default search action
Dong Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Hui Liu, Lin Lin, Dong Su, Qiangheng Zhang:
Global well-posedness of the 3D damped micropolar Bénard system with horizontal dissipation. Appl. Math. Lett. 157: 109199 (2024) - 2023
- [j14]Jiquan Li, Xiaolu Li, Yuqin Wen, Dong Su:
Deformation of Sandy Ground Induced by Tunneling of Super-Large-Diameter Shield - Influence of Buried Depth of Tunnel and Relative Density of Sand. Symmetry 15(1): 71 (2023) - 2022
- [j13]Wen Long, Weijie Chen, Changfu Huang, Dongyang Li, Dong Su:
Study on Transverse Deformation Characteristics of a Shield Tunnel under Earth Pressure by Refined Finite Element Analyses. Symmetry 14(10): 2030 (2022) - 2021
- [j12]Jianbo Fei, Zezhou Wu, Xiaohui Sun, Dong Su, Xiaohua Bao:
Research on tunnel engineering monitoring technology based on BPNN neural network and MARS machine learning regression algorithm. Neural Comput. Appl. 33(1): 239-255 (2021) - [c12]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - 2020
- [c11]Tianxiang Yan, Ping Wen, Dong Su:
Design and flow characteristic of valveless piezoelectric pump with half-cone bluff body. ISBDAI 2020: 508-511 - [i11]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CoRR abs/2005.11753 (2020)
2010 – 2019
- 2019
- [j11]Chengyu Hong, Yifan Zhang, Dong Su, Zhenyu Yin:
Development of a FBG Based Hoop-Strain Sensor Using 3D Printing Method. IEEE Access 7: 107154-107160 (2019) - [j10]Zhao Lu, Chengyu Hong, Yifan Zhang, Dong Su, Yanbin Fu:
Development of an FBG Sensor for Measuring Large Range and Multi-Directional Settlement. IEEE Access 7: 107669-107677 (2019) - [j9]Yanbin Fu, Kaihang Han, Dong Su, Xiaochao Pang, Xiaohua Bao, Beibei Hou, Hao Wu, Junsheng Wen:
A Prediction Model for the Potential Plastic Zone Induced by Tunnel Excavation Adjacent to a Pile Foundation in a Gravity Field. Symmetry 11(10): 1306 (2019) - [c10]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. DSN 2019: 336-348 - [c9]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. IEEE Symposium on Security and Privacy Workshops 2019: 43-49 - [c8]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - 2018
- [j8]Dong Su, Shilin Yang:
Green rings of weak Hopf algebras based on generalized Taft algebras. Period. Math. Hung. 76(2): 229-242 (2018) - [j7]Dong Su, Jianneng Cao, Ninghui Li, Min Lyu:
PrivPfC: differentially private data publication for classification. VLDB J. 27(2): 201-223 (2018) - [c7]Dong Su, Huan Zhang, Hongge Chen, Jinfeng Yi, Pin-Yu Chen, Yupeng Gao:
Is Robustness the Cost of Accuracy? - A Comprehensive Study on the Robustness of 18 Deep Image Classification Models. ECCV (12) 2018: 644-661 - [c6]Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel:
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach. ICLR (Poster) 2018 - [i10]Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel:
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach. CoRR abs/1801.10578 (2018) - [i9]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Model Stealing Attacks Using Deceptive Perturbations. CoRR abs/1806.00054 (2018) - [i8]Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, Ian M. Molloy:
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs/1807.00969 (2018) - [i7]Dong Su, Huan Zhang, Hongge Chen, Jinfeng Yi, Pin-Yu Chen, Yupeng Gao:
Is Robustness the Cost of Accuracy? - A Comprehensive Study on the Robustness of 18 Deep Image Classification Models. CoRR abs/1808.01688 (2018) - [i6]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. CoRR abs/1812.03230 (2018) - 2017
- [j6]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. Proc. VLDB Endow. 10(6): 637-648 (2017) - [j5]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - 2016
- [b2]Dong Su:
Differentially private data publishing for data analysis. Purdue University, USA, 2016 - [b1]Ninghui Li, Min Lyu, Dong Su, Weining Yang:
Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01222-8, pp. 1-138 - [c5]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - [i5]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. CoRR abs/1603.01699 (2016) - 2015
- [i4]Dong Su, Jianneng Cao, Ninghui Li:
Differentially Private Projected Histograms of Multi-Attribute Data for Classification. CoRR abs/1504.05997 (2015) - [i3]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private $k$-Means Clustering. CoRR abs/1504.05998 (2015) - 2013
- [c4]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang:
Membership privacy: a unifying framework for privacy definitions. CCS 2013: 889-900 - 2012
- [j4]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:
PrivBasis: Frequent Itemset Mining with Differential Privacy. Proc. VLDB Endow. 5(11): 1340-1351 (2012) - [c3]Ninghui Li, Wahbeh H. Qardaji, Dong Su:
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. AsiaCCS 2012: 32-33 - [i2]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:
PrivBasis: Frequent Itemset Mining with Differential Privacy. CoRR abs/1208.0093 (2012) - 2011
- [j3]Dong Su, Kewei Lv:
Paillier's trapdoor function hides Θ(n) bits. Sci. China Inf. Sci. 54(9): 1827-1836 (2011) - [i1]Ninghui Li, Wahbeh H. Qardaji, Dong Su:
Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy. CoRR abs/1101.2604 (2011)
2000 – 2009
- 2009
- [j2]Sang-Jo Yoo, Seung-Joon Choi, Dong Su:
Analysis of Fast Handover Mechanisms for Hierarchical Mobile IPv6 Network Mobility. Wirel. Pers. Commun. 48(2): 215-238 (2009) - [c2]Dong Su, Kewei Lv:
Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem. CSO (2) 2009: 306-308 - [c1]Dong Su, Kewei Lv:
A New Hard-Core Predicate of Paillier's Trapdoor Function. INDOCRYPT 2009: 263-271 - 2006
- [j1]Dong Su, Sang-Jo Yoo:
Fast Handover Failure-Case Analysis in Hierarchical Mobile IPv6 Networks. IEICE Trans. Commun. 89-B(6): 1892-1895 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint