Boxiang Dong

Orcid: 0000-0001-9520-1494

According to our database1, Boxiang Dong authored at least 43 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Temporal Ordinance Mining for Event-Driven Social Media Reaction Analytics.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

2021
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey.
IEEE Trans. Knowl. Data Eng., 2021

CorrectMR: Authentication of Distributed SQL Execution on MapReduce.
IEEE Trans. Knowl. Data Eng., 2021

Anomalous Event Sequence Detection.
IEEE Intell. Syst., 2021

VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version).
CoRR, 2021

Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition.
CoRR, 2021

Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss.
CoRR, 2021

VeriDL: Integrity Verification of Outsourced Deep Learning Services.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Authenticated Outlier Mining for Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2020

DeepICU: imbalanced classification by using deep neural networks for network intrusion detection.
Int. J. Big Data Intell., 2020

Flat and hierarchical system deployment for edge computing systems.
Future Gener. Comput. Syst., 2020

ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services.
Cryptogr., 2020

Towards Optimal System Deployment for Edge Computing: A Preliminary Study.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

A Novel Collaborative Filtering Framework Based on Variational Self-Attention GAN.
Proceedings of the IEEE Global Communications Conference, 2020

AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

LSOMP: Large Scale Ordinance Mining Portal.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2D-ATT: Causal Inference for Mobile Game Organic Installs with 2-Dimensional Attentional Neural Network.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Towards Computational Assessment of Idea Novelty.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

An SVM Based Secural Image Steganography Algorithm for IoT.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Study on Flat and Hierarchical System Deployment for Edge Computing.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

2018
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis.
Proc. VLDB Endow., 2018

Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
Data Knowl. Eng., 2018

AssureMR: Verifiable SQL Execution on MapReduce.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Pragmatics and Semantics to Connect Specific Local Laws with Public Reactions.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
EARRING: Efficient Authentication of Outsourced Record Matching.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.
IEEE Trans. Serv. Comput., 2016

Efficient Authentication of Outsourced String Similarity Search.
CoRR, 2016

GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems.
CoRR, 2016

ARM: Authenticated Approximate Record Matching for Outsourced Databases.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Secure Data Outsourcing with Adversarial Data Dependency Constraints.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2014
PraDa: Privacy-preserving Data-Deduplication-as-a-Service.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Result Integrity Verification of Outsourced Frequent Itemset Mining.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2010
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
Int. J. Inf. Process. Manag., 2010

A Low-Level Security Solving Method in Grid.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010


  Loading...