Остановите войну!
for scientists:
default search action
Wendy Hui Wang
- > Home > Persons > Wendy Hui Wang
Publications
- 2021
- [j20]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [j19]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
CorrectMR: Authentication of Distributed SQL Execution on MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 897-908 (2021) - [j18]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Trans. Knowl. Data Eng. 33(4): 1601-1618 (2021) - [c51]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services. ECML/PKDD (2) 2021: 583-598 - [i9]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - [i8]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version). CoRR abs/2107.00495 (2021) - 2020
- [j17]Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 17(2): 222-235 (2020) - [c47]Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. CODASPY 2020: 121-132 - 2018
- [j16]Boxiang Dong, Wendy Hui Wang:
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model. Data Knowl. Eng. 116: 1-20 (2018) - [j15]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. Proc. VLDB Endow. 12(4): 362-375 (2018) - [c43]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c42]Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, Murat Kantarcioglu:
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. ICDE 2018: 377-388 - [c41]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
AssureMR: Verifiable SQL Execution on MapReduce. ICDE 2018: 1228-1231 - [i6]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i5]Bo Zhang, Boxiang Dong, Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. CoRR abs/1808.08313 (2018) - [i4]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. CoRR abs/1808.09545 (2018) - 2017
- [c40]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [c39]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. DBSec 2017: 311-324 - [c38]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [c37]Boxiang Dong, Wendy Hui Wang:
Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases. ICDE 2017: 721-732 - [c36]Boxiang Dong, Wendy Hui Wang:
EARRING: Efficient Authentication of Outsourced Record Matching. IRI 2017: 225-234 - 2016
- [j14]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm. IEEE Trans. Serv. Comput. 9(1): 18-32 (2016) - [c34]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c32]Boxiang Dong, Wendy Hui Wang:
ARM: Authenticated Approximate Record Matching for Outsourced Databases. IRI 2016: 591-600 - [i3]Boxiang Dong, Wendy Hui Wang:
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. CoRR abs/1603.00893 (2016) - [i2]Boxiang Dong, Hui Wang:
Efficient Authentication of Outsourced String Similarity Search. CoRR abs/1603.02727 (2016) - [i1]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - 2014
- [c30]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
PraDa: Privacy-preserving Data-Deduplication-as-a-Service. CIKM 2014: 1559-1568 - 2013
- [c26]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. DBSec 2013: 258-265 - [c25]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint