
Dr Hongsheng Hu
Lecturer
School of Information and Physical Sciences (Data Science and Statistics)
Career Summary
Biography
Qualifications
- DOCTOR OF PHILOSOPHY IN COMPUTER SYSTEMS ENGINEERING, University of Auckland - NZ
Keywords
- Data Privacy
- Machine Unlearning
- Trustworthy Machine Learning
Languages
- English (Fluent)
- Mandarin (Mother)
Fields of Research
| Code | Description | Percentage |
|---|---|---|
| 461101 | Adversarial machine learning | 30 |
| 490508 | Statistical data science | 30 |
| 460402 | Data and information privacy | 40 |
Professional Experience
UON Appointment
| Title | Organisation / Department |
|---|---|
| Lecturer | University of Newcastle School of Information and Physical Sciences Australia |
Academic appointment
| Dates | Title | Organisation / Department |
|---|---|---|
| 4/10/2022 - 23/8/2024 | Research Fellow | CSIRO - Commonwealth Scientific and Industrial Research Organisation Data61 |
Teaching
| Code | Course | Role | Duration |
|---|---|---|---|
| STAT6020 |
Predictive Analytics College of Engineering, Science and Environment, University of Newcastle |
Course Coordinator | 26/8/2024 - 30/11/2024 |
| STAT2020 |
Predictive Analytics College of Engineering, Science and Environment, University of Newcastle |
Course Coordinator | 26/8/2024 - 30/11/2024 |
Publications
For publications that are currently unpublished or in-press, details are shown in italics.
Conference (18 outputs)
| Year | Citation | Altmetrics | Link | |||||
|---|---|---|---|---|---|---|---|---|
| 2025 |
Song T, Qi L, Liu W, Wang F, Xu X, Hu H, Cao Y, Zhang X, Beheshti A, 'Boosting Guided Diffusion with Large Language Models for Multimodal Sequential Recommendation', Proceedings of the 33rd ACM International Conference on Multimedia, 6203-6212 (2025)
|
|||||||
| 2025 |
Sun R, Hu H, Luo W, Zhang Z, Zhang Y, Yuan H, Zhang LY, 'When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning', Proceedings of the ACM Conference on Computer and Communications Security, 488-500 (2025)
|
|||||||
| 2025 |
Xu X, Cao Y, Hu H, Xiang H, Qi L, Xiong J, Dou W, 'MGF-ESE: An Enhanced Semantic Extractor with Multi-Granularity Feature Fusion for Code Summarization', WWW '25: Proceedings of the ACM Web Conference, 4316-4324 (2025) [E1]
|
|||||||
| 2025 |
Li S, He C, Ma X, Zhu BB, Wang S, Hu H, Zhang D, Yu L, 'Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training', Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 20685-20694 (2025)
|
|||||||
| 2024 |
Hu H, Wang S, Chang J, Zhong H, Sun R, Hao S, et al., 'A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services', Proceedings 2024 Network and Distributed System Security Symposium, San Diego, California (2024) [E1]
|
|||||||
| 2024 | Wang S, Hu H, Chang J, Zhao BZH, Chen QA, Xue M, 'DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts', Proceedings of the 33rd USENIX Security Symposium, 1297-1314 (2024) [E1] | |||||||
| 2024 |
Chi X, Zhang X, Wang Y, Qi L, Beheshti A, Xu X, Choo KKR, Wang S, Hu H, 'Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought', IJCAI International Joint Conference on Artificial Intelligence, 5781-5789 (2024) [E1]
|
|||||||
| 2024 |
Hu H, Wang S, Dong T, Xue M, 'Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning', Proceedings - IEEE Symposium on Security and Privacy, 3257-3275 (2024)
|
|||||||
| 2024 |
Wang S, Hu H, Chang J, Zhao BZH, Xue M, 'LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs', Proceedings - IEEE Symposium on Security and Privacy, 2977-2995 (2024) [E1]
|
|||||||
| 2024 |
Wu N, Yuan X, Wang S, Hu H, Xue M, 'Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach', WWW 2024 - Proceedings of the ACM Web Conference, 3076-3084 (2024) [E1]
|
|||||||
| 2024 |
Zhao D, Koh YS, Dobbie G, Hu H, Fournier-Viger P, 'Symmetric Self-Paced Learning for Domain Generalization', Proceedings of the AAAI Conference on Artificial Intelligence, 38, 16961-16969 (2024) [E1]
|
|||||||
| 2024 | Jia Y, Zhang X, Hu H, Choo KKR, Qi L, Xu X, Beheshti A, Dou W, 'DapperFL: Domain Adaptive Federated Learning with Model Fusion Pruning for Edge Devices', Advances in Neural Information Processing Systems, 37, 1-25 (2024) [E1] | |||||||
| 2023 |
Xiang H, Zhang X, Hu H, Qi L, Dou W, Dras M, Beheshti A, Xu X, 'OptIForest: Optimal Isolation Forest for Anomaly Detection', PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2379-2387 (2023) [E1]
|
|||||||
| 2022 |
Hu H, Salcic Z, Dobbie G, Chen J, Sun L, Zhang X, 'Membership Inference via Backdooring', IJCAI International Joint Conference on Artificial Intelligence, 3832-3838 (2022) [E1]
|
|||||||
| 2022 |
Xiang H, Hu H, Zhang X, 'DeepiForest: A Deep Anomaly Detection Framework with Hashing Based Isolation Forest', 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 1251-1256 (2022) [E1]
