bib/conf/sigmod/LiBCGM15},\r\n  crossref     = {DBLP:conf/sigmod/2015},\r\n  doi          = {10.1145/2723372.2723710},\r\n  timestamp    = {Thu, 12 Nov 2015 16:33:38 +0100},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Backward Path Growth for Efficient Mobile Sequential Recommendation.\n \n \n \n\n\n \n Huang, J., Huangfu, X., Sun, H., Li, H., Zhao, P., Cheng, H., & Song, Q.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 27(1): 46–60. 2015.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/tkde/HuangHSLZCS15,\r\n  author       = {Jianbin Huang and Xuejun Huangfu and Heli Sun and Hui Li and Peixiang Zhao and Hong Cheng and Qinbao Song},\r\n  title        = {Backward Path Growth for Efficient Mobile Sequential Recommendation},\r\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\r\n  year         = {2015},\r\n  volume       = {27},\r\n  number       = {1},\r\n  pages        = {46--60},\r\n  doi          = {10.1109/TKDE.2014.2298012},\r\n  timestamp    = {Sat, 20 May 2017 00:24:20 +0200},\r\n    bibbase_note ={<b class="ui orange label">CCF A</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Social Influence Study in Online Networks: A Three-Level Review.\n \n \n \n\n\n \n Li, H., Cui, J., & Ma, J.\n\n\n \n\n\n\n J. Comput. Sci. Technol., 30(1): 184–199. 2015.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/jcst/LiCM15,\r\n  author    = {Hui Li and Jiangtao Cui and Jian{-}Feng Ma},\r\n  title     = {Social Influence Study in Online Networks: {A} Three-Level Review},\r\n  journal   = {J. Comput. Sci. Technol.},\r\n  year      = {2015},\r\n  volume    = {30},\r\n  number    = {1},\r\n  pages     = {184--199},\r\n  doi       = {10.1007/s11390-015-1512-7},\r\n  timestamp = {Sun, 28 May 2017 13:21:14 +0200},\r\n    bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Conformity-aware influence maximization in online social networks.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., Sun, A., & Cui, J.\n\n\n \n\n\n\n VLDB J., 24(1): 117–141. 2015.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/vldb/0005BSC15,\r\n  author       = {Hui Li and Sourav S. Bhowmick and Aixin Sun and Jiangtao Cui},\r\n  title        = {Conformity-aware influence maximization in online social networks},\r\n  journal      = {{VLDB} J.},\r\n  year         = {2015},\r\n  volume       = {24},\r\n  number       = {1},\r\n  pages        = {117--141},\r\n  doi          = {10.1007/s00778-014-0366-x},\r\n  timestamp    = {Sun, 28 May 2017 13:19:16 +0200},\r\n    bibbase_note ={<b class="ui orange label">CCF A</b>},\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n UGC-driven social influence study in online micro-blogging sites.\n \n \n \n\n\n \n Li, H., Shen, B., Cui, J., & Ma, J.\n\n\n \n\n\n\n China Communications, 11(12): 141-151. Dec 2014.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{7019848,\r\n  author   = {H. Li and B. Shen and J. Cui and J. Ma},\r\n  title    = {UGC-driven social influence study in online micro-blogging sites},\r\n  journal  = {China Communications},\r\n  year     = {2014},\r\n  volume   = {11},\r\n  number   = {12},\r\n  pages    = {141-151},\r\n  month    = {Dec},\r\n  doi      = {10.1109/CC.2014.7019848},\r\n  issn     = {1673-5447},\r\n }\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Affinity-driven blog cascade analysis and prediction.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., Sun, A., & Cui, J.\n\n\n \n\n\n\n Data Min. Knowl. Discov., 28(2): 442–474. 2014.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/datamine/LiBSC14,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun and Jiangtao Cui},\r\n  title     = {Affinity-driven blog cascade analysis and prediction},\r\n  journal   = {Data Min. Knowl. Discov.},\r\n  year      = {2014},\r\n  volume    = {28},\r\n  number    = {2},\r\n  pages     = {442--474},\r\n  doi       = {10.1007/s10618-013-0307-0},\r\n  timestamp = {Mon, 05 Jun 2017 20:48:51 +0200},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SK-LSH: An Efficient Index Structure for Approximate Nearest Neighbor Search.\n \n \n \n\n\n \n Liu, Y., Cui, J., Huang, Z., Li, H., & Shen, H. T.\n\n\n \n\n\n\n PVLDB, 7(9): 745–756. 2014.\n \n\nCCF A\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/pvldb/LiuCHLS14,\r\n  author       = {Yingfan Liu and Jiangtao Cui and Zi Huang and Hui Li and Heng Tao Shen},\r\n  title        = {{SK-LSH:} An Efficient Index Structure for Approximate Nearest Neighbor Search},\r\n  journal      = {{PVLDB}},\r\n  year         = {2014},\r\n  volume       = {7},\r\n  number       = {9},\r\n  pages        = {745--756},\r\n  timestamp    = {Wed, 06 Aug 2014 19:55:24 +0200},\r\n    bibbase_note ={<b class="ui orange label">CCF A</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n CINEMA: conformity-aware greedy algorithm for influence maximization in online social networks.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., & Sun, A.\n\n\n \n\n\n\n In Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013, pages 323–334, 2013. \n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/edbt/LiBS13,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun},\r\n  title     = {{CINEMA:} conformity-aware greedy algorithm for influence maximization in online social networks},\r\n  booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa, Italy, March 18-22, 2013},\r\n  year      = {2013},\r\n  pages     = {323--334},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/edbt/LiBS13},\r\n  crossref  = {DBLP:conf/edbt/2013},\r\n  doi       = {10.1145/2452376.2452415},\r\n  timestamp = {Wed, 06 Aug 2014 19:55:24 +0200},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficient nearest neighbor search for visual features based on hyperplane bounds.\n \n \n \n\n\n \n Cui, J., Liu, Y., & Li, H.\n\n\n \n\n\n\n In IEEE International Conference on Image Processing, ICIP 2013, Melbourne, Australia, September 15-18, 2013, pages 2592–2596, 2013. \n \n\nCCF C\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/icip/CuiJ13,\r\n  author    = {Jiangtao Cui and Yingfan Liu and Hui Li},\r\n  title     = {Efficient nearest neighbor search for visual features based on hyperplane bounds},\r\n  booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2013, Melbourne, Australia, September 15-18, 2013},\r\n  year      = {2013},\r\n  pages     = {2592--2596},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  crossref  = {DBLP:conf/icip/2013},\r\n  bibbase_note ={<b class="ui blue label">CCF C</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n CASINO: towards conformity-aware social influence analysis in online social networks.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., & Sun, A.\n\n\n \n\n\n\n In Proceedings of the 20th ACM Conference on Information and Knowledge Management, CIKM 2011, Glasgow, United Kingdom, October 24-28, 2011, pages 1007–1012, 2011. \n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/cikm/LiBS11,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun},\r\n  title     = {{CASINO:} towards conformity-aware social influence analysis in online social networks},\r\n  booktitle = {Proceedings of the 20th {ACM} Conference on Information and Knowledge Management, {CIKM} 2011, Glasgow, United Kingdom, October 24-28, 2011},\r\n  year      = {2011},\r\n  pages     = {1007--1012},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cikm/LiBS11},\r\n  crossref  = {DBLP:conf/cikm/2011},\r\n  doi       = {10.1145/2063576.2063721},\r\n  timestamp = {Wed, 06 Aug 2014 19:55:24 +0200},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n AffRank: Affinity-driven ranking of products in online social rating networks.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., & Sun, A.\n\n\n \n\n\n\n JASIST, 62(7): 1345–1359. 2011.\n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{DBLP:journals/jasis/LiBS11,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun},\r\n  title     = {AffRank: Affinity-driven ranking of products in online social rating networks},\r\n  journal   = {JASIST},\r\n  year      = {2011},\r\n  volume    = {62},\r\n  number    = {7},\r\n  pages     = {1345--1359},\r\n  doi       = {10.1002/asi.21555},\r\n  timestamp = {Sun, 28 May 2017 13:23:04 +0200},\r\n    bibbase_note ={<b class="ui purple label">CCF B</b>},\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Affinity-driven prediction and ranking of products in online product review sites.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., & Sun, A.\n\n\n \n\n\n\n In Proceedings of the 19th ACM Conference on Information and Knowledge Management, CIKM 2010, Toronto, Ontario, Canada, October 26-30, 2010, pages 1745–1748, 2010. \n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/cikm/LiBS10,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun},\r\n  title     = {Affinity-driven prediction and ranking of products in online product review sites},\r\n  booktitle = {Proceedings of the 19th {ACM} Conference on Information and Knowledge Management, {CIKM} 2010, Toronto, Ontario, Canada, October 26-30, 2010},\r\n  year      = {2010},\r\n  pages     = {1745--1748},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cikm/LiBS10},\r\n  crossref  = {DBLP:conf/cikm/2010},\r\n  doi       = {10.1145/1871437.1871719},\r\n  timestamp = {Wed, 06 Aug 2014 19:55:24 +0200},\r\n  bibbase_note ={<b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Blog cascade affinity: analysis and prediction.\n \n \n \n\n\n \n Li, H., Bhowmick, S. S., & Sun, A.\n\n\n \n\n\n\n In Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pages 1117–1126, 2009. \n \n\nCCF B\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{DBLP:conf/cikm/LiBS09,\r\n  author    = {Hui Li and Sourav S. Bhowmick and Aixin Sun},\r\n  title     = {Blog cascade affinity: analysis and prediction},\r\n  booktitle = {Proceedings of the 18th {ACM} Conference on Information and Knowledge Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009},\r\n  year      = {2009},\r\n  pages     = {1117--1126},\r\n  bibsource = {dblp computer science bibliography, http://dblp.org},\r\n  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cikm/LiBS09},\r\n  crossref  = {DBLP:conf/cikm/2009},\r\n  doi       = {10.1145/1645953.1646095},\r\n  timestamp = {Wed, 06 Aug 2014 19:55:24 +0200},\r\nbibbase_note ={<b class="ui purple label">CCF B</b>}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);