Boxiang Dong
Orcid: 0000-0001-9520-1494
According to our database1,
Boxiang Dong
authored at least 43 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Knowl. Data Eng., 2021
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version).
CoRR, 2021
Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition.
CoRR, 2021
CoRR, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
DeepICU: imbalanced classification by using deep neural networks for network intrusion detection.
Int. J. Big Data Intell., 2020
Future Gener. Comput. Syst., 2020
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services.
Cryptogr., 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2D-ATT: Causal Inference for Mobile Game Organic Installs with 2-Dimensional Attentional Neural Network.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019
MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019
2018
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis.
Proc. VLDB Endow., 2018
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
Data Knowl. Eng., 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.
IEEE Trans. Serv. Comput., 2016
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems.
CoRR, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
2013
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2010
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
Int. J. Inf. Process. Manag., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010