Author of the publication

Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.

, , and . IEEE Trans. Serv. Comput., 9 (1): 18-32 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PraDa: Privacy-preserving Data-Deduplication-as-a-Service., , and . CIKM, page 1559-1568. ACM, (2014)An SVM Based Secural Image Steganography Algorithm for IoT., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 357-371. Springer, (2019)DeepICU: imbalanced classification by using deep neural networks for network intrusion detection., , , , and . Int. J. Big Data Intell., 7 (3): 137-147 (2020)Flat and hierarchical system deployment for edge computing systems., , , , and . Future Gener. Comput. Syst., (2020)VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs., , and . IJCNN, page 1-8. IEEE, (2021)GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems., , , , , , , and . CoRR, (2016)Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm., , and . IEEE Trans. Serv. Comput., 9 (1): 18-32 (2016)Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition., , , , and . CoRR, (2021)Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey., , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1601-1618 (2021)MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT., , , and . ADMA, volume 11888 of Lecture Notes in Computer Science, page 815-827. Springer, (2019)