Follow
Boxiang Dong
Boxiang Dong
Verified email at montclair.edu - Homepage
Title
Cited by
Cited by
Year
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems
B Dong, Z Chen, HW Wang, LA Tang, K Zhang, Y Lin, Z Li, H Chen
ACM International Conference on Information and Knowledge Management (CIKM …, 2017
342017
Trust-but-verify: Verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm
B Dong, R Liu, HW Wang
IEEE Transactions on Services Computing 9 (1), 18-32, 2015
322015
Truth inference on sparse crowdsourcing data with local differential privacy
H Sun, B Dong, H Wang, T Yu, Z Qin
2018 IEEE International Conference on Big Data (Big Data), 488-497, 2018
262018
Flat and hierarchical system deployment for edge computing systems
E Wang, D Li, B Dong, H Zhou, M Zhu
Future Generation Computer Systems 105, 308-317, 2020
212020
Prada: Privacy-preserving data-deduplication-as-a-service
B Dong, R Liu, WH Wang
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
212014
Result integrity verification of outsourced frequent itemset mining
B Dong, R Liu, H Wang
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
182013
Integrity verification of outsourced frequent itemset mining with deterministic guarantee
B Dong, R Liu, WH Wang
2013 IEEE 13th International Conference on Data Mining, 1025-1030, 2013
172013
Integrity authentication for SQL query evaluation on outsourced databases: A survey
B Zhang, B Dong, WH Wang
IEEE Transactions on Knowledge and Data Engineering 33 (4), 1601-1618, 2019
162019
Towards computational assessment of idea novelty
K Wang, B Dong, J Ma
Proceedings of the 52nd Hawaii international conference on system sciences, 2019
142019
Pragmatics and semantics to connect specific local laws with public reactions
M Puri, AS Varde, B Dong
2018 IEEE International Conference on Big Data (Big Data), 5433-5435, 2018
122018
Anomalous event sequence detection
B Dong, Z Chen, LA Tang, H Chen, H Wang, K Zhang, Y Lin, Z Li
IEEE Intelligent Systems 36 (3), 5-13, 2020
92020
CorrectMR: Authentication of distributed SQL execution on MapReduce
B Zhang, B Dong, WH Wang
IEEE Transactions on Knowledge and Data Engineering 33 (3), 897-908, 2019
92019
Cost-efficient data acquisition on online data marketplaces for correlation analysis
Y Li, H Sun, B Dong
arXiv preprint arXiv:1808.09545, 2018
92018
A study on flat and hierarchical system deployment for edge computing
D Li, B Dong, E Wang, M Zhu
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
82019
Sensitive task assignments in crowdsourcing markets with colluding workers
H Sun, B Dong, B Zhang, WH Wang, M Kantarcioglu
2018 IEEE 34th International Conference on Data Engineering (ICDE), 377-388, 2018
82018
Veridl: Integrity verification of outsourced deep learning services
B Dong, B Zhang, H Wang
Machine Learning and Knowledge Discovery in Databases. Research Track …, 2021
62021
Towards optimal system deployment for edge computing: a preliminary study
D Li, C Asikaburu, B Dong, H Zhou, S Azizi
2020 29th International Conference on Computer Communications and Networks …, 2020
62020
Cyber intrusion detection by using deep neural networks with attack-sharing loss
B Dong, AS Varde, D Li, BK Samanthula, W Sun, L Zhao
arXiv preprint arXiv:2103.09713, 2021
52021
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems
B Dong, Z Chen, H Wang, LA Tang, K Zhang, Y Lin, H Chen, G Jiang
arXiv preprint arXiv:1608.02639, 2016
52016
Secure data outsourcing with adversarial data dependency constraints
B Dong, W Wang, J Yang
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20