|
|||||||
| 2021 |
Hu H, Salcic Z, Sun L, Dobbie G, Zhang X, 'Source Inference Attacks in Federated Learning', 2021 21ST IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2021), 1102-1107 (2021) [E1]
|
|||||||
| 2021 |
Hu H, Salcic Z, Dobbie G, Chen Y, Zhang X, 'EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks', 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2021) [E1]
|
|||||||
| 2020 |
Hu H, Dobbie G, Salcic Z, Liu M, Zhang J, Zhang X, 'A Locality Sensitive Hashing Based Approach for Federated Recommender System', 2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020), 836-842 (2020) [E1]
|
|||||||
| Show 15 more conferences | ||||||||
Journal article (6 outputs)
| Year | Citation | Altmetrics | Link | |||||
|---|---|---|---|---|---|---|---|---|
| 2025 |
He X, Xu G, Han X, Wang Q, Zhao L, Shen C, Lin C, Zhao Z, Li Q, Yang L, Ji S, Li S, Zhu H, Wang Z, Zheng R, Zhu T, Li Q, He C, Wang Q, Hu H, Wang S, Sun SF, Yao H, Qin Z, Chen K, Zhao Y, Li H, Huang X, Feng D, 'Artificial intelligence security and privacy: a survey', Science China Information Sciences, 68 (2025) [C1]
|
|||||||
| 2024 |
Hu H, Zhang X, Salcic Z, Sun L, Choo K-KR, Dobbie G, 'Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 21, 3012-3029 [C1]
|
|||||||
| 2023 |
Hu H, Dobbie G, Salcic Z, Liu M, Zhang J, Lyu L, Zhang X, 'Differentially private locality sensitive hashing based federated recommender system', CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 35 (2023) [C1]
|
|||||||
| 2022 |
Hu H, Salcic Z, Sun L, Dobbie G, Yu PS, Zhang X, 'Membership Inference Attacks on Machine Learning: A Survey', ACM COMPUTING SURVEYS, 54 (2022) [C1]
|
|||||||
| 2022 |
Zhang Q, Zhang X, Hu H, Li C, Lin Y, Ma R, 'Sports match prediction model for training and exercise using attention-based LSTM network', DIGITAL COMMUNICATIONS AND NETWORKS, 8, 508-515 (2022) [C1]
|
|||||||
| 2021 |
Liu M, Hu H, Xiang H, Yang C, Lyu L, Zhang X, 'Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy', ACM TRANSACTIONS ON SENSOR NETWORKS, 17 (2021) [C1]
Recently, biometric identification has been extensively used for border control. Some face recognition systems have been designed based on Internet of Things. But the r... [more] Recently, biometric identification has been extensively used for border control. Some face recognition systems have been designed based on Internet of Things. But the rich personal information contained in face images can cause severe privacy breach and abuse issues during the process of identification if a biometric system has compromised by insiders or external security attacks. Encrypting the query face image is the state-of-the-art solution to protect an individual's privacy but incurs huge computational cost and poses a big challenge on time-critical identification applications. However, due to their high computational complexity, existing methods fail to handle large-scale biometric repositories where a target face is searched. In this article, we propose an efficient privacy-preserving face recognition scheme based on clustering. Concretely, our approach innovatively matches an encrypted face query against clustered faces in the repository to save computational cost while guaranteeing identification accuracy via a novel multi-matching scheme. To the best of our knowledge, our scheme is the first to reduce the computational complexity from O(M) in existing methods to approximate O(gM), where M is the size of a face repository. Extensive experiments on real-world datasets have shown the effectiveness and efficiency of our scheme.
|
|||||||
| Show 3 more journal articles | ||||||||
Research Supervision
Number of supervisions
Current Supervision
| Commenced | Level of Study | Research Title | Program | Supervisor Type |
|---|---|---|---|---|
| 2022 | PhD | On Identifying and Mitigating Vulnerability in Recommender Systems | Computer Science, Macquarie University | Co-Supervisor |
Research Collaborations
The map is a representation of a researchers co-authorship with collaborators across the globe. The map displays the number of publications against a country, where there is at least one co-author based in that country. Data is sourced from the University of Newcastle research publication management system (NURO) and may not fully represent the authors complete body of work.
| Country | Count of Publications | |
|---|---|---|
| Australia | 18 | |
| China | 12 | |
| New Zealand | 10 | |
| United States | 7 | |
| Singapore | 1 |
Dr Hongsheng Hu
Position
Lecturer
School of Information and Physical Sciences
College of Engineering, Science and Environment
Focus area
Data Science and Statistics
Contact Details
| hongsheng.hu@newcastle.edu.au |
