Assistant Professor 
Department of Operations Management and Information Systems
The Leavey School of Business
Santa Clara University
216F, Lucas Hall, 500 El Camino Real, Santa Clara, California 95053
(408)-554-2775
hlu (AT) scu.edu

Education

  • Ph.D., Management (Information Technology), Rutgers University, 2011.
  • M.S., Mathematics, Xi'an Jiaotong University (China), 2005.
  • B.S., Mathematics, Xi'an Jiaotong University (China), 2002.

Work Experience

  • Assistant Professor, Santa Clara University, 2011 - present.
  • Visiting Assistant Professor, Singapore Management University, Oct - Nov 2014
  • Research Fellow, Singapore Management University, 2005 - 2006.

Research Interests

  • Information Security & Privacy
    • Access Control
    • Statistical Inference Control
    • Secure Multiple-Party Computation
    • Data Anonymization
    • Security Issues in Cloud Computing
  • Data Mining
    • Binary Data Anaysis
    • Recommender System
    • Community Detection
    • Clustering of High-Dimensional Data 

Publications
Journal Papers

  1. Yuan Hong, Jaideep Vaidya, Haibing Lu and Wen Ming Liu, 2016.  Accurate and Efficient Query Clustering via Top Ranked Search Results. Web Intelligence Journal, forthcoming.
  2. Xiaoyun He and Haibing Lu, 2016. Catch a Fad or Capture a Value? Social Media Leverage in SMEs. Journal of Organizational and End User Computing, forthcoming.
  3. Heechang Shin and Haibing Lu, 2016. Towards Trajectory Anonymization Using Multi-dimensional Index Structures.  International Journal of Business Continuity and Risk Management, forthcoming.
  4. Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He , Heechang Shin, Yuan Hong, and Haibing Lu, 2016.  Usability Test of Personality Type within a Roommate Matching Website: A Case Study, Journal of International Technology and Information Management, forthcoming.
  5. Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Wen, Youcheng Zhang, and Kim-Kwang Raymond Choo, 2015. Cloud Based Data Sharing with Fine-grained Proxy Re-encryption. Pervasive and Mobile Computing
  6. Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel, 2015.  Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. IEEE Transactions on Dependable and Secure Computing, 5 (12), 504-518. 
  7. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, 2015. Towards User-Oriented RBAC Mode.  Journal of Computer Security, 23 (1), 127 – 129. 
  8. Haibing Lu, Jaideep Vaidya, Vijay Alturi and Yingjiu Li, 2015. Statistical Database Auditing without Query Denial Threat, INFORMS Journal on Computing, 27(1), 20 – 34. 
  9. Haibing Lu, Jaideep Vaidya, Vijay Atluri, 2014. An Optimization Framework for the Boolean Matrix Decomposition Problem.  Journal of Computer Security, 22(1), 1-31. 
  10. Yuan Hong, Jaideep Vaidya, Haibing Lu, 2012. Secure and Efficient Distributed Linear Programming. Journal of Computer Security, 20 (5) 583–634.
  11. Haibing Lu, Jaideep Vaidya, Vijay Atluri, Yuan Hong, 2012. Constraint-Aware Role Mining Via Extended Boolean Matrix Decomposition. IEEE Transaction on Dependable and Secure Computing, 9(5), 655-669. 
  12. Yingjiu Li and Haibing Lu, 2011. Privacy Risk Assessment with Bounds Deduced from Bounds. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 19 (4), 685-715.
  13. Xiaoyun He, Haibing Lu, JaideepVaidya and VijayAtluri, 2011. Secure Construction and Publication of Contingency Tables from Distributed Data. Journal of Computer Security, 19(3), 453-484.
  14. Jaideep Vaidya, VijayAtluri, QiGuo, and Haibing Lu, 2009. Role Engineering for Minimizing Administrative Assignment. Journal of Computer Security, 17 (2), 211-235.
  15. Haibing Lu and Yingjiu Li, 2008. Practical Inference Control for Data Cubes. IEEE Transaction on Dependable and Secure Computing, 5(2): 87-98.

