scispace - formally typeset
X

Xiaodong Lin

Researcher at University of Guelph

Publications -  337
Citations -  18654

Xiaodong Lin is an academic researcher from University of Guelph. The author has contributed to research in topics: Information privacy & Authentication. The author has an hindex of 61, co-authored 315 publications receiving 15199 citations. Previous affiliations of Xiaodong Lin include University of Ontario Institute of Technology & University of Waterloo.

Papers
More filters
Proceedings ArticleDOI

Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud

TL;DR: This paper focuses on the Support Vector Machine (SVM), one of the most popular classifiers, and proposes an efficient and privacy-preserving outsourcing scheme, which can protect the confidentiality of classifier and users' data and achieves efficient SVM classification in terms of computational cost.
Reference BookDOI

Networking for Big Data

TL;DR: An innovative user data profile-aware policy-based network management framework that can help you exploit and differentiate user data profiles to achieve better power efficiency and optimized resource management is proposed.
Proceedings ArticleDOI

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic

TL;DR: Zhang et al. as discussed by the authors developed a system for detecting fraudulent devices through ad bid request logs with a focus on clustering fraudulent devices, which demonstrated 97% precision and 95% recall on a real-world labeled dataset.
Journal ArticleDOI

A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)

TL;DR: This paper applies Certificate Graph (CG) and identity-based security in designing an admission control scheme for MANETs and proves the security by Canetti-Krawczyk (CK) model-based analysis.
Proceedings ArticleDOI

PDP: A Privacy-Preserving Data Provenance Scheme

TL;DR: This paper proposes a new privacy-preserving data provenance (PDP) scheme, which can anonymously access the remoter servers and execute the secure provenance operations, and demonstrates the security and efficiency of this scheme.