Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    VeriDL: Integrity Verification of Outsourced Deep Learning Services

    Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...

    Boxiang Dong, Bo Zhang, Hui (Wendy) Wang in Machine Learning and Knowledge Discovery i… (2021)

  2. No Access

    Chapter and Conference Paper

    An SVM Based Secural Image Steganography Algorithm for IoT

    With the fast development of IoT network, there are more and more images generated by sensors and other devices, which increases the transmission expenses. By adopting image steganography, the images can deli...

    Weifeng Sun, Minghan Jia, Shumiao Yu, Boxiang Dong in Cyberspace Safety and Security (2019)

  3. No Access

    Chapter and Conference Paper

    MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT

    Software defined network (SDN) can effectively balance link loads and guarantee QoS for different application categories of data streams on Internet of Things (IoT). To achieve high accuracy and low time consu...

    Weifeng Sun, Zun Wang, Guanghao Zhang in Advanced Data Mining and Applications (2019)

  4. No Access

    Chapter and Conference Paper

    Efficient Authentication of Approximate Record Matching for Outsourced Databases

    Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the ...

    Boxiang Dong, Hui Wendy Wang in Theory and Application of Reuse, Integrati… (2019)

  5. Chapter and Conference Paper

    Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations

    When outsourcing data mining needs to an untrusted service provider in the Data-Mining-as-a-Service (DMaS) paradigm, it is important to verify whether the service provider (server) returns correct mining resul...

    Bo Zhang, Boxiang Dong, Wendy Wang in Data and Applications Security and Privacy XXXI (2017)

  6. Chapter and Conference Paper

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...

    Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang in Data and Applications Security and Privacy… (2013)