


default search action
Hong Zhu 0003
Person information
- affiliation: Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
Other persons with the same name
- Hong Zhu — disambiguation page
- Hong Zhu 0001
— University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Hong Zhu 0002
— Oxford Brookes University, School of Engineering, Computing and Mathematics, Oxford, UK (and 2 more)
- Hong Zhu 0004 — East China Normal University, College of Software, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China (and 1 more)
- Hong Zhu 0005
— Xuzhou Medical University, School of Medical Information, Xuzhou, China (and 1 more)
- Hong Zhu 0006
— Xi'an University of Technology, Faculty of Automation and Information Engineering, Xi'an, China
- Hong Zhu 0007
— Institute of Disaster Prevention, College of Ecology and Environment, Beijing, China (and 2 more)
- Hong Zhu 0008
— Southeast University, Key Laboratory of Concrete and Prestressed Concrete Structures of the Ministry of Education, Nanjing, China
- Hong Zhu 0009 — Hong Kong University of Science and Technology, Department of Electronic and Computer Engineering, Hong Kong
- Hong Zhu 0010 — China University of Mining and Technology, School of Information and Electrical Engineering, Xuzhou, China
- Hong Zhu 0011
— Shenzhen University, College of Computer Science and Software Engineering, Shenzhen, China (and 2 more)
- Hong Zhu 0012
— Jiangsu University, Faculty of Science, Zhenjiang, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j26]Lipeng Qian
, Qiong Zuo, Dahu Li, Hong Zhu
:
DGMSCL: A dynamic graph mixed supervised contrastive learning approach for class imbalanced multivariate time series classification. Neural Networks 185: 107131 (2025) - [j25]Zhiqiang Zhang
, Hong Zhu
, Pengxin Ban
, Yong Wang
, Leo Yu Zhang
:
Multimodal Chaotification Model With Hardware Implementation. IEEE Trans. Ind. Electron. 72(2): 2056-2067 (2025) - [i15]Yufei Ye, Wei Guo, Jin Yao Chin, Hao Wang, Hong Zhu, Xi Lin, Yuyang Ye, Yong Liu, Ruiming Tang, Defu Lian, Enhong Chen:
FuXi-α: Scaling Recommendation Model with Feature Interaction Enhanced Transformer. CoRR abs/2502.03036 (2025) - 2024
- [j24]Zhiqiang Zhang
, Hong Zhu
, Meiyi Xie
:
Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving. Inf. Sci. 654: 119870 (2024) - [c41]Yuang Zhao
, Chuhan Wu
, Qinglin Jia
, Hong Zhu
, Jia Yan
, Libin Zong
, Linxuan Zhang
, Zhenhua Dong
, Muyu Zhang
:
Confidence-Aware Multi-Field Model Calibration. CIKM 2024: 5111-5118 - [c40]Yunjia Xi
, Weiwen Liu
, Jianghao Lin
, Xiaoling Cai
, Hong Zhu
, Jieming Zhu
, Bo Chen
, Ruiming Tang
, Weinan Zhang
, Yong Yu
:
Towards Open-World Recommendation with Knowledge Augmentation from Large Language Models. RecSys 2024: 12-22 - [c39]Peijie Sun
, Yifan Wang
, Min Zhang
, Chuhan Wu
, Yan Fang, Hong Zhu
, Yuan Fang, Meng Wang:
Collaborative-Enhanced Prediction of Spending on Newly Downloaded Mobile Games under Consumption Uncertainty. WWW (Companion Volume) 2024: 10-19 - [d1]Peijie Sun
, Yifan Wang
, Min Zhang
, Chuhan Wu
, Yan Fang
, Hong Zhu
, Yuan Fang
, Meng Wang
:
