Seguir
Boxiang Dong
Boxiang Dong
Dirección de correo verificada de montclair.edu - Página principal
Título
Citado por
Citado por
Año
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems
B Dong, Z Chen, HW Wang, LA Tang, K Zhang, Y Lin, Z Li, H Chen
ACM International Conference on Information and Knowledge Management (CIKM …, 2017
342017
Trust-but-verify: Verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm
B Dong, R Liu, HW Wang
IEEE Transactions on Services Computing 9 (1), 18-32, 2015
322015
Truth inference on sparse crowdsourcing data with local differential privacy
H Sun, B Dong, H Wang, T Yu, Z Qin
2018 IEEE International Conference on Big Data (Big Data), 488-497, 2018
272018
Flat and hierarchical system deployment for edge computing systems
E Wang, D Li, B Dong, H Zhou, M Zhu
Future Generation Computer Systems 105, 308-317, 2020
222020
Prada: Privacy-preserving data-deduplication-as-a-service
B Dong, R Liu, WH Wang
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
212014
Integrity authentication for SQL query evaluation on outsourced databases: A survey
B Zhang, B Dong, WH Wang
IEEE Transactions on Knowledge and Data Engineering 33 (4), 1601-1618, 2019
182019
Result integrity verification of outsourced frequent itemset mining
B Dong, R Liu, H Wang
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
182013
Integrity verification of outsourced frequent itemset mining with deterministic guarantee
B Dong, R Liu, WH Wang
2013 IEEE 13th International Conference on Data Mining, 1025-1030, 2013
172013
Towards computational assessment of idea novelty
K Wang, B Dong, J Ma
Proceedings of the 52nd Hawaii international conference on system sciences, 2019
142019
Pragmatics and semantics to connect specific local laws with public reactions
M Puri, AS Varde, B Dong
2018 IEEE International Conference on Big Data (Big Data), 5433-5435, 2018
122018
Anomalous event sequence detection
B Dong, Z Chen, LA Tang, H Chen, H Wang, K Zhang, Y Lin, Z Li
IEEE Intelligent Systems 36 (3), 5-13, 2020
92020
CorrectMR: Authentication of distributed SQL execution on MapReduce
B Zhang, B Dong, WH Wang
IEEE Transactions on Knowledge and Data Engineering 33 (3), 897-908, 2019
92019
Cost-efficient data acquisition on online data marketplaces for correlation analysis
Y Li, H Sun, B Dong
arXiv preprint arXiv:1808.09545, 2018
92018
Sensitive task assignments in crowdsourcing markets with colluding workers
H Sun, B Dong, B Zhang, WH Wang, M Kantarcioglu
2018 IEEE 34th International Conference on Data Engineering (ICDE), 377-388, 2018
92018
A study on flat and hierarchical system deployment for edge computing
D Li, B Dong, E Wang, M Zhu
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
82019
Veridl: Integrity verification of outsourced deep learning services
B Dong, B Zhang, H Wang
Machine Learning and Knowledge Discovery in Databases. Research Track …, 2021
72021
Towards optimal system deployment for edge computing: a preliminary study
D Li, C Asikaburu, B Dong, H Zhou, S Azizi
2020 29th International Conference on Computer Communications and Networks …, 2020
62020
Cyber intrusion detection by using deep neural networks with attack-sharing loss
B Dong, AS Varde, D Li, BK Samanthula, W Sun, L Zhao
arXiv preprint arXiv:2103.09713, 2021
52021
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems
B Dong, Z Chen, H Wang, LA Tang, K Zhang, Y Lin, H Chen, G Jiang
arXiv preprint arXiv:1608.02639, 2016
52016
Arm: Authenticated approximate record matching for outsourced databases
B Dong, W Wang
2016 IEEE 17th International Conference on Information Reuse and Integration …, 2016
52016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20