Refereed Conference Papers

  1. Yanjiang Yang, Haibin Cai , Zhuo Wei, Haibing Lu, and Kim-Kwang Raymond Choo, 2016. Towards Lightweight Anonymous Entity Authentication for IoT Applications.  The Proceeding of the 21st Australasian Conference on Information Security and Privacy.
  2. Yanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang and Jianying Zhou, 2016. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. The Proceeding of the 11th ACM Asia Conference on Computer and Communications Security.
  3. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhou, 2014. Fine-grained Conditional Proxy Re-encryption and Application. The Proceeding of the Eighth International Conference on Provable Security, 2014. (Best Student Paper Award)
  4.  Lian Duan, W. Nick Street, and Haibing Lu, 2014. Community Detection through Correlation. The Proceeding of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining.  
  5. Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, and Lian Duan, 2014. Dynamic Workflow Adjustment with Security Constraints. The Proceeding of the 28th Annual IFIP WG 11.3 Working Conference on Data and Application Security.
  6. Yuan Hong, Jaideep Vaidya, Haibing Lu, and Lingyu Wang, 2014. Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. The Proceeding of the 28th Annual IFIP WG 11.3 Working Conference on Data and Application Security.
  7. Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan and Jianying Zhou, 2013. Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. The Proceeding of the 16th Information Security Conference.
  8. Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng and Jianying Zhou, 2013. Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource-constrained Devices. The Proceeding of the 16th Information Security Conference.
  9. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, and Nazia Badar, 2013. Towards User-Oriented Role Mining. The Proceeding of the 27th Annual WG 11.3 Conference on Data Applications Security and Privacy.
  10. Haibing Lu, Yuan Hong, Nick Street, Fei Wang, and Hanghang Tong, 2012. Overlapping Clustering with Sparseness Constraints. The Proceeding of the 12th  International Conference on Data Ming.
  11. Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, and Jianying Zhou, 2012. A Generic Approach for Providing Revocation Support in Secret Handshake. The Proceeding of the 14th International Conference on Information and Communication Security.
  12. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2012. Differentially Private Search Log Sanitization with Optimal Output Utility. The Proceeding of the 15th Internal Conference on Extending Database Technology.
  13. Yanjiang Yang, Haibing Lu and Jian Weng, 2011. Multi-User Private Keyword Search for Cloud Computing. The Proceeding of the 3rd IEEE International Conference on Cloud Computing Technology and Science.
  14. Yuan Hong, Jaideep Vaidya, Haibing Lu and Basit Shafiq, 2011. Privacy-preserving Tabu Search for Distributed Graph Coloring. The Proceeding of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust.
  15. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2011. Search Engine Query Clustering using Top-k Search Results. The Proceedings of the 10th IEEE/WIC/ACM International Conference on Web Intelligence.
  16. Emre Uzun, Vijayalakshmi Atluri, Haibing Lu and Jaideep Vaidya, 2011. An Optimization Model for the Extended Role Mining Problem. The Proceeding of the 25th Annual WG 11.3 Conference on Data Applications Security and Privacy.
  17. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2011. Efficient Distributed Linear Programming with Limited Disclosure. The Proceeding of the 25th Annual WG 11.3 Conference on Data Applications Security and Privacy.
  18. Haibing Lu, Jaideep Vaidya, Vijay Atluri, Heechang Shin, and Lili Jiang, 2011. Weighted Rank-One Binary Matrix Factorization. The Proceeding of the 2011 SIAM International Conference on Data Mining.
  19. Haibing Lu, Shengsheng Huang, 2011. Clustering Panel Data. The Proceeding of the 2011 SIAM International Workshop on Data Mining for Marketing.
  20. Jaideep Vaidya, Vijay Atluri, Qi Guo, and Haibing Lu, 2010. Role Mining in the Presence of Noise. The Proceeding of the 24nd Annual IFIPWG 11.3 Working Conference on Data and Application Security.
  21. Haibing Lu, JaideepVaidya, VijayAtluri, and Yuan Hong, 2009. Extended Boolean Matrix Decomposition The Proceeding of the 9th IEEE Internal Conference on Data Mining.
  22. Haibing Lu, YingjiuLi, Vijay Atluri, and Jaideep Vaidya, 2009. An Efficient Online Auditing Approach to Limit Private Data Disclosure. The Proceeding of the 12th Internal Conference on Extending Database Technology.
  23. Yingjiu Li and Haibing Lu, 2008. Disclosure Analysis and Control in Statistical Databases. The Proceeding of the 13th European Symposium on Research in Computer Security.
  24. Haibing Lu, Xiaoyun He, Jaideep Vaidya, and Nabil Adam, 2008. Secure Construction of Contingency Tables from Distributed Data. The Proceeding of the 22nd Annual IFIPWG 11.3 Working Conference on Data and Application Security.
  25. Haibing Lu, Jaideep Vaidya, and Vijay Atluri, 2008. Optimal Boolean Matrix Decomposition: Application to Role Engineering. The Proceeding of the 24th International Conference on Data Engineering.
  26. Haibing Lu, Yingjiu Li, and Xintao Wu, 2006. Disclosure Risk in Dynamic Two-Dimensional Contingency Tables. The Proceeding of the 2nd International Conference on Information System Security.  
  27. Haibing Lu, Yingjiu Li, and Xintao Wu, 2006. Disclosure Analysis for Two-Way Contingency Tables. The Proceeding of the 2006 Privacy in Statistical Databases.
  28. Yingjiu Li, Haibing Lu, and Robert Deng, 2006. Practical Inference Control for Data Cubes. The Proceeding of the 2006 IEEE Symposium on Security and Privacy.

