Calculated based on number of publications stored in Pure and citations from Scopus
20102023

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    2D-FACT: Dual-Domain Fake Image Detection Against Text-To-Image Generative Models

    Ji, E., Dong, B., Samanthula, B. & Zhou, N., 2023, IEEE MIT Undergraduate Research Technology Conference, URTC 2023 - Proceedings. Institute of Electrical and Electronics Engineers Inc., (IEEE MIT Undergraduate Research Technology Conference, URTC 2023 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A Probabilistic Approach for Secure and Verifiable Computation of kNN Queries in Cloud

    Sundarapandi, G. P., Bokhary, S., Samanthula, B. K. & Dong, B., 2023, Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023. Institute of Electrical and Electronics Engineers Inc., p. 15-20 6 p. (Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Temporal Ordinance Mining for Event-Driven Social Media Reaction Analytics

    Varde, A. S., De Melo, G. & Dong, B., 30 Apr 2023, ACM Web Conference 2023 - Companion of the World Wide Web Conference, WWW 2023. Association for Computing Machinery, Inc, p. 1225-1227 3 p. (ACM Web Conference 2023 - Companion of the World Wide Web Conference, WWW 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Towards Trustworthy Outsourced Deep Neural Networks

    Ahmad, L., Dong, B., Samanthula, B., Wang, R. Y. & Li, B. H., 2021, Proceedings - 2021 IEEE Cloud Summit, Cloud Summit 2021. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. (Proceedings - 2021 IEEE Cloud Summit, Cloud Summit 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs

    Sun, W., Yu, S. & Dong, B., 18 Jul 2021, IJCNN 2021 - International Joint Conference on Neural Networks, Proceedings. Institute of Electrical and Electronics Engineers Inc., (Proceedings of the International Joint Conference on Neural Networks; vol. 2021-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • VeriDL: Integrity Verification of Outsourced Deep Learning Services

    Dong, B., Zhang, B. & Wang, H., 2021, Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2021, Proceedings. Oliver, N., Pérez-Cruz, F., Kramer, S., Read, J. & Lozano, J. A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 583-598 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12976 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2020

    2D-ATT: Causal Inference for Mobile Game Organic Installs with 2-Dimensional Attentional Neural Network

    Dong, B., Li, H. B., Wang, Y. R. & Safadi, R., 10 Dec 2020, Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020. Wu, X., Jermaine, C., Xiong, L., Hu, X. T., Kotevska, O., Lu, S., Xu, W., Aluru, S., Zhai, C., Al-Masri, E., Chen, Z. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1503-1512 10 p. 9378413. (Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data

    Zhang, B., Dong, B., Sun, H. & Wang, W. H., 16 Mar 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 121-132 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • LSOMP: Large Scale Ordinance Mining Portal

    Du, X., Kowalski, M., Varde, A. S. & Dong, B., 10 Dec 2020, Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020. Wu, X., Jermaine, C., Xiong, L., Hu, X. T., Kotevska, O., Lu, S., Xu, W., Aluru, S., Zhai, C., Al-Masri, E., Chen, Z. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 5662-5664 3 p. 9378354. (Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Towards Optimal System Deployment for Edge Computing: A Preliminary Study

    Li, D., Asikaburu, C., Dong, B., Zhou, H. & Azizi, S., Aug 2020, ICCCN 2020 - 29th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 9209754. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2020-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2019

    An SVM based secural image steganography algorithm for IoT

    Sun, W., Jia, M., Yu, S., Dong, B. & Li, X., 2019, Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings. Vaidya, J., Zhang, X. & Li, J. (eds.). Springer, p. 357-371 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11983 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • A privacy-preserving framework for collaborative association rule mining in cloud

    Samanthula, B. K., Albehairi, S. & Dong, B., Aug 2019, Proceedings - 2019 3rd IEEE International Conference on Cloud and Fog Computing Technologies and Applications, Cloud Summit 2019. Institute of Electrical and Electronics Engineers Inc., p. 116-121 6 p. 9045761. (Proceedings - 2019 3rd IEEE International Conference on Cloud and Fog Computing Technologies and Applications, Cloud Summit 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • A study on flat and hierarchical system deployment for edge computing

    Li, D., Dong, B., Wang, E. & Zhu, M., 12 Mar 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019. Chakrabarti, S. & Saha, H. N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 163-169 7 p. 8666572. (2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss

    Dong, B., Wang, H. W., Varde, A., Li, D., Samanthula, B. K., Sun, W. & Zhao, L., 2019, Proceedings - 2019 IEEE 5th International Conference on Big Data Intelligence and Computing, DataCom 2019. Institute of Electrical and Electronics Engineers Inc., p. 9-16 8 p. (Proceedings - 2019 IEEE 5th International Conference on Big Data Intelligence and Computing, DataCom 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT

    Sun, W., Wang, Z., Zhang, G. & Dong, B., 2019, Advanced Data Mining and Applications - 15th International Conference, ADMA 2019, Proceedings. Li, J., Wang, S., Qin, S., Li, X. & Wang, S. (eds.). Springer, p. 815-827 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11888 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Towards computational assessment of idea novelty

    Wang, K., Dong, B. & Ma, J., 2019, Proceedings of the 52nd Annual Hawaii International Conference on System Sciences, HICSS 2019. Bui, T. X. (ed.). IEEE Computer Society, p. 912-920 9 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2018

    Assuremr: Verifiable SQL execution on mapreduce

    Zhang, B., Dong, B. & Wang, W. H., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1232-1235 4 p. 8509338. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Pragmatics and Semantics to Connect Specific Local Laws with Public Reactions

    Puri, M., Varde, A. S. & Dong, B., 2 Jul 2018, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Abe, N., Liu, H., Pu, C., Hu, X., Ahmed, N., Qiao, M., Song, Y., Kossmann, D., Liu, B., Lee, K., Tang, J., He, J. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 5433-5435 3 p. 8622162. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Sensitive task assignments in crowdsourcing markets with colluding workers

    Sun, H., Dong, B., Zhang, B., Wang, W. H. & Kantarcioglu, M., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 377-388 12 p. 8509263. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

    Sun, H., Dong, B., Wang, H. W., Yu, T. & Qin, Z., 2 Jul 2018, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Abe, N., Liu, H., Pu, C., Hu, X., Ahmed, N., Qiao, M., Song, Y., Kossmann, D., Liu, B., Lee, K., Tang, J., He, J. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    19 Scopus citations
  • 2017

    Budget-constrained result integrity verification of outsourced data mining computations

    Zhang, B., Dong, B. & Wang, W., 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 311-324 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • EARRING: Efficient authentication of outsourced record matching

    Dong, B. & Wang, H., 8 Nov 2017, Proceedings - 2017 IEEE International Conference on Information Reuse and Integration, IRI 2017. Khan, L., Palanisamy, B., Zhang, C. & Sarvestani, S. S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 225-234 10 p. (Proceedings - 2017 IEEE International Conference on Information Reuse and Integration, IRI 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient discovery of abnormal event sequences in enterprise security systems

    Dong, B., Chen, Z., Wang, H., Tang, L. A., Zhang, K., Lin, Y., Li, Z. & Chen, H., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 707-715 9 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Frequency-hiding dependency-preserving encryption for outsourced databases

    Dong, B. & Wang, W., 16 May 2017, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, p. 721-732 12 p. 7930020. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints

    Cai, C., Sun, H., Dong, B., Zhang, B., Wang, T. & Wang, H., 13 Jul 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2567-2568 2 p. 7980235. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    ARM: Authenticated approximate record matching for outsourced databases

    Dong, B. & Wang, W., 2016, Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016. Institute of Electrical and Electronics Engineers Inc., p. 591-600 10 p. (Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Secure Data Outsourcing with Adversarial Data Dependency Constraints

    Dong, B., Wang, W. & Yang, J., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 73-78 6 p. 7502267. (Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2014

    PraDa: Privacy-preserving data-deduplication-as-a-service

    Dong, B., Liu, R. & Wang, W. H., 3 Nov 2014, CIKM 2014 - Proceedings of the 2014 ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1559-1568 10 p. (CIKM 2014 - Proceedings of the 2014 ACM International Conference on Information and Knowledge Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2013

    Result integrity verification of outsourced frequent itemset mining

    Dong, B., Liu, R. & Wang, H., 2013, Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings. p. 258-265 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7964 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • 2010

    A low-level Security Solving Method in grid

    Sun, W., Dong, B., Qin, Z., Wang, J. & Li, M., 2010, Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010. p. 727-730 4 p. 5636131. (Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access