Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    VeriDL: Integrity Verification of Outsourced Deep Learning Services

    Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...

    Boxiang Dong, Bo Zhang, Hui (Wendy) Wang in Machine Learning and Knowledge Discovery i… (2021)

  2. No Access

    Chapter and Conference Paper

    Efficient Authentication of Approximate Record Matching for Outsourced Databases

    Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the ...

    Boxiang Dong, Hui Wendy Wang in Theory and Application of Reuse, Integrati… (2019)

  3. Chapter and Conference Paper

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...

    Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang in Data and Applications Security and Privacy… (2013)

  4. Chapter and Conference Paper

    AUDIO: An Integrity \(\underline{Audi}\) ting Framework of \(\underline{O}\) utlier-Mining-as-a-Service Systems

    Spurred by developments such as cloud computing, there has been considerable recent interest in the data-mining-as-a-service paradigm. Users lacking in expertise or computational resources can outsource their ...

    Ruilin Liu, Hui (Wendy) Wang, Anna Monreale in Machine Learning and Knowledge Discovery i… (2012)

  5. No Access

    Chapter and Conference Paper

    Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems

    Data archiving has been commonly used in many fields for data backup and analysis purposes. Although comprehensive application software, new computing and storage technologies, and the Internet have made it ea...

    Hui (Wendy) Wang, Ruilin Liu in Scientific and Statistical Database Manage… (2011)

  6. No Access

    Chapter

    Privacy-Preserving Data Mining from Outsourced Databases

    Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service: a company (data owner) lacking in expertise or computational resources ca...

    Fosca Giannotti, Laks V.S. Lakshmanan in Computers, Privacy and Data Protection: an… (2011)

  7. Article

    Open Access

    A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks

    Data-centric storage provides energy-efficient data dissemination and organization for the increasing amount of wireless data. One of the approaches in data-centric storage is that the nodes that collected dat...

    Yingying Chen, Hui(Wendy) Wang in EURASIP Journal on Wireless Communications… (2010)

  8. No Access

    Chapter and Conference Paper

    Privacy-Preserving Publishing Data with Full Functional Dependencies

    We study the privacy threat by publishing data that contains full functional dependencies (FFDs). We show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunate...

    Hui (Wendy) Wang, Ruilin Liu in Database Systems for Advanced Applications (2010)

  9. Chapter and Conference Paper

    Distributed and Secure Access Control in P2P Databases

    The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to autho...

    Angela Bonifati, Ruilin Liu in Data and Applications Security and Privacy… (2010)