Book Chapter

  1. Nabil Adam, Haibing Lu, Jaideep Vaidya, and Basit Shafiq. "Statistical Databases." Encyclopedia of Cryptography and Security, 2011. 
  2. Haibing Lu, Shengsheng Huang, Yingjiu Li and Yanjiang Yang. "Panel Data Analysis via Clustering and Variable Selection." Data Mining for Services. Forthcoming.

Teaching

  • "Science, Information Technology, Business and Society" at Santa Clara University
  • "Introduction to Programming" at Santa Clara University
  • "Web Programming" at Santa Clara University
  • "Management Information Systems" at Rutgers University

Professional Services

  • NSF Panelist
  • Journal Reviewer
    • IEEE Transactions on Knowledge and Data Engineering
    • IEEE Transactions on Depenable and Secure Computing
    • IEEE Transactions on Information Forensics and Security 
    • IEEE Transactions on Parallel and Distributed Systems
    • IEEE Transactions on Big Data
    • IEEE Systems Journal
    • INFORMS Information Systems Research
    • MIS Quarterly
    • Computers & Security
    • International Journal of Information Security
    • Information Retrieval
    • Data Mining and Knowledge Discovery
    • Journal of Computer Security
    • Journal of Computer and System Sciences
  • Program Committee
    • ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016
    • International Conference on Data Science and Advanced Analytics, 2014
    • IEEE International Conference on Data Mining, 2013, 2014, 2015
    • International Conference on Security and Cryptography, 2013, 2014, 2015
    • IEEE International Conference on Cloud Computing Technology and Science, 2014
    • European Symposium on Research in Computer Security, 2014, 2015
    • ACM Symposium on Access Control Models and Technologies, 2013, 2014
    • Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2014, 2015
    • International Conference on Future Internet of Things and Cloud, 2015
    • International Conferece on Computer Science and Its Applications, 2013
    • ICDM Workshop on Data Mining Technologies for Computational Collective Intelligence, 2012

Research Grant and Award

  • SCU Business School Extraordinary Teaching Award, 2014
  • SCU Business School Extraordinary Research Award, 2013
  • SCU Faculty-Student-Research-Assistant Grant, 2013
  • SCU University Research Grant, 2013
  • Leavey Research Grant, 2012 - 2013
  • IBM Faculty Research Grant, 2012