Boxiang Dong
Boxiang Dong
Email verificata su montclair.edu - Home page
Titolo
Citata da
Citata da
Anno
Trust-but-verify: Verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm
B Dong, R Liu, HW Wang
IEEE Transactions on Services Computing 9 (1), 18-32, 2015
202015
Result integrity verification of outsourced frequent itemset mining
B Dong, R Liu, HW Wang
IFIP Annual Conference on Data and Applications Security and Privacy, 258-265, 2013
172013
Integrity verification of outsourced frequent itemset mining with deterministic guarantee
B Dong, R Liu, WH Wang
2013 IEEE 13th International Conference on Data Mining, 1025-1030, 2013
162013
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems
B Dong, Z Chen, HW Wang, LA Tang, K Zhang, Y Lin, Z Li, H Chen
ACM International Conference on Information and Knowledge Management (CIKM …, 2017
142017
Prada: Privacy-preserving data-deduplication-as-a-service
B Dong, R Liu, WH Wang
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
142014
Truth inference on sparse crowdsourcing data with local differential privacy
H Sun, B Dong, HW Wang, T Yu, Z Qin
2018 IEEE International Conference on Big Data (Big Data), 488-497, 2018
92018
Pragmatics and semantics to connect specific local laws with public reactions
M Puri, AS Varde, B Dong
2018 IEEE International Conference on Big Data (Big Data), 5433-5435, 2018
52018
Towards Computational Assessment of Idea Novelty
K Wang, B Dong, J Ma
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
42019
A study on flat and hierarchical system deployment for edge computing
D Li, B Dong, E Wang, M Zhu
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
42019
Secure data outsourcing with adversarial data dependency constraints
B Dong, W Wang, J Yang
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
42016
Flat and hierarchical system deployment for edge computing systems
E Wang, D Li, B Dong, H Zhou, M Zhu
Future Generation Computer Systems 105, 308-317, 2020
32020
Sensitive task assignments in crowdsourcing markets with colluding workers
H Sun, B Dong, B Zhang, WH Wang, M Kantarcioglu
2018 IEEE 34th International Conference on Data Engineering (ICDE), 377-388, 2018
32018
Frequency-hiding dependency-preserving encryption for outsourced databases
B Dong, W Wang
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 721-732, 2017
32017
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
W Sun, J Wang, B Dong, M Li, Z Qin
Int. J. Inf. Process. Manag. 1 (2), 103-114, 2010
32010
CorrectMR: Authentication of Distributed SQL Execution on MapReduce
B Zhang, B Dong, H Wang
IEEE Transactions on Knowledge and Data Engineering, 2019
22019
Authenticated outlier mining for outsourced databases
B Dong, HW Wang, A Monreale, D Pedreschi, F Giannotti, W Guo
IEEE Transactions on Dependable and Secure Computing, 2017
22017
Arm: Authenticated approximate record matching for outsourced databases
B Dong, W Wang
2016 IEEE 17th International Conference on Information Reuse and Integration …, 2016
22016
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
B Zhang, B Dong, WH Wang
IEEE Transactions on Knowledge and Data Engineering, 2019
12019
AuthPDB: Query Authentication for Outsourced Probabilistic Databases
B Zhang, B Dong, H Wang
arXiv preprint arXiv:1808.08297, 2018
12018
Integrity authentication for sql query evaluation on outsourced databases: A survey
B Zhang, B Dong, H Wang
arXiv preprint arXiv:1808.08313, 2018
12018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20