Cunqing Ma

According to our database1, Cunqing Ma authored at least 30 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation.
Cybersecur., December, 2024

2023
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Gait2Vec: Continuous Authentication of Smartphone Users Based on Gait Behavior.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC.
Proceedings of the 38th IEEE VLSI Test Symposium, 2020

A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Android Control Flow Obfuscation Based on Dynamic Entry Points Modification.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
A PUF and Software Collaborative Key Protection Scheme.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
Proceedings of the Security and Privacy in Communication Networks, 2016

HPAZ: A high-throughput pipeline architecture of ZUC in hardware.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2015
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
IACR Cryptol. ePrint Arch., 2015

Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Bit Error Probability Evaluation of RO PUFs.
Proceedings of the Information Security - 18th International Conference, 2015

2012
Offline RFID Grouping Proofs with Trusted Timestamps.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Efficient Missing Tag Detection in a Large RFID System.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...