Dong Su

Orcid: 0000-0002-1410-2468

According to our database1, Dong Su authored at least 31 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Deformation of Sandy Ground Induced by Tunneling of Super-Large-Diameter Shield - Influence of Buried Depth of Tunnel and Relative Density of Sand.
Symmetry, 2023

2022
Study on Transverse Deformation Characteristics of a Shield Tunnel under Earth Pressure by Refined Finite Element Analyses.
Symmetry, 2022

2021
Research on tunnel engineering monitoring technology based on BPNN neural network and MARS machine learning regression algorithm.
Neural Comput. Appl., 2021

Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Design and flow characteristic of valveless piezoelectric pump with half-cone bluff body.
Proceedings of the ISBDAI 2020, 2020

2019
A Prediction Model for the Potential Plastic Zone Induced by Tunnel Excavation Adjacent to a Pile Foundation in a Gravity Field.
Symmetry, 2019

Development of an FBG Sensor for Measuring Large Range and Multi-Directional Settlement.
IEEE Access, 2019

Development of a FBG Based Hoop-Strain Sensor Using 3D Printing Method.
IEEE Access, 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
PrivPfC: differentially private data publication for classification.
VLDB J., 2018

Green rings of weak Hopf algebras based on generalized Taft algebras.
Period. Math. Hung., 2018

Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Defending Against Model Stealing Attacks Using Deceptive Perturbations.
CoRR, 2018

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach.
Proceedings of the 6th International Conference on Learning Representations, 2018

Is Robustness the Cost of Accuracy? - A Comprehensive Study on the Robustness of 18 Deep Image Classification Models.
Proceedings of the Computer Vision - ECCV 2018, 2018

2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Understanding the Sparse Vector Technique for Differential Privacy.
Proc. VLDB Endow., 2017

2016
Differential Privacy: From Theory to Practice
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02350-7, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
CoRR, 2015

2013
Membership privacy: a unifying framework for privacy definitions.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
PrivBasis: Frequent Itemset Mining with Differential Privacy.
Proc. VLDB Endow., 2012

On sampling, anonymization, and differential privacy or, <i>k</i>-anonymization meets differential privacy.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
CoRR, 2011

Paillier's trapdoor function hides Θ(<i>n</i>) bits.
Sci. China Inf. Sci., 2011

2009
Analysis of Fast Handover Mechanisms for Hierarchical Mobile IPv6 Network Mobility.
Wirel. Pers. Commun., 2009

A New Hard-Core Predicate of Paillier's Trapdoor Function.
Proceedings of the Progress in Cryptology, 2009

Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2006
Fast Handover Failure-Case Analysis in Hierarchical Mobile IPv6 Networks.
IEICE Trans. Commun., 2006


  Loading...