Collaborative-Enhanced Prediction of Spending on Newly Downloaded Mobile Games under Consumption Uncertainty. Zenodo, 2024 - [i14]Yuang Zhao, Chuhan Wu
, Qinglin Jia, Hong Zhu, Jia Yan, Libin Zong, Linxuan Zhang, Zhenhua Dong, Muyu Zhang:
Confidence-Aware Multi-Field Model Calibration. CoRR abs/2402.17655 (2024) - [i13]Peijie Sun, Yifan Wang, Min Zhang, Chuhan Wu
, Yan Fang, Hong Zhu, Yuan Fang, Meng Wang:
Collaborative-Enhanced Prediction of Spending on Newly Downloaded Mobile Games under Consumption Uncertainty. CoRR abs/2404.08301 (2024) - [i12]Dugang Liu, Shenxian Xian, Xiaolin Lin, Xiaolian Zhang, Hong Zhu, Yuan Fang, Zhen Chen, Zhong Ming:
A Practice-Friendly Two-Stage LLM-Enhanced Paradigm in Sequential Recommendation. CoRR abs/2406.00333 (2024) - [i11]Yunjia Xi, Weiwen Liu, Jianghao Lin, Muyan Weng, Xiaoling Cai, Hong Zhu, Jieming Zhu, Bo Chen, Ruiming Tang, Yong Yu, Weinan Zhang:
Efficient and Deployable Knowledge Infusion for Open-World Recommendations via Large Language Models. CoRR abs/2408.10520 (2024) - [i10]Chenxu Zhu, Shigang Quan, Bo Chen, Jianghao Lin, Xiaoling Cai, Hong Zhu, Xiangyang Li, Yunjia Xi, Weinan Zhang, Ruiming Tang:
LIBER: Lifelong User Behavior Modeling Based on Large Language Models. CoRR abs/2411.14713 (2024) - 2023
- [j23]Zhiqiang Zhang
, Hong Zhu
, Pengxin Ban
, Yong Wang
, Leo Yu Zhang
:
Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation. IEEE Trans. Ind. Electron. 70(3): 2916-2926 (2023) - [j22]Dugang Liu
, Pengxiang Cheng
, Hong Zhu
, Zhenhua Dong
, Xiuqiang He
, Weike Pan
, Zhong Ming
:
Debiased Representation Learning in Recommendation via Information Bottleneck. Trans. Recomm. Syst. 1(1): 1-27 (2023) - [c38]Xin Li, Hong Zhu
, Zhiqiang Zhang, Meiyi Xie
:
Item-Oriented Personalized LDP for Discrete Distribution Estimation. ESORICS (2) 2023: 446-466 - [c37]Dugang Liu
, Pengxiang Cheng
, Hong Zhu
, Xing Tang
, Yanyu Chen
, Xiaoting Wang
, Weike Pan
, Zhong Ming
, Xiuqiang He
:
DIWIFT: Discovering Instance-wise Influential Features for Tabular Data. WWW 2023: 1673-1682 - [i9]Chuhan Wu, Jingjie Li, Qinglin Jia, Hong Zhu, Yuan Fang, Ruiming Tang:
Contrastive Multi-view Framework for Customer Lifetime Value Prediction. CoRR abs/2306.14400 (2023) - [i8]Zhiqiang Zhang, Hong Zhu, Meiyi Xie:
Differential Privacy May Have a Potential Optimization Effect on Some Swarm Intelligence Algorithms besides Privacy-preserving. CoRR abs/2306.17370 (2023) - [i7]Hong Zhu, Runpeng Yu, Xing Tang, Yifei Wang, Yuan Fang, Yisen Wang:
Robust Long-Tailed Learning via Label-Aware Bounded CVaR. CoRR abs/2308.15405 (2023) - 2022
- [j21]Shengren Ke, Meiyi Xie
, Hong Zhu, Zhongsheng Cao:
Group-based recurrent neural network for human mobility prediction. Neural Comput. Appl. 34(12): 9863-9883 (2022) - [c36]Runpeng Yu, Hong Zhu, Kaican Li, Lanqing Hong, Rui Zhang, Nanyang Ye, Shao-Lun Huang, Xiuqiang He:
Regularization Penalty Optimization for Addressing Data Quality Variance in OoD Algorithms. AAAI 2022: 8945-8953 - [c35]Fuyuan Lyu
, Xing Tang
, Hong Zhu, Huifeng Guo, Yingxue Zhang, Ruiming Tang
, Xue Liu:
