Hongbo Chen

ORCID: 0000-0001-9922-4351
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Higher Education and Teaching Methods
  • Recommender Systems and Techniques
  • Innovative Microfluidic and Catalytic Techniques Innovation
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Data Management and Algorithms
  • IoT and Edge/Fog Computing
  • Human Mobility and Location-Based Analysis
  • Merger and Competition Analysis
  • Legal Education and Practice Innovations
  • Ethics in Clinical Research
  • Ocean Acidification Effects and Responses
  • Advanced Sensor and Control Systems
  • Radiation Effects in Electronics
  • Migration, Health and Trauma
  • Customer Service Quality and Loyalty
  • Cloud Computing and Resource Management
  • Environmental Policies and Emissions
  • Advanced Data Storage Technologies
  • Interpreting and Communication in Healthcare
  • VLSI and Analog Circuit Testing

Peking University
2021-2022

Putian University
2022

Shanghai International Studies University
2022

Indiana University Bloomington
2021-2022

Zhejiang Lab
2022

Indiana University
2021

Shandong University
2018

Mongolian University of Science and Technology
2014

Hiroshima University
2012-2013

Liaoning University of Technology
2011

Ensuring the proper use of sensitive data in analytics under complex privacy policies is an increasingly critical challenge. Many existing approaches lack portability, verifiability, and scalability across diverse processing frameworks. We introduce Picachv, a novel security monitor that automatically enforces policies. It works on relational algebra as abstraction for program semantics, enabling policy enforcement query plans generated by programs during execution. This approach simplifies...

10.48550/arxiv.2501.10560 preprint EN arXiv (Cornell University) 2025-01-17

In order to describe the roadmap of current edge computing research activities, we first gave a brief overview most advanced surveys published in last six years. We found that has been adaptively integrated into growing number applications. Edge theory and technology will bring substantial innovation incentive, as well large application scenarios different fields, such assisted smart city, Internet Vehicles(IoV), Industrial many other fields. However, believe comprehensive investigation...

10.1109/access.2022.3176106 article EN cc-by IEEE Access 2022-01-01

Abstract Concerns regarding inappropriate leakage of sensitive personal information as well unauthorized data use are increasing with the growth genomic repositories. Therefore, privacy and security have become increasingly important need to be studied. With many proposed protection techniques, their applicability in support biomedical research should understood. For this purpose, we organized a community effort past 8 years through integrating for analysis, anonymization sharing consortium...

10.1093/jamia/ocac165 article EN cc-by-nc-nd Journal of the American Medical Informatics Association 2022-09-26

Aim To analyse net effects of self-rated workload and nurse staffing (nurse-to-patient ratio staff skill mix) on work engagement among clinical nurses. Background Improving nurses' is necessary to enhance patient outcomes, so factors that influence should be explored. Methods A cross-sectional study was conducted in 1,428 registered nurses from 145 units 11 hospitals. hierarchical linear model used the data. Results Self-rated had a negative effect (β = −0.353, p < .001, size (f2) 14.20%),...

10.1111/jonm.13274 article EN Journal of Nursing Management 2021-01-23

The recent wave of in-browser cryptojacking has ebbed away, due to the new updates mainstream cryptocurrrencies, which demand level mining resources browsers cannot afford. As replacements, resource-rich, loosely protected free Internet services, such as Continuous Integration (CI) platforms, have become attractive targets. In this paper, we report a systematic study on real-world illicit cryptomining public CI platforms (called Cijacking). Unlike cryptojacking, Cijacks masquerade jobs and...

10.1109/sp46214.2022.9833803 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Self-rated health has been widely used as a useful screening tool to subjectively evaluate individuals' status. Under the context of rapid growth aging, there was dramatic expansion in internal older migrants China. Serious concerns on issues status continue attract quite lot attention over past decades. Public education is one most important care services and methods improve However, previous studies focus utilization public such visiting doctors, physical examination, hospitalization....

10.3389/fpubh.2022.937361 article EN cc-by Frontiers in Public Health 2022-07-22

With rapid growth of the GPS enabled mobile devices, location-based online social network services become very popular, and allow their users to share life experiences with location information. In this paper, we considered a method for recommending places user based on spatial databases services. We used user-based collaborative filtering make set recommend places. proposed method, calculate similarity users' check-in activities not only positions but also semantics such as "shopping",...

10.15803/ijnc.3.2_228 article EN International Journal of Networking and Computing 2013-01-01

A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove a data owner the integrity of initial state an enclave, including program operate on her data. For this purpose, data-processing is supposed be open or third party, so its functionality can evaluated before trust being established. In real world, however, increasingly there are application scenarios in which itself needs protected (e.g., proprietary algorithm). So compliance with...

10.1109/dsn48987.2021.00052 article EN 2021-06-01

Trusted execution environments (TEE) such as In-tel's Software Guard Extension (SGX) have been widely studied to boost security and privacy protection for the computation of sensitive data human genomics. However, a performance hurdle is often generated by SGX, especially from small enclave memory. In this paper, we propose new Hybrid Secured Flow framework (called "HySec-Flow") large-scale genomic analysis using SGX platforms. Here, data-intensive computing tasks can be partitioned into...

10.1109/cloud53861.2021.00098 article EN 2021-09-01

With rapid growth of the GPS enabled mobile device, location-based online social network services become more and popular, allow their users to share life experiences with location information. In this paper, we considered a method for recommending places user based on spatial databases services. We used user-based collaborative filtering make set recommended places. proposed method, calculate similarity users' check-in activities not only positions but also semantics such as "shopping",...

10.1109/icnc.2012.29 article EN 2012-12-01

As an emerging technique for confidential computing, trusted execution environment (TEE) receives a lot of attention. To better develop, deploy, and run secure applications on TEE platform such as Intel's SGX, both academic industrial teams have devoted much effort to developing reliable convenient containers. In this paper, we studied the isolation strategies 15 existing containers protect from potentially malicious operating systems (OS) or untrusted applications, using semi-automatic...

10.48550/arxiv.2109.01923 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs a remote attestation to prove data owner the integrity of initial state an enclave, including program operate on her data. For this purpose, data-processing is supposed be open owner, so its functionality can evaluated before trust established. However, increasingly there are application scenarios in which itself needs protected. So compliance with privacy policies expected by should verified without...

10.48550/arxiv.2007.10513 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Due to the absence of in-enclave isolation, today's trusted execution environment (TEE), specifically Intel's Software Guard Extensions (SGX), does not have capability securely run different users' tasks within a single enclave, which is required for supporting real-world services, such as an machine learning model that classifies data from various sources, or microservice (e.g., search) performs very small task (within sub-seconds) user and therefore cannot afford resources delay creating...

10.1109/tdsc.2021.3138427 article EN IEEE Transactions on Dependable and Secure Computing 2021-12-28

The backwardness of the Mongolian network teaching resources results in its low reuse rates and utilization. For this situation, a retrieval method semantic web based on curriculum areas was set up. Firstly, established ontology course ‘Artificial Intelligence ’in area teaching, it uses relationship database MySQL to record information, top that, similarity calculation reasoning rules do information reasoning, end, builds query prototype system field  Mongolian teaching. Experimental show...

10.4304/jsw.9.7.1701-1706 article EN Journal of Software 2014-07-01

This paper firstly introduces the Clean Development Mechanism (CDM) and presents situation of iron steel industry CDM project. Then it further studies methodologies on assessment influence projects sustainable development, analyzes evaluates effecting China's development case Wugang Coke Dry Quenching Finally, makes some suggestions about how to promote for projects.

10.1109/icieem.2010.5645916 article EN 2010-10-01

Secure Layered architecture(SLA) has been become a widely used Architecture model. Each layer represents kind of function. In the current process software development, most SLA is based on MVC: Model, View and Controller. Model that to communicate with database provides data for controller. Controller logical layer, it responsible handling provided from model serve view. And display data. The Three tier architecture(TTA) practical in development. But some project, whose business more complex...

10.1109/trustcom/bigdatase.2018.00124 article EN 2018-08-01
Coming Soon ...