Content

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus viverra, eros sed ullamcorper adipiscing, dolor ante aliquam justo, sed mollis turpis augue ut nisl. Nunc id orci metus, a rhoncus massa. In hac habitasse platea dictumst. Fusce sit amet arcu a dui mattis ultricies.

Journal Articles

  1. Feng Liu, Shengbin Wang, Yuan Hong and Xiaohang Yue, On the Robust and Stable Flowshop Scheduling under Stochastic and Dynamic Disruptions, IEEE Transactions on Engineering Management (TEM), Accepted, 2017.
  2. Yuan Hong, Wen Ming Liu and Lingyu Wang, Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status, IEEE Transactions on Information Forensics and Security (TIFS), Accepted, 2017. [PDF]
  3. Yuan Hong, Shengbin Wang and Ziyue Huang, Efficient Energy Consumption Scheduling: Towards Effective Load Leveling, Energies Journal, Accepted, 2017. [PDF, Impact Factor: 2.077]
  4. Yuan Hong, Sanjay Goel and Wen Ming Liu, An Efficient and Privacy Preserving Scheme for Energy Exchange among Smart Microgrids, International Journal of Energy Research (IJER), Vol. 40(3), pp. 313-331, March 2016, Wiley. [Impact Factor: 2.529]
  5. Yuan Hong, Jaideep Vaidya, Haibing Lu and Wen Ming Liu, Accurate and Efficient Query Clustering via Top Ranked Search Results, Web Intelligence Journal, Vol. 14(2), pp. 119-138, 2016, IOS Press. [PDF]
  6. M. Shekhawat, S. Deshmukh, G., Monroy, A. Tiwari, X. He, H. Shin, Y. Hong and H. Lu, Usability Test of Personality Type within a Roommate Matching Website: A Case Study, Journal of International Technology and Information Managmeent (JITIM), International Information Management Association (IIMA), Vol. 25(1), Article 5, 2016.
  7. Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel, Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12(5), pp. 504-518, 2015, IEEE Computer Society. [PDF]
  8. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, Towards User-Oriented RBAC Model, Journal of Computer Security (JCS), Vol. 23(1), pp. 107-129, 2015, IOS Press. [PDF]
  9. Yuan Hong, Jaideep Vaidya and Shengbin Wang, A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications, AAA Journal of Information Systems (JIS), Vol. 28(1), pp. 243-268, 2014, American Accounting Association. [PDF]
  10. Yuan Hong and Jaideep Vaidya, An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Programs, Optimization Letters (Optim Lett), Vol. 8(1), pp. 267-277, 2014, Springer-Verlag. [PDF]
  11. Yuan Hong, Jaideep Vaidya and Haibing Lu, Secure and Efficient Distributed Linear Programming, Journal of Computer Security (JCS), Vol. 20(5), pp. 583-634, 2012, IOS Press. [PDF]
  12. Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong, Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition, IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Data & Application Security, Vol. 9(5), pp. 655-669, 2012, IEEE Computer Society. [PDF]

Refereed Conference/Workshop/Poster Papers

  1. Yuan Hong, Sanjay Goel, Haibing Lu and Shengbin Wang, Discovering Energy Communities for Microgrids on the Power Grid, in Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm '17), Dresden, Germany, Oct 23-26, 2017, Accepted. [PDF]
  2. Yumei Chen, Yuan Hong and Theresa Pardo, Integrating Data Masking Standards and Applications into Open Government Data, in Proceedings of 2016 IFIP EGOV/ePart (EGOV '16) Conference, Guimarães, Portugal, Page 384-385, IOS Press. [PDF]
  3. Yuan Hong, Wen Ming Liu and Lingyu Wang, Privacy-preserving Smart Meter Streaming Against Inference Attacks, the 37th IEEE Symposium on Security and Privacy (S & P '16), San Jose, CA, 2016. [Poster Abstract, IEEE]
  4. Ersin Dincelli, Yuan Hong and Nic DePaula, Homophily Effects on Diffusion of Ideas and Opinion Change: The Case of the Gezi Park Protests, in Proceedings of the 2016 Annual Meeting of the Association for Information Science and Technology (ASIS&T '16), Copenhagen, Denmark, 2016. [PDF, ACM] 
  5. Justin Giboney, Joseph Buckman and Yuan Hong, Social Media is Weakening Passwords, AIS SIGSEC Workshop in Information Security and Privacy (WISP '15), in Conjunction with the International Conference on Information Systems (ICIS '15), Ft. Worth, TX, 2015. [Article 3]
  6. Nicholas Rizzo, Ethan Sprissler, Yuan Hong and Sanjay Goel, Privacy Preserving Driving Style Recognition, in Proceedings of 2015 IEEE International Conference on Connected Vehicles and Expo (ICCVE '15), Nov. 2015, Shenzhen, China. [PDF, Page 232-237, IEEE]
  7. Yuan Hong, Jaideep Vaidya, Haibing Lu and Lingyu Wang, Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure, in Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '14), July 14-16, 2014, Vienna, Austria. [PDF, Page 179-194, Springer]
  8. Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang and Lian Duan, Dynamic Workflow Adjustment with Security Constraints, in Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '14), July 14-16, 2014, Vienna, Austria. [PDF, Page 211-226, Springer]
  9. Jaideep Vaidya, Anirban Basu, Basit Shafiq and Yuan Hong, Differentially Private Naive Bayes Classification, in Proceedings of the 12th IEEE/WIC/ACM International Conference on Web Intelligence (WI '13), Nov. 17-20, 2013, Atlanta, GA, USA. [PDF, Page 571-576, IEEE]
  10. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, Towards User-Oriented RBAC Model, in Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '13), July 15-17, 2013, Newark, NJ, USA. [PDF, Page 81-96, Springer]
  11. Haibing Lu, Yuan Hong, Nick Street, Fei Wang and Hanghang Tong, Overlapping Clustering with Sparseness Constraints, in Proceedings of the 2012 International Conference on Data Mining Workshops, December 10-13, 2012, Brussels, Belgium. [PDF, Page 486-494, IEEE]
  12. Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam and Vijay Atluri, Privacy Preserving Subgraph Discovery, in Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '12), July 11-13, 2012, Paris, France. [PDF, Page 161-176, Springer]
  13. Yuan Hong, Jaideep Vaidya, Haibing Lu and Mingrui Wu, Differentially Private Search Log Sanitization with Optimal Output Utility, in Proceedings of the 15th International Conference on Extending Database Technology (EDBT '12), March 26-30, 2012, Berlin, Germany. (Acceptance Rate: 22.5%) [PDF, Page 50-61, ACM]
  14. Yuan Hong, Jaideep Vaidya, Haibing Lu and Basit Shafiq, Privacy-preserving Tabu Search for Distributed Graph Coloring, in Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT '11), October 9-11, 2011, MIT, Boston, USA. (Acceptance Rate: 8%) [PDF, Page 951-958, IEEE]
  15. Yuan Hong, Jaideep Vaidya and Haibing Lu, Search Engine Query Clustering using Top-k Search Results, in Proceedings of the 10th IEEE/WIC/ACM International Conference on Web Intelligence (WI '11), August 22-27, 2011, Lyon, France. (Acceptance Rate: 20.5%) [PDF, Page 112-119, IEEE]
  16. Yuan Hong, Jaideep Vaidya and Haibing Lu, Efficient Distributed Linear Programming with Limited Disclosure, in Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC '11), July 11-13, 2011, Richmond, Virginia, USA. [PDF, Page 170-185, Springer]
  17. Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong, Extended Boolean Matrix Decomposition, in Proceedings of the 2009 International Conference on Data Mining (ICDM '09), December 6-9,2009, Miami, Florida, USA. (Acceptance Rate: 8.9%) [PDF, Page 317-326, IEEE]
  18. Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil Adam and Vijayalakshmi Atluri, Effective Anonymization of Query Logs, in Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM '09), November 2-6, 2009, Hong Kong, China. (Acceptance Rate: 20.2%) [PDF, Page 1465-1468, ACM]
  19. Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang and Rachida Dssouli,  Preserving Privacy in e-Health Systems using Hippocratic Databases, in Proceedings of the 32nd Annual International Computer Software and Applications Conference (COMPSAC 2008), July 28-August 1, 2008, Turku, Finland. [PDF, Page 692-697, IEEE]
  20. Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang and Rachida Dssouli,  Securing Tele-health Applications in a Web-based e-Health Portal, in Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008), March 4-7, 2008, Barcelona, Spain. (Acceptance Rate: 21.1%) [PDF, Page 3-9, IEEE]
  21. Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang and Rachida Dssouli, A Hierarchical Approach to the Specification of Privacy Preferences, in Proceedings of the 4th International Conference on Innovations in Information Technology, IEEE, Nov. 2007. [Page 660-664, IEEE]
  22. Shuo Lu, Yuan Hong, Qian Liu, Lingyu Wang and Rachida Dssouli, Access Control in e-Health Portal Systems, in Proceedings of the 4th International Conference on Innovations in Information Technology, IEEE, Nov. 2007. [Page 88-92, IEEE]

Book and Book Chapters

  • Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou and Dariusz Kaloza, Smart Grid Security, Springer, London, ISBN 978-1-4471-6662-7, 129 pages, 2015.

Theses, Technical Reports and Preprints

  1. Data Anonymization and Its Effects on Personal Privacy, Undergraduate Honor Thesis, University at Albany, SUNY, 2015.
  2. Privacy-preserving Collaborative Optimization, Ph.D. Dissertation, Rutgers University, 2013.
  3. Differentially Private Search Log Sanitization with Optimal Output Utility, Computing Research Repository (Corr), August 2011.
  4. Secure Transformation for Multiparty Linear Programming, Rutgers University, 2011.
  5. Preserving Privacy in Web-based e-Health Systems, Master Thesis, Concordia University, 2008.
  6. Implementing Web-based e-Health Portal Systems, Concordia University, 2007