Yuan Hong

Position: Assistant Professor
Office: (518) 956-8379
Email: hong@albany.edu
Website: Curriculum Vitae

Home Page: https://www.albany.edu/faculty/hong/


Ph.D., Information Technology, Rutgers, The State University of New Jersey, 2013
M.Sc., Computer Science, Concordia University, Montreal, Canada, 2008
B.Sc., Management Information Systems, Beijing Institute of Technology, China, 2004

Research Interests

Security & Privacy
Digital Forensics
Data Management & Analysis
Supply Chain Management

Selected Publications

Y. Hong, J. Vaidya, H. Lu, P. Karras and S. Goel, "Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility", IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Computer Society, Forthcoming.

H. Lu, Y. Hong, Y. Yang, L. Duan and N. Badar, "Towards User-Oriented RBAC Model", Journal of Computer Security (JCS), IOS Press, Forthcoming.

Y. Hong, J. Vaidya and S. Wang, "A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications", Journal of Information Systems (JIS), Vol. 28(1), pp. 243-268, 2014, AAA.

Y. Hong and J. Vaidya, "An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Programs", Optimization Letters (Optim Lett), Vol. 8(1), pp. 267-277, 2014, Springer.

Y. Hong, J. Vaidya and H. Lu, "Secure and Efficient Distributed Linear Programming", Journal of Computer Security (JCS), Vol. 20(5), pp. 583-634, 2012, IOS Press.

Y. Hong, J. Vaidya, H. Lu and M. Wu, "Differentially Private Search Log Sanitization with Optimal Output Utility", in Proceedings of the 15th ACM International Conference on Extending Database Technology (EDBT '12), pp. 50-61, ACM.

H. Lu, J. Vaidya, V. Atluri and Y. Hong, "Constraint-aware Role Mining via Extended Boolean Matrix Decomposition", IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 9(5), pp. 655-669, 2012, IEEE Computer Society.

Y. Hong, X. He, J. Vaidya, N. Adam and V. Atluri, "Effective Anonymization of Query Logs", in Proceedings of the 18th ACM International Conference on Information and Knowledge Management (CIKM '09), pp. 1465-1468, ACM.