Home RESEARCH TEACHING SERVICE GRANT/AWARD CONTACT

HAIBING LU (陆海兵)

Associate Professor
Department of Operations Management and Information Systems
Santa Clara University

Short Bio

Dr. Haibing Lu’s research is at the confluence of privacy, security, data mining, and optimization. He has published over 40 well-cited research articles at leading journals and premier international conference proceedings in his research fields, such as IEEE Transaction on Dependable and Security Computing (TDSC), INFORMS Journal on Computing (JOC), Journal of Computer Security (JCS), IEEE Symposium on Security and Privacy (S&P), ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), SIAM International Conference on Data Mining (SDM), IEEE International Conference on Data Mining (ICDM), and IEEE International Conference on Data Engineering.

Dr. Haibing Lu received his Ph.D. in 2011 from Rutgers University and earned his B.S. and M.S. degrees both in mathematics from Xi’an Jiaotong University, China, in 1998 and 2002 respectively. Dr. Lu joined the Department of Operations Management and Information Systems in the Leavey School of Business at Santa Clara University in Fall 2011. He was promoted to tenured associate professor in 2017. He currently teaches undergraduate courses in the OMIS program and graduate courses in the MSIS program. He is a frequent recipient of the school’s Extraordinary Research Award and Extraordinary Teaching Award.

Research

    Journal Articles

    1. Xiaoyu He and Haibing Lu, 2017. Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework. Journal of Information Privacy and Security, 13 (3): 104-119, 2017.
    2. Lian Duan, Yanchi Liu, W. Nick Street, and Haibing Lu, 2017. Utilizing Advances in Correlation Analysis for Community Structure Detection. Expert Systems with Applications, 80(30): 74-91.
    3. Yuan Hong, Jaideep Vaidya, Haibing Lu and Wen Ming Liu, 2016. Accurate and Efficient Query Clustering via Top Ranked Search Results. Web Intelligence 14(2): 119-138 (2016).
    4. Xiaoyun He and Haibing Lu, 2016. Catch a Fad or Capture a Value? Social Media Leverage in SMEs. Journal of Organizational and End User Computing, 28, 3 (July 2016), 67-81.
    5. Heechang Shin and Haibing Lu, 2016. Towards Trajectory Anonymization Using Multi-dimensional Index Structures. International Journal of Business Continuity and Risk Management, 6 (4), 2016.
    6. Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He , Heechang Shin, Yuan Hong, and Haibing Lu, 2016. Usability Test of Personality Type within a Roommate Matching Website: A Case Study, Journal of International Technology and Information Management, 25 (1), 5.
    7. Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Wen, Youcheng Zhang, and Kim-Kwang Raymond Choo, 2015. Cloud Based Data Sharing with Fine-grained Proxy Re-encryption. Pervasive and Mobile Computing, 28, 122-134.
    8. Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel, 2015. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. IEEE Transactions on Dependable and Secure Computing, 5 (12), 504-518.
    9. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar, 2015. Towards User-Oriented RBAC Mode. Journal of Computer Security, 23 (1), 127 – 129.
    10. Haibing Lu, Jaideep Vaidya, Vijay Alturi and Yingjiu Li, 2015. Statistical Database Auditing without Query Denial Threat, INFORMS Journal on Computing, 27(1), 20 – 34.
    11. Haibing Lu, Jaideep Vaidya, Vijay Atluri, 2014. An Optimization Framework for the Boolean Matrix Decomposition Problem. Journal of Computer Security, 22(1), 1-31.
    12. Yuan Hong, Jaideep Vaidya, Haibing Lu, 2012. Secure and Efficient Distributed Linear Programming. Journal of Computer Security, 20 (5) 583–634.
    13. Haibing Lu, Jaideep Vaidya, Vijay Atluri, Yuan Hong, 2012. Constraint-Aware Role Mining Via Extended Boolean Matrix Decomposition. IEEE Transaction on Dependable and Secure Computing, 9(5), 655-669.
    14. Yingjiu Li and Haibing Lu, 2011. Privacy Risk Assessment with Bounds Deduced from Bounds. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 19 (4), 685-715.
    15. Xiaoyun He, Haibing Lu, JaideepVaidya and VijayAtluri, 2011. Secure Construction and Publication of Contingency Tables from Distributed Data. Journal of Computer Security, 19(3), 453-484.
    16. Jaideep Vaidya, VijayAtluri, QiGuo, and Haibing Lu, 2009. Role Engineering for Minimizing Administrative Assignment. Journal of Computer Security, 17 (2), 211-235.
    17. Haibing Lu and Yingjiu Li, 2008. Practical Inference Control for Data Cubes. IEEE Transaction on Dependable and Secure Computing, 5(2): 87-98.
  • Conference Proceedings

    1. Yanjiang Yang, Haibin Cai , Zhuo Wei, Haibing Lu, and Kim-Kwang Raymond Choo, 2016. Towards Lightweight Anonymous Entity Authentication for IoT Applications. The Proceeding of the 21st Australasian Conference on Information Security and Privacy.
    2. Yanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang and Jianying Zhou, 2016. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. The Proceeding of the 11th ACM Asia Conference on Computer and Communications Security.
    3. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhou, 2014. Fine-grained Conditional Proxy Re-encryption and Application. The Proceeding of the Eighth International Conference on Provable Security, 2014. (Best Student Paper Award)
    4. Lian Duan, W. Nick Street, and Haibing Lu, 2014. Community Detection through Correlation. The Proceeding of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining.
    5. Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, and Lian Duan, 2014. Dynamic Workflow Adjustment with Security Constraints. The Proceeding of the 28th Annual IFIP WG 11.3 Working Conference on Data and Application Security.
    6. Yuan Hong, Jaideep Vaidya, Haibing Lu, and Lingyu Wang, 2014. Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. The Proceeding of the 28th Annual IFIP WG 11.3 Working Conference on Data and Application Security.
    7. Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan and Jianying Zhou, 2013. Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. The Proceeding of the 16th Information Security Conference.
    8. Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng and Jianying Zhou, 2013. Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource-constrained Devices. The Proceeding of the 16th Information Security Conference.
    9. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, and Nazia Badar, 2013. Towards User-Oriented Role Mining. The Proceeding of the 27th Annual WG 11.3 Conference on Data Applications Security and Privacy.
    10. Haibing Lu, Yuan Hong, Nick Street, Fei Wang, and Hanghang Tong, 2012. Overlapping Clustering with Sparseness Constraints. The Proceeding of the 12th International Conference on Data Ming.
    11. Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, and Jianying Zhou, 2012. A Generic Approach for Providing Revocation Support in Secret Handshake. The Proceeding of the 14th International Conference on Information and Communication Security.
    12. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2012. Differentially Private Search Log Sanitization with Optimal Output Utility. The Proceeding of the 15th Internal Conference on Extending Database Technology.
    13. Yanjiang Yang, Haibing Lu and Jian Weng, 2011. Multi-User Private Keyword Search for Cloud Computing. The Proceeding of the 3rd IEEE International Conference on Cloud Computing Technology and Science.
    14. Yuan Hong, Jaideep Vaidya, Haibing Lu and Basit Shafiq, 2011. Privacy-preserving Tabu Search for Distributed Graph Coloring. The Proceeding of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust.
    15. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2011. Search Engine Query Clustering using Top-k Search Results. The Proceedings of the 10th IEEE/WIC/ACM International Conference on Web Intelligence.
    16. Emre Uzun, Vijayalakshmi Atluri, Haibing Lu and Jaideep Vaidya, 2011. An Optimization Model for the Extended Role Mining Problem. The Proceeding of the 25th Annual WG 11.3 Conference on Data Applications Security and Privacy.
    17. Yuan Hong, Jaideep Vaidya and Haibing Lu, 2011. Efficient Distributed Linear Programming with Limited Disclosure. The Proceeding of the 25th Annual WG 11.3 Conference on Data Applications Security and Privacy.
    18. Haibing Lu, Jaideep Vaidya, Vijay Atluri, Heechang Shin, and Lili Jiang, 2011. Weighted Rank-One Binary Matrix Factorization. The Proceeding of the 2011 SIAM International Conference on Data Mining.
    19. Haibing Lu, Shengsheng Huang, 2011. Clustering Panel Data. The Proceeding of the 2011 SIAM International Workshop on Data Mining for Marketing.
    20. Jaideep Vaidya, Vijay Atluri, Qi Guo, and Haibing Lu, 2010. Role Mining in the Presence of Noise. The Proceeding of the 24nd Annual IFIPWG 11.3 Working Conference on Data and Application Security.
    21. Haibing Lu, JaideepVaidya, VijayAtluri, and Yuan Hong, 2009. Extended Boolean Matrix Decomposition The Proceeding of the 9th IEEE Internal Conference on Data Mining.
    22. Haibing Lu, YingjiuLi, Vijay Atluri, and Jaideep Vaidya, 2009. An Efficient Online Auditing Approach to Limit Private Data Disclosure. The Proceeding of the 12th Internal Conference on Extending Database Technology.
    23. Yingjiu Li and Haibing Lu, 2008. Disclosure Analysis and Control in Statistical Databases. The Proceeding of the 13th European Symposium on Research in Computer Security.
    24. Haibing Lu, Xiaoyun He, Jaideep Vaidya, and Nabil Adam, 2008. Secure Construction of Contingency Tables from Distributed Data. The Proceeding of the 22nd Annual IFIPWG 11.3 Working Conference on Data and Application Security.
    25. Haibing Lu, Jaideep Vaidya, and Vijay Atluri, 2008. Optimal Boolean Matrix Decomposition: Application to Role Engineering. The Proceeding of the 24th International Conference on Data Engineering.
    26. Haibing Lu, Yingjiu Li, and Xintao Wu, 2006. Disclosure Risk in Dynamic Two-Dimensional Contingency Tables. The Proceeding of the 2nd International Conference on Information System Security.
    27. Haibing Lu, Yingjiu Li, and Xintao Wu, 2006. Disclosure Analysis for Two-Way Contingency Tables. The Proceeding of the 2006 Privacy in Statistical Databases.
    28. Yingjiu Li, Haibing Lu, and Robert Deng, 2006. Practical Inference Control for Data Cubes. The Proceeding of the 2006 IEEE Symposium on Security and Privacy.
  • Book Chapters

