Chunguang Ma
Orcid: 0000-0003-4988-7856
According to our database1,
Chunguang Ma
authored at least 64 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
UAV Classification Based on Deep Learning Fusion of Multidimensional UAV Micro-Doppler Image Features.
IEEE Geosci. Remote. Sens. Lett., 2024
Investigating Dual-Frequency HPM Interference Effect on Communication System: Insights From LNA to SDR.
IEEE Access, 2024
2021
Sci. China Inf. Sci., 2021
2020
Accelerated Depreciation Tax Credit and Corporate Financialization Based on the PSM-DID Model.
Wirel. Commun. Mob. Comput., 2020
Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain.
IEEE Trans. Veh. Technol., 2020
Mob. Inf. Syst., 2020
Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting.
Int. J. Found. Comput. Sci., 2020
IEEE Access, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Geosci. Remote. Sens., 2019
IEEE Geosci. Remote. Sens. Lett., 2019
Int. J. Netw. Secur., 2019
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
A Key Pre-Distribution Scheme Based on <i>µ</i>-PBIBD for Enhancing Resilience in Wireless Sensor Networks.
Sensors, 2018
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons.
Quantum Inf. Process., 2018
Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline.
Proceedings of the e-Learning, e-Education, and Online Training, 2018
2017
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme.
Wirel. Pers. Commun., 2017
Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services.
J. Circuits Syst. Comput., 2017
Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017
Int. J. Parallel Program., 2017
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment.
Int. J. Found. Comput. Sci., 2017
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Provable Security, 2016
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Intelligent Computation in Big Data Era, 2015
Proceedings of the Intelligent Computation in Big Data Era, 2015
2014
Int. J. Commun. Syst., 2014
Proceedings of the Network and Parallel Computing, 2014
2013
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
J. Networks, 2013
Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
Inf. Fusion, 2013
2012
Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks.
J. Comput., 2012
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
IACR Cryptol. ePrint Arch., 2012
On the (in)security of some smart-card-based password authentication schemes for WSN.
IACR Cryptol. ePrint Arch., 2012
Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2012
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Web Technologies and Applications, 2012
2010
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
J. Networks, 2010
2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2008
Frontiers Comput. Sci. China, 2008
2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007
2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006