Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems B Dong, Z Chen, HW Wang, LA Tang, K Zhang, Y Lin, Z Li, H Chen ACM International Conference on Information and Knowledge Management (CIKM …, 2017 | 36 | 2017 |
Trust-but-verify: Verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm B Dong, R Liu, HW Wang IEEE Transactions on Services Computing 9 (1), 18-32, 2015 | 30 | 2015 |
Truth inference on sparse crowdsourcing data with local differential privacy H Sun, B Dong, H Wang, T Yu, Z Qin 2018 IEEE International Conference on Big Data (Big Data), 488-497, 2018 | 29 | 2018 |
Flat and hierarchical system deployment for edge computing systems E Wang, D Li, B Dong, H Zhou, M Zhu Future Generation Computer Systems 105, 308-317, 2020 | 25 | 2020 |
Prada: Privacy-preserving data-deduplication-as-a-service B Dong, R Liu, WH Wang Proceedings of the 23rd ACM International Conference on Conference on …, 2014 | 22 | 2014 |
Result integrity verification of outsourced frequent itemset mining B Dong, R Liu, H Wang Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 21 | 2013 |
Integrity authentication for SQL query evaluation on outsourced databases: A survey B Zhang, B Dong, WH Wang IEEE Transactions on Knowledge and Data Engineering 33 (4), 1601-1618, 2019 | 20 | 2019 |
Towards computational assessment of idea novelty K Wang, B Dong, J Ma Proceedings of the 52nd Hawaii international conference on system sciences, 2019 | 19 | 2019 |
Integrity verification of outsourced frequent itemset mining with deterministic guarantee B Dong, R Liu, WH Wang 2013 IEEE 13th International Conference on Data Mining, 1025-1030, 2013 | 18 | 2013 |
Cost-efficient data acquisition on online data marketplaces for correlation analysis Y Li, H Sun, B Dong arXiv preprint arXiv:1808.09545, 2018 | 13 | 2018 |
Pragmatics and semantics to connect specific local laws with public reactions M Puri, AS Varde, B Dong 2018 IEEE International Conference on Big Data (Big Data), 5433-5435, 2018 | 12 | 2018 |
Anomalous event sequence detection B Dong, Z Chen, LA Tang, H Chen, H Wang, K Zhang, Y Lin, Z Li IEEE Intelligent Systems 36 (3), 5-13, 2020 | 10 | 2020 |
CorrectMR: Authentication of distributed SQL execution on MapReduce B Zhang, B Dong, WH Wang IEEE Transactions on Knowledge and Data Engineering 33 (3), 897-908, 2019 | 10 | 2019 |
Cyber intrusion detection by using deep neural networks with attack-sharing loss B Dong, HW Wang, AS Varde, D Li, BK Samanthula, W Sun, L Zhao 2019 IEEE 5th International Conference on Big Data Intelligence and …, 2019 | 9 | 2019 |
Sensitive task assignments in crowdsourcing markets with colluding workers H Sun, B Dong, B Zhang, WH Wang, M Kantarcioglu 2018 IEEE 34th International Conference on Data Engineering (ICDE), 377-388, 2018 | 9 | 2018 |
Veridl: Integrity verification of outsourced deep learning services B Dong, B Zhang, H Wang Machine Learning and Knowledge Discovery in Databases. Research Track …, 2021 | 8 | 2021 |
A study on flat and hierarchical system deployment for edge computing D Li, B Dong, E Wang, M Zhu 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 8 | 2019 |
Towards optimal system deployment for edge computing: a preliminary study D Li, C Asikaburu, B Dong, H Zhou, S Azizi 2020 29th International Conference on Computer Communications and Networks …, 2020 | 7 | 2020 |
An SVM based secural image steganography algorithm for IoT W Sun, M Jia, S Yu, B Dong, X Li International Symposium on Cyberspace Safety and Security, 357-371, 2019 | 5 | 2019 |
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems B Dong, Z Chen, H Wang, LA Tang, K Zhang, Y Lin, H Chen, G Jiang arXiv preprint arXiv:1608.02639, 2016 | 5 | 2016 |