    1. NabilAdam, Haibing Lu, JaideepVaidya, and BasitShafiq, 2011. Statistical Databases. Encyclopedia of Cryptography and Security.
    2. Haibing Lu, Shengsheng Huang, Yingjiu Li and Yanjiang Yang, 2014. Panel Data Analysis via Clustering and Variable Selection. Data Mining for Services.

Teaching

  • OMIS 30 (undergraduate): Introduction to Programming
  • OMIS 34 (undergraduate): Science, Information Technology, Business and Society
  • OMIS 120 (undergraduate): Web Programming
  • MSIS 2630 (gradudate): Web Programming
  • MSIS 2644 (graduate): Capstone Thesis
  • MSIS 2640, 2642, and 2643 (graduate): Capstone Industry
  • MSIS 2645, 2646, and 2647 (graduate): Capstone Design Project

Service

  • Journal Editorship

Guest Editor for Special issue on Big Data Analytics and Business Innovation, International Journal of Technology, Policy and Management

Research Proposal Review

NSF Panelist

Journal Referee

IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Big Data
IEEE Transactions on Information Forensics & Security
INFORMS Information Systems Research
MIS Quarterly
Computers & Security
International Journal of Information Security
Information Retrieval
Data Mining and Knowledge Discovery
Journal of Computer Security
Journal of Computer and System Sciences
Future Generation Computer Systems

Conference Program Committee

ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016.
International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, 2016.
International Workshop on Trust, Security and Privacy for Big Data, 2016.
International Conference on Data Science and Advanced Analytics, 2014
IEEE International Conference on Data Mining, 2013, 2014, 2015, 2016
International Conference on Security and Cryptography, 2013, 2014, 2015, 2016
IEEE International Conference on Cloud Computing Technology and Science, 2014
European Symposium on Research in Computer Security, 2014, 2015
ACM Symposium on Access Control Models and Technologies, 2013, 2014
Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2014, 2015
International Conference on Future Internet of Things and Cloud, 2015
International Conference on Computer Science and Its Applications, 2013
ICDM Workshop on Data Mining Technologies for Computational Collective Intelligence, 2012
Session Chair at INFORMS Annual Meeting, 2012, 2013

Grant/Award

  • OMIS Department Grant, 2014, 2015
  • Leavey Business School Extraordinary Teaching Award, 2014, 2015
  • Leavey Business School Extraordinary Service Award, 2014
  • Leavey Business School Extraordinary Research Award, 2013, 2015
  • Leavey Business School Research Grant, 2012 – 2015
  • SCU Faculty Summer Scholarship Stipend, 2015
  • Santa Clara University Research Grant, 2012 – 2014
  • IBM Faculty Research Grant, 2012
  • SIAM Travel Award, 2011
  • NSF Travel Award, IEEE ICDM 2009
  • Summer Research Award, Rutgers Business School, 2007 -2009
  • CIMIC Research Award, Rutgers Business School (one per school), 2008

Contact

  • Office: 216F Lucas Hall, 500 El Camino Real, Santa Clara, CA 95050
  • Phone: (+1) 408-554-2775
  • Email: hlu (AT) scu.edu

Quote of the day: live life