OptEmbed: Learning Optimal Embedding Table for Click-through Rate Prediction. CIKM 2022: 1399-1409 - [c34]Qixun Wang, Yifei Wang, Hong Zhu, Yisen Wang:
Improving Out-of-Distribution Generalization by Adversarial Training with Structured Priors. NeurIPS 2022 - [i6]Runpeng Yu, Hong Zhu, Kaican Li, Lanqing Hong, Rui Zhang, Nanyang Ye, Shao-Lun Huang, Xiuqiang He:
Regularization Penalty Optimization for Addressing Data Quality Variance in OoD Algorithms. CoRR abs/2206.05749 (2022) - [i5]Pengxiang Cheng, Hong Zhu, Xing Tang, Dugang Liu, Yanyu Chen, Xiaoting Wang, Weike Pan, Zhong Ming, Xiuqiang He:
DIWIFT: Discovering Instance-wise Influential Features for Tabular Data. CoRR abs/2207.02773 (2022) - [i4]Fuyuan Lyu, Xing Tang, Hong Zhu, Huifeng Guo, Yingxue Zhang, Ruiming Tang
, Xue Liu:
OptEmbed: Learning Optimal Embedding Table for Click-through Rate Prediction. CoRR abs/2208.04482 (2022) - [i3]Qixun Wang, Yifei Wang, Hong Zhu, Yisen Wang:
Improving Out-of-Distribution Generalization by Adversarial Training with Structured Priors. CoRR abs/2210.06807 (2022) - 2021
- [j20]Bing Li
, Hong Zhu
, Meiyi Xie
:
Quantifying Location Privacy Risks Under Heterogeneous Correlations. IEEE Access 9: 23876-23893 (2021) - [j19]Pengyu Wang, Yong Wang, Leo Yu Zhang
, Hong Zhu:
An effective and efficient fuzzy approach for managing natural noise in recommender systems. Inf. Sci. 570: 623-637 (2021) - [c33]Chang Liu, Xiaoguang Li, Guohao Cai, Zhenhua Dong, Hong Zhu, Lifeng Shang:
Noninvasive Self-attention for Side Information Fusion in Sequential Recommendation. AAAI 2021: 4249-4256 - [c32]Yunkai Yu, Hong Zhu, Meiyi Xie:
CTP: Correlated Trajectory Publication with Differential Privacy. ICCCS 2021: 128-133 - [c31]Dugang Liu, Pengxiang Cheng, Hong Zhu, Zhenhua Dong, Xiuqiang He, Weike Pan, Zhong Ming:
Mitigating Confounding Bias in Recommendation via Information Bottleneck. RecSys 2021: 351-360 - [i2]Chang Liu, Xiaoguang Li, Guohao Cai, Zhenhua Dong, Hong Zhu, Lifeng Shang:
Non-invasive Self-attention for Side Information Fusion in Sequential Recommendation. CoRR abs/2103.03578 (2021) - 2020
- [c30]Zifeng Wang, Hong Zhu, Zhenhua Dong, Xiuqiang He, Shao-Lun Huang:
Less Is Better: Unweighted Data Subsampling via Influence Function. AAAI 2020: 6340-6347 - [c29]Zhenhua Dong, Hong Zhu, Pengxiang Cheng, Xinhua Feng, Guohao Cai, Xiuqiang He, Jun Xu, Jirong Wen:
Counterfactual learning for recommender system. RecSys 2020: 568-569 - [c28]Jiangxing Yu, Hong Zhu, Chih-Yao Chang, Xinhua Feng, Bo-Wen Yuan, Xiuqiang He, Zhenhua Dong:
Influence Function for Unbiased Recommendation. SIGIR 2020: 1929-1932
2010 – 2019
- 2019
- [j18]Hong Zhu
, Xin Zuo
, Meiyi Xie
:
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release. IEEE Access 7: 164304-164319 (2019) - [c27]Bo-Wen Yuan, Jui-Yang Hsia, Mengyuan Yang, Hong Zhu, Chih-Yao Chang, Zhenhua Dong, Chih-Jen Lin:
Improving Ad Click Prediction by Considering Non-displayed Events. CIKM 2019: 329-338 - [c26]Hongbo Li, Hong Zhu, Zongmin Cui:
A spatial text query scheme based on semantic-aware. HP3C 2019: 55-58 - [c25]Bing Li, Hong Zhu, Meiyi Xie:
LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1083-1092 - [i1]Zifeng Wang, Hong Zhu, Zhenhua Dong, Xiuqiang He, Shao-Lun Huang:
Less Is Better: Unweighted Data Subsampling via Influence Function. CoRR abs/1912.01321 (2019) - 2018
- [j17]Zhuolin Mei, Hong Zhu
, Zongmin Cui, Zongda Wu, Gang Peng, Bin Wu, Caicai Zhang:
Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432: 79-96 (2018) - [j16]Hong Zhu, Hongbo Li, Zongmin Cui, Zhongsheng Cao, Meiyi Xie:
EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe. KSII Trans. Internet Inf. Syst. 12(12): 5877-5897 (2018) - 2017
- [j15]Qiong Zuo, Meiyi Xie, Guanqiu Qi
, Hong Zhu
:
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service. Frontiers Comput. Sci. 11(3): 465-484 (2017) - [c24]Hong Zhu
, Zhuolin Mei, Bing Wu, Hongbo Li, Zongmin Cui:
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing. ACISP (1) 2017: 248-265 - [c23]Hong Zhu, Hongbo Li, Zongmin Cui, Zhongsheng Cao, Meiyi Xie:
Convenient Top-k Location-Text Publish/Subscribe Scheme. ISICA (2) 2017: 183-191 - [c22]Caicai Zhang, Zhongsheng Cao, Hong Zhu
:
Query Optimization Strategies in Probabilistic Relational Databases. NCTCS 2017: 208-220 - 2016
- [j14]Ke Yan, Hong Zhu, Kevin Lü:
VParC: a compression scheme for numeric data in column-oriented databases. Int. Arab J. Inf. Technol. 13(1): 1-11 (2016) - [j13]Zongmin Cui, Hong Zhu
, Jie Shi, Lianhua Chi, Ke Yan:
Efficient authorisation update on cloud data. Int. J. Web Grid Serv. 12(2): 109-141 (2016) - [j12]Hong Zhu
, Bin Wu, Meiyi Xie, Zongmin Cui:
Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing. KSII Trans. Internet Inf. Syst. 10(10): 5171-5189 (2016) - [j11]Hong Zhu
, Caicai Zhang, Zhongsheng Cao, Ruiming Tang
:
On efficient conditioning of probabilistic relational databases. Knowl. Based Syst. 92: 112-126 (2016) - [j10]Hong Zhu
, Zhuolin Mei, Meiyi Xie:
Identity-based key management for cloud computing. Secur. Commun. Networks 9(13): 2143-2156 (2016) - [j9]Hong Zhu
, Bin Wu, Meiyi Xie:
Privacy-preserving ranked neighbor query over encrypted graph data in the cloud. Secur. Commun. Networks 9(16): 3167-3177 (2016) - [c21]Hong Zhu
, Caicai Zhang, Zhongsheng Cao:
An Efficient Initialization Method for Probabilistic Relational Databases. DEXA (2) 2016: 454-462 - [c20]Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu:
Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 497-504 - 2015
- [j8]Hong Zhu
, Shengli Tian, Kevin Lü:
Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity. Comput. J. 58(4): 549-571 (2015) - [j7]Hong Zhu
, Shengli Tian, Genyuan Du
, Meiyi Xie:
Anonymization on refining partition: Same privacy, more utility. Comput. Sci. Inf. Syst. 12(4): 1193-1216 (2015) - [j6]Hong Zhu
, Zhipeng Wang, Kevin Lü
, Meiyi Xie, Xiang Zou, Bing Chen:
A distributed scheme for row-based computational private information retrieval. Secur. Commun. Networks 8(8): 1537-1546 (2015) - 2014
- [c19]Hong Zhu, Libo Xia, Meiyi Xie, Ke Yan:
Equi-join for Multiple Datasets Based on Time Cost Evaluation Model. ICA3PP (2) 2014: 122-135 - [c18]Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang:
Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach. ICCCN 2014: 1-6 - [c17]Hong Zhu, Shengli Tian, Meiyi Xie:
Anonymization on refining partition: Same privacy, more utility. ICSAI 2014: 998-1005 - [c16]Hong Zhu, Caicai Zhang, Zhongsheng Cao, Ruiming Tang
, Mengyuan Yang:
An Efficient Conditioning Method for Probabilistic Relational Databases. WAIM 2014: 225-236 - 2013
- [j5]Zongmin Cui, Hong Zhu
, Lianhua Chi:
Lightweight key management on sensitive data in the cloud. Secur. Commun. Networks 6(10): 1290-1299 (2013) - [c15]Zhipeng Wang, Hong Zhu
:
A Client Privacy Preserving Discovery Service Scheme. AINA Workshops 2013: 935-940 - [c14]Jie Shi, Ge Fu, Jian Weng
, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. EIDWT 2013: 385-392 - [c13]Ke Yan, Meiyi Xie, Hong Zhu:
Fixed-length string compression for direct operations in column-oriented databases. ICNC 2013: 1171-1176 - [c12]Zongmin Cui, Hong Zhu
, Jie Shi, Lianhua Chi, Ke Yan:
Lightweight Management of Authorization Update on Cloud Data. ICPADS 2013: 456-461 - [c11]Ke Yan, Hong Zhu:
Two MRJs for Multi-way Theta-Join in MapReduce. IDCS 2013: 321-332 - 2010
- [j4]Hong Zhu
, Ge Fu, Yucai Feng, Kevin Lü
:
Dynamic Damage Recovery for Web Databases. J. Comput. Sci. Technol. 25(3): 548-561 (2010) - [j3]Jie Shi, Hong Zhu
:
A fine-grained access control model for relational databases. J. Zhejiang Univ. Sci. C 11(8): 575-586 (2010)
2000 – 2009
- 2009
- [j2]Hong Zhu, Kevin Lü
, Renchao Jin
:
A practical mandatory access control model for XML databases. Inf. Sci. 179(8): 1116-1133 (2009) - [c10]Jie Shi, Hong Zhu
, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. ACIS-ICIS 2009: 469-474 - [c9]Ge Fu, Hong Zhu, Yingjiu Li:
A Robust Damage Assessment Model for Corrupted Database Systems. ICISS 2009: 237-251 - 2008
- [c8]Meiyi Xie, Hong Zhu
, Yucai Feng, Guanrong Hu:
Tracking and Repairing Damaged Databases Using Before Image Table. FCST 2008: 36-41 - [c7]Chenyang Lu, Hong Zhu
, Nengchao Wang:
Fast N-Dimensional Hilbert Mapping Algorithm. ICCSA Workshops 2008: 507-513 - [c6]Hong Zhu, Ge Fu, Yi Zhu, Renchao Jin, Kevin Lü
, Jie Shi:
Dynamic data recovery for database systems based on fine grained transaction log. IDEAS 2008: 249-253 - [c5]Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs. WAIM 2008: 583-590 - 2007
- [c4]Hong Zhu, Kevin Lü:
Fine-Grained Access Control for Database Management Systems. BNCOD 2007: 215-223 - [c3]Hong Zhu
, Jing Cheng, Renchao Jin
, Kevin Lü
:
Executing Query over Encrypted Character Strings in Databases. FCST 2007: 90-97 - [c2]Hong Zhu, Renchao Jin, Kevin Lü:
A flexible mandatory access control policy for XML databases. Infoscale 2007: 67 - 2006
- [j1]Hong Zhu, Fu Xin, Lin Qiu Hui, Kevin Lu:
The Design and Implementation of a Performance Evaluation Tool with TPC-W Benchmark. J. Comput. Inf. Technol. 14(2): 149-159 (2006) - [c1]Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü:
An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. ATC 2006: 439-448
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-17 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint