default search action
Boxiang Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c27]Aparna S. Varde, Gerard de Melo, Boxiang Dong:
Temporal Ordinance Mining for Event-Driven Social Media Reaction Analytics. WWW (Companion Volume) 2023: 1225-1227 - 2021
- [j11]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [j10]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
CorrectMR: Authentication of Distributed SQL Execution on MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 897-908 (2021) - [j9]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Trans. Knowl. Data Eng. 33(4): 1601-1618 (2021) - [c26]Weifeng Sun, Shumiao Yu, Boxiang Dong:
VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs. IJCNN 2021: 1-8 - [c25]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services. ECML/PKDD (2) 2021: 583-598 - [i9]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - [i8]Boxiang Dong, Aparna S. Varde, Danilo Stevanovic, Jiayin Wang, Liang Zhao:
Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition. CoRR abs/2103.09714 (2021) - [i7]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version). CoRR abs/2107.00495 (2021) - 2020
- [j8]Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari:
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services. Cryptogr. 4(4): 29 (2020) - [j7]En Wang, Dawei Li, Boxiang Dong, Huan Zhou, Michelle Zhu:
Flat and hierarchical system deployment for edge computing systems. Future Gener. Comput. Syst. 105: 308-317 (2020) - [j6]Allen Yang, Boxiang Dong, Dawei Li, Weifeng Sun, Bharath K. Samanthula:
DeepICU: imbalanced classification by using deep neural networks for network intrusion detection. Int. J. Big Data Intell. 7(3): 137-147 (2020) - [j5]Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 17(2): 222-235 (2020) - [c24]Boxiang Dong, Hui Bill Li, Yang Ryan Wang, Rami Safadi:
2D-ATT: Causal Inference for Mobile Game Organic Installs with 2-Dimensional Attentional Neural Network. IEEE BigData 2020: 1503-1512 - [c23]Xu Du, Matthew Kowalski, Aparna S. Varde, Boxiang Dong:
LSOMP: Large Scale Ordinance Mining Portal. IEEE BigData 2020: 5662-5664 - [c22]Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. CODASPY 2020: 121-132 - [c21]Weifeng Sun, Shumiao Yu, Jin Yang, Boxiang Dong:
A Novel Collaborative Filtering Framework Based on Variational Self-Attention GAN. GLOBECOM 2020: 1-6 - [c20]Dawei Li, Chigozie Asikaburu, Boxiang Dong, Huan Zhou, Sadoon Azizi:
Towards Optimal System Deployment for Edge Computing: A Preliminary Study. ICCCN 2020: 1-6
2010 – 2019
- 2019
- [c19]Weifeng Sun, Zun Wang, Guanghao Zhang, Boxiang Dong:
MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT. ADMA 2019: 815-827 - [c18]Dawei Li, Boxiang Dong, En Wang, Michelle Zhu:
A Study on Flat and Hierarchical System Deployment for Edge Computing. CCWC 2019: 163-169 - [c17]Weifeng Sun, MingHan Jia, Shumiao Yu, Boxiang Dong, Xinyi Li:
An SVM Based Secural Image Steganography Algorithm for IoT. CSS (2) 2019: 357-371 - [c16]Kai Wang, Boxiang Dong, Junjie Ma:
Towards Computational Assessment of Idea Novelty. HICSS 2019: 1-9 - 2018
- [j4]Boxiang Dong, Wendy Hui Wang:
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model. Data Knowl. Eng. 116: 1-20 (2018) - [j3]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. Proc. VLDB Endow. 12(4): 362-375 (2018) - [c15]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c14]Manish Puri, Aparna S. Varde, Boxiang Dong:
Pragmatics and Semantics to Connect Specific Local Laws with Public Reactions. IEEE BigData 2018: 5433-5435 - [c13]Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, Murat Kantarcioglu:
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. ICDE 2018: 377-388 - [c12]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
AssureMR: Verifiable SQL Execution on MapReduce. ICDE 2018: 1228-1231 - [i6]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i5]Bo Zhang, Boxiang Dong, Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. CoRR abs/1808.08313 (2018) - [i4]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. CoRR abs/1808.09545 (2018) - 2017
- [c11]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [c10]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. DBSec 2017: 311-324 - [c9]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [c8]Boxiang Dong, Wendy Hui Wang:
Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases. ICDE 2017: 721-732 - [c7]Boxiang Dong, Wendy Hui Wang:
EARRING: Efficient Authentication of Outsourced Record Matching. IRI 2017: 225-234 - 2016
- [j2]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm. IEEE Trans. Serv. Comput. 9(1): 18-32 (2016) - [c6]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c5]Boxiang Dong, Wendy Hui Wang:
ARM: Authenticated Approximate Record Matching for Outsourced Databases. IRI 2016: 591-600 - [i3]Boxiang Dong, Wendy Hui Wang:
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. CoRR abs/1603.00893 (2016) - [i2]Boxiang Dong, Hui Wang:
Efficient Authentication of Outsourced String Similarity Search. CoRR abs/1603.02727 (2016) - [i1]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - 2014
- [c4]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
PraDa: Privacy-preserving Data-Deduplication-as-a-Service. CIKM 2014: 1559-1568 - 2013
- [c3]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. DBSec 2013: 258-265 - [c2]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030 - 2010
- [j1]Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin:
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid. Int. J. Inf. Process. Manag. 1(2): 103-114 (2010) - [c1]Weifeng Sun, Boxiang Dong, Zhenquan Qin, Juanyun Wang, Mingchu Li:
A Low-Level Security Solving Method in Grid. IIH-MSP 2010: 727-730
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint