myself

Boxiang Dong, Ph.D

Assistant Professor

Department of Computer Science

Montclair State University

Office: CCIS 227E

Phone: 973-655-4093

Email: dongb AT montclair DOT edu

A Brief Bio

I am a tenure-track assistant professor in the Computer Science Department at Montclair State University.

Prior to that, I received my Ph.D in Computer Science in 2016 from Department of Computer Science of Stevens Institute of Technology, which is located in NJ, USA. My Ph.D advisor is Prof. Wendy Wang. The title of my Ph.D dissertation is "Privacy-preserving and Authenticated Data Cleaning on Outsourced Databases" [PDF] [Slides].

In 2011, I received my Bachelor degree from Dalian University of Technology, China. In that time period, I worked with Prof. Weifeng Sun on network security.

This is my CV (last updated: 09/2018).

Research interests:

  • Cybersecurity
    • authentication of outsourced computing
    • privacy-preserving data mining
    • intrusion detection
  • Big data analytics
    • risk control
    • anomaly detection
    • deep learning
News
2020-04Our paper "DeepICU: Imbalanced classification by using Deep Neural Networks for Network Intrusion Detection" has been accepted by IJBDI!
2019-11Our paper "AuthPDB: Authentication of Probabilistic Queries onOutsourced Uncertain Data" has been accepted by CODASPY 2020!
2019-10Our paper "Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey" has been accepted by TDKE!
Publications

Journal

  1. Allen Yang, Boxiang Dong, Dawei Li, Weiefeng Sun, Bharath K. Samanthula.
    DeepICU: Imbalanced classification by using Deep Neural Networks for Network Intrusion Detection.
    International Journal of Big Data Intelligence.
    (In Press)
  2. En Wang, Dawei Li, Boxiang Dong, Huan Zhou, Michelle Zhu.
    Flat and Hierarchical System Deployment for Edge Computing Systems.
    Future Generation Computer Systems, 2020. (Impact Factor = 5.768)
    [Paper]
  3. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang.
    Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey.
    IEEE Transactions on Knowledge and Data Engineering, 2019. (Impact Factor = 3.857)
    (To Appear)
  4. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang.
    CorrectMR: Authentication of Distributed SQL Execution on MapReduce.
    IEEE Transactions on Knowledge and Data Engineering, 2019. (Impact Factor = 3.857)
    [Paper] [Bibtex]
  5. Boxiang Dong, Hui (Wendy) Wang.
    Efficient Authentication of Approximate Record Matching for Outsourced Databases.
    Information System Frontiers, 2018. (Impact Factor = 3.232)
    [Paper] [Bibtex]
  6. Boxiang Dong, Hui (Wendy) Wang.
    Secure Partial Encryption with Adversarial Functional Dependency Constraints in the Database-as-a-Service Model.
    Data & Knowledge Engineering, 2018. (Impact Factor = 1.694)
    [Paper] [Bibtex]
  7. Boxiang Dong, Hui (Wendy) Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo.
    Authenticated Outlier Mining for Outsourced Databases..
    The IEEE Transactions on Dependable and Secure Computing (TDSC). 2017. (Impact Factor = 2.926)
    [Paper] [Bibtex]
  8. Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang.
    Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining.
    IEEE Transactions on Services Computing. 2015. (Impact Factor = 2.520)
    [Paper][Bibtex]
  9. Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin.
    A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concern in Grid.
    International Journal of Information Processing and Management (IJIPM). 2010. (Impact Factor = 2.391)
    [Paper] [Bibtex]

Conference

  1. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang.
    AuthPDB: Authentication of Probabilistic Queries onOutsourced Uncertain Data
    ACM Conference on Data and Application Security and Privacy (CODASPY 2020). New Orleans, LA.
    (To Appear)
  2. Boxiang Dong, Aparna S. Varde, Danilo Stevanovic, Jiayin Wang and Liang Zhao.
    Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition.
    IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2019). Kaohsiung, Taiwan.
    [Paper][Bibtex]
  3. Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun and Liang Zhao.
    Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss.
    IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2019). Kaohsiung, Taiwan.
    [Paper][Bibtex]
  4. Weifeng Sun, Zun Wang, Guanghao Zhang, Boxiang Dong.
    MACCA: A SDN based Collaborative Classification Algorithm for QoS guaranteed Transmission on IoT.
    The 15th International Conference on Advanced Data Mining and Applications, Dalian, China, 2019.
    [Paper]
  5. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang., Hui Xiong
    Trust-but-Verify: Result Verification of Federated Deep Learning.
    Workshop on Adversarial Learning Methods for Machine Learning and Data Mining, Anchorage, Alaska. 2019. (Co-located with KDD'19)
    Best Paper Award
  6. Bharath K. Samanthula, Salha Albehairi, Boxiang Dong.
    A Privacy-Preserving Framework for Collaborative Association Rule Mining in Cloud.
    IEEE International Conference on Cloud and Fog Computing Technologies and Applications. Washington DC. 2019.
  7. Yanying Li, Hui (Wendy) Wang, Boxiang Dong.
    PIVOT: Privacy-preserving Outsourcing of Text Data for Word Embedding.
    AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies. 2019.
  8. Dawei Li, Boxiang Dong, En Wang, Michelle Zhu.
    A Study on Flat and Hierarchical System Deployment for Edge Computing.
    IEEE Computing and Communication Workshop and Conference (CCWC). Las Vegas, NV. 2019.
  9. Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang.
    Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis.
    International Conference on Very Large Data Bases (VLDB). Los Angeles, CA. 2019.
    [Paper][Bibtex]
  10. Manish Puri, Aparna S. Varde, Boxiang Dong.
    Pragmatics and Semantics to Connect Specific Local Laws with Public Reactions.
    IEEE 2018 International Conference on Big Data. Seattle, WA. 2018. (Poster Paper)
    [Paper][Bibtex]
  11. Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin.
    Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
    IEEE 2018 International Conference on Big Data. Seattle, WA. 2018. (Acceptance Rate: 99/518 = 19.1%)
    [Paper][Bibtex]
  12. Kai Wang, Boxiang Dong, Junjie Ma.
    Towards Computational Assessment of Idea Novelty.
    Hawaii International Conference on System Sciences (HICSS). Grand Wailea, Maui. 2019.
    [Paper][Bibtex]
  13. Haipei Sun, Boxiang Dong, Bo Zhang, Hui (Wendy) Wang, Murat Kantarcioglu.
    Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
    IEEE International Conference on Data Engineering (ICDE 2018). Paris, France. 2018.
    [Paper] [Bibtex]
  14. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang.
    AssureMR: Verifiable SQL Execution on MapReduce.
    IEEE International Conference on Data Engineering (ICDE 2018). Paris, France. 2018.
    [Bibtex]
  15. Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li and Haifeng Chen.
    Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems..
    The ACM International Conference on Information and Knowledge Management (CIKM). Pan Pacific, Singapore. 2017. (Acceptance Rate: 171/820=21%).
    [Paper] [Bibtex]
  16. Boxiang Dong, Hui (Wendy) Wang.
    EARRING: Efficient Authentication of Outsourced Record Matching..
    The IEEE International Conference on Information Reuse and Integration (IRI). San Diego, CA. 2017. (Acceptance Rate: 29%).
    Best Paper Award
    [Paper][Bibtex]
  17. Bo Zhang, Boxiang Dong, Hui (Wendy) Wang.
    Budget-constrained Result Integrity Verification of Outsourced Data Mining Computations.
    31th Annual IFIP WG 11.3 Conference on Data and Application Security and Privacy (DBSec). Philadelphia, PA. 2017.
    [Paper][Bibtex]
  18. Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui (Wendy) Wang.
    Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
    The IEEE International Conference on Distributed Computing Systems (ICDCS). Atlanta, GA. 2017.
    [Paper] [Bibtex]
  19. Yanying Li, Boxiang Dong, Dominik Jedruszczak, Hui (Wendy) Wang.
    Budget-constrained High-quality Data Purchase on Data Markets.
    The SIAM SDM'17 WinDS Workshop. Houston, TX. 2017.
    [Bibtex]
  20. Boxiang Dong, Hui (Wendy) Wang.
    Frequency-hiding Dependency-preserving Encryption for Outsourced Databases.
    The IEEE International Conference on Data Engineering (ICDE). San Diego, CA. 2017. (Acceptance Rate: 292/1395 = 20.9%).
    [Paper][Bibtex]
  21. Boxiang Dong, Hui (Wendy) Wang.
    ARM: Authenticated Approximate Record Matching for Outsourced Databases.
    The IEEE International Conference on Information Reuse and Integration (IRI). Pittsburgh, PA. 2016. (Acceptance Rate: 25.6%).
    [Paper][Bibtex]
  22. Boxiang Dong, Hui (Wendy) Wang, Jie Yang.
    Secure Data Outsourcing with Adversarial Data Dependency Constraints.
    The IEEE International Conference on Big Data Security on Cloud (BigDataSecurity). New York. 2016.
    [Paper][Bibtex]
  23. Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang.
    Prada: Privacy-preserving Data-Deduplication-as-a-Service.
    ACM International Conference on Information and Knowledge Management (CIKM). Shanghai, China. 2014. (Acceptance Rate: 25/123=20%).
    [Paper][Bibtex]
  24. Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang.
    Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
    IEEE International Conference on Data Mining (ICDM). Dallas, Texas. 2013. (Acceptance Rate: 159/809 = 19.7%).
    [Paper] [Bibtex]
  25. Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang.
    Result Integrity Verification of Outsourced Frequent Itemset Mining.
    27th Annual IFIP WG 11.3 Conference on Data and Application Security and Privacy (DBSec). Newark, NJ. 2013.
    [Paper][Bibtex]
  26. Weifeng Sun, Boxiang Dong, Zhenquan Qin, Juanyun Wang, Mingchu Li.
    A Low-Level Security Solving Method in Grid.
    Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). Darmstadt, Germany. 2010.
    [Paper] [Bibtex]

Patent

  • Zhengzhang Chen, Lu-An Tang, Boxiang Dong, Guofei Jiang, Haifeng Chen.
    Graph-based Instrusion Detection Using Process Traces. (Publication number: WO2017019391 A1).
Research Projects

Intrusion Detection by Using Deep Neural Networks

We propose a deep neural network infrastructure to detect network intrusion attacks.

To cope with the imbalanced distribution of various types of attacks, we propose a novel loss function that eliminates the bias towards the majority class.

  • Related publications:
    • Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2019). Kaohsiung, Taiwan. [Paper][Bibtex][Presentation]

  • Privacy-preserving Crowdsourcing

    We protect the privacy in the setting of crowdsourcing in two ways.

    First, we protect task privacy by designing a task assignment strategy that minimizes the risk of information disclosure in the existence colluding workers.

    Second, we protect worker privacy by designing an answer perturbation mechanism to provide local differential privacy.

  • Related publications:
    • Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. IEEE International Conference on Data Engineering (ICDE 2018). Paris, France. 2018. [Paper] [Bibtex]
    • Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE 2018 International Conference on Big Data. Seattle, WA. 2018. (Acceptance Rate: 99/518 = 19.1%) [Bibtex]

  • Integrity Verification of Outsourced Approximate Record Matching

    We design a new authentication and indexing data structure--Merkle Bed Tree (MB-Tree in short), which obtains Merkle tree's authentication functionality and preserves Bed tree's indexing property.

    The server constructs verification objects (VOs) by traversing the MB-Tree and visiting the Euclidean space to prove the result's soundness and completeness.

    The client's verification cost is very small because of MB-tree's pruning power and the cheap Euclidean distance computation cost.

  • Related publications:
    • Efficient Authentication of Approximate Record Matching for Outsourced Databases.
      Information System Frontiers, 2018. (Impact Factor = 3.232)
      [Paper] [Bibtex]
    • EARRING: Efficient Authentication of Outsourced Record Matching.. The IEEE International Conference on Information Reuse and Integration (IRI). San Diego, CA. 2017. (Acceptance Rate: 29%). Best Paper Award [Paper][Bibtex]
    • ARM: Authenticated Approximate Record Matching for Outsourced Databases. The IEEE International Conference on Information Reuse and Integration (IRI). Pittsburgh, PA. 2016. (Acceptance Rate: 25.6%). [Paper][Bibtex]

  • Frequency-hiding Dependency-preserving Encryption for Outsourced Databases

    We define two security models: &alpha-security against frequency-analysis attack, and indistinguishability against functional dependency preserving chosen plaintext attack (IND-FCPA).

    We design a frequency-hiding FD-preserving probabilistic encryption scheme that provides strong security guarantee, while preserves the utility in the encrypted dataset.

  • Related publications:
    • Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. IEEE International Conference on Data Engineering (ICDE). San Diego, CA. 2017. [Paper] [Bibtex]

  • Efficient Intrusion Detection in Large Enterprise Networks

    We model the system events in every host as a multipartitie graph of interactions between processes, sockets, and files.

    We apply random walk on the graph to learn the routine behavior of each system entity based on a transition probability model.

    We label an event sequence as abnormal if the behavior of any involved entity largely deviates from its routine role.

  • Related publications:
    • Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. The ACM International Conference on Information and Knowledge Management (CIKM). Pan Pacific, Singapore. 2017. [Paper] [Bibtex]
  • Patent application:
    • Graph-based Instrusion Detection Using Process Traces. (Publication number: WO2017019391 A1).

  • Privacy-preserving Data Deduplication-as-a-Service.

    In order to defend against the frequency-analysis attack in the outsourced data-deduplication services, we propose two approaches.

    • The LSHB approach based on Locality-Sensitive Hashing (LSH): The constructed LSH values preserve the string similarity, while they are of the same frequency groupwise.
    • The EHS approach encode strings as Euclidean points. The points of similar strings are close in the Euclidean space. At the same time, they have uniform frequency distribution.
    • LSHB approach EHS approach
    • Related publications:
      • Prada: Privacy-preserving Data-Deduplication-as-a-Service. ACM International Conference on Information and Knowledge Management. Shanghai, China. 2014. [Paper] [Bibtex]

    Integrity Verification of Outsourced Frequent Itemset Mining.

    We aim at verifying if the untrusted server returns the correct and complete frequent itemset mining result.

    To accomplish the goal, we require the server to return cryptographic proofs to show the support of the itemsets. The proof is based on the Secure Set Intersection Protocol.

    Related publications:

    • Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining. IEEE Transactions on Services Computing. 2015.[Paper][Bibtex]
    • Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. IEEE International Conference on Data Mining(ICDM). Dallas, Texas. 2013. [Paper] [Bibtex]
    • Result Integrity Verification of Outsourced Frequent Itemset Mining. 27th Annual IFIP WG 11.3 Conference, DBSec. Newark, NJ. 2013. [Paper] [Bibtex]
    Professional Services
    Conference and Journal Reviewer
    • Distributed and Parallel Databases
    • IEEE Transactions on Emerging Topics in Computational Intelligence
    • IEEE Transactions on Dependable and Secure Computing (TDSC), 2019
    • IEEE Transactions on Knowledge and Data Engineering (TKDE), 2019
    • IEEE Annual Conference of Industrial Electronics Society, 2019
    • Engineering Applications of Artificial Intelligence, 2019
    • Journal of Computer Science and Technology, 2019
    • IEEE International Conference on Big Data, 2018
    • Journal of King Saud University - Computer and Information Sciences, 2018
    • ACM Transactions on Privacy and Security, 2018
    • International Conference on Data Mining (ICDM), 2018
    • Frontiers in Big Data
    • Journal of ICT Research and Applications, 2018
    • Journal of Information Security and Applications, 2018
    • Computers & Security, 2018
    • IEEE Transactions on Service Computing (TSC), 2018
    • SIAM International Conference on Data Mining (SDM), 2018
    • Journal of Computer and Communications, 2018
    • Advances in Science, Technology and Engineering Systems Journal, 2018
    • MDPI, 2018
    • Journal of Computer and Communications, 2018
    • IEEE Transactions on Information Forensics & Security (T-IFS), 2017
    • IEEE Transactions on Knowledge and Data Engineering (TKDE), 2017
    • IEEE Access, 2017
    • IEEE International Conference on Big Data, 2017
    • Entropy Special Issue on Information Theory in Machine Learning and Data Science, 2017
    • Information Systems Journal, 2017
    • Future Internet, 2017
    • International Conference on Information System Security (ICISS), 2017
    • Journal of Computer and Communications, 2017
    • Mobile Information Systems, 2016
    • International Journal of Distributed Sensor Network, 2016
    • AAAI Conference on Artificial Intelligence, 2016
    • International Joint Conference on Artificial Intelligence, 2016
    • International Workshop on the Web and Databases, 2016
    • International Conference on Communications in China, 2015
    • International Conference on Data Science and Advanced Analytics, 2015
    • International Conference on Extending Database Technology, 2014
    Conference PC Member
    • International Conference on Tools with Artificial Intelligence(ICTAI), 2019.
    • Security and Privacy in Edge Computing Workshop (EdgeSP), 2019.
    • International Conference on Information Systems Security, 2019.
    • IEEE International Conference on Information Reuse and Integration for Data Science (IRI), 2018.
    • Security and Privacy in Edge Computing Workshop (EdgeSP), 2018.
    • International Workshop on Personal Analytics and Privacy (PAP), in conjunction with ECML PKDD, 2017, 2018.
    Teaching Experiences
    • CSIT212 Data Structures and Algorithms Fall 2017, 2018, Spring 2018

    • CSIT111 Fundamentals of Programming I Fall 2017

    • CSIT100 Introduction to Computer Science Spring 2017

    • CSIT345 Operating Systems Spring 2017

    • Introduction to Cybersecurity (part of Stevens Pre-College Programs) Summer 2016

    Working Experiences

    • Assistant Professor
    Montclair State University, Montclair, NJ

    Jan.2017 - Now

    • Research Intern at NEC Labs America, Princeton NJ
    Project: Anomaly Detection in Large Enterprise Network

    Sep.2014 - Dec.2014
    Mentor: Dr. Zach Chen

    • Research Intern at NEC Labs America, Princeton NJ
    Project: Rule-based Mining in Multivariate Time Series

    May.2015 - Aug.2014
    Mentor: Dr. Tan Yan

    Presentations
    • "Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis." VLDB, Los Angeles, CA. 2019.[Slides]
    • "Towards Computational Assessment of Idea Novelty". HICSS. Maui, Hawaii. 2019. [Slides]
    • "Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy". IEEE Big Data. Seattle, Washington. 2018. [Slides]
    • "EARRING: Efficient Authentication of Outsourced Record Matching". IRI. San Diego, California. 2017. [Slides]
    • "Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints". ICDCS. Atlanta, Georgia. 2017.
    • "Budget-constrained High-quality Data Purchase on Data Markets". WinDS (collated with SDM). Houston, Texas. 2017.
    • "Frequency-hiding Dependency-preserving Encryption for Outsourced Databases". ICDE'17. San Diego, California. 2017.[Slides]
    • "ARM: Authenticated Approximate Record Matching for Outsourced Databases". IEEE IRI, 2016. Pittsburgh, Pennsylvania. 2016.[Slides]
    • "Secure Data Outsourcing with Adversarial Data Dependency Constraints". IEEE BigDataSecurity 2016. Columbia University, New York. 2016.[Slides]
    • "Privacy-preserving Data Deduplication-as-a-Service". Stevens Graduate Research Conference. Hoboken, NJ. 2016.
    • "Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee". ICDM. Dallas, TX. 2013.[Slides]
    • "Result Integrity Verification of Outsourced Frequent Itemset Mining". DBSec 2013. Rutgers, NJ. 2013.
    • "A Novel Grid Resource Scheduling Model Based on Extended Second Price Sealed Auction". International Symposium on Parallel Architectures, Algorithms and Programming. Dalian, Liaoning, China. 2010.
    Awards
    • Best Paper Award at Workshop on Adversarial Learning Methods for Machine Learning and Data Mining, 2019 (Co-located with KDD'19).
    • Best Paper Award at IEEE 18th International Conference on Information Reuse and Integration, 2017.
    • Stevens Outstanding Graduate Student Award, 2017.
    • NEC Excellent Invention Award for the patent application "Graph-based Intrusion detection Using Process Traces ", 2017.