Di Ma
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Uncertain mean-risk index portfolio selection considering inflation: Chaos adaptive genetic algorithm.
Int. J. Mach. Learn. Cybern., April, 2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024
Uncertain multi-period project adjustment and selection under the carbon tax and carbon quota policies.
J. Intell. Fuzzy Syst., January, 2024
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation.
IEEE Trans. Inf. Forensics Secur., 2024
Signal Process. Image Commun., 2024
Appl. Soft Comput., 2024
IEEE Access, 2024
Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 2024 16th International Conference on Bioinformatics and Biomedical Technology, 2024
2023
A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure.
Multim. Tools Appl., May, 2023
EAI Endorsed Trans. e Learn., 2023
EAI Endorsed Trans. e Learn., 2023
Virtual Machine Migration Techniques for Optimizing Energy Consumption in Cloud Data Centers.
IEEE Access, 2023
Vertical Channel Transistor (VCT) as Access Transistor for Future 4F<sup>2</sup> DRAM Architecture.
Proceedings of the IEEE International Memory Workshop, 2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
2022
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022
A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion Detection.
IEEE Access, 2022
A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks.
IEEE Access, 2022
The Hanging ROA: A Secure and Scalable Encoding Scheme for Route Origin Authorization.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain.
IEEE Trans. Reliab., 2021
BVI-SynTex: A Synthetic Video Texture Dataset for Video Compression and Quality Assessment.
IEEE Trans. Multim., 2021
IEEE J. Sel. Top. Signal Process., 2021
J. Intell. Fuzzy Syst., 2021
Semi-blind compressed sensing via adaptive dictionary learning and one-pass online extension.
Sci. China Inf. Sci., 2021
Proceedings of the Picture Coding Symposium, 2021
The Horizontal INR Conflict-Detection Algorithm: Revealing INR Reallocation and Reauthorization in RPKI.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Influence of Negative Stimulation on Gap Junction-mediated Communication under Electrical Coupling.
Proceedings of the ICITEE 2021: The 4th International Conference on Information Technologies and Electrical Engineering, Changde, Hunan, China, October 29, 2021
2020
RFC, September, 2020
SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems.
Veh. Commun., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
Practical source-independent quantum random number generation with detector efficiency mismatch.
Quantum Inf. Process., 2020
Distribution agnostic Bayesian matching pursuit based on the exponential embedded family.
Neurocomputing, 2020
Neural Computing Enhanced Parameter Estimation for Multi-Input and Multi-Output Total Non-Linear Dynamic Models.
Entropy, 2020
CoRR, 2020
Integrated Analysis of a Noncoding RNA-Associated Competing Endogenous RNA Network in Non-Alcoholic Fatty Liver Disease.
IEEE Access, 2020
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020
Proceedings of the ICCCV'20: The 3rd International Conference on Control and Computer Vision, 2020
2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019
Mach. Learn., 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019
Proceedings of the International Arab Conference on Information Technology, 2019
2018
RFC, August, 2018
IEEE Trans. Mob. Comput., 2018
Heterogeneous multi-output classification by structured conditional risk minimization.
Pattern Recognit. Lett., 2018
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 2018 Picture Coding Symposium, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018
2017
Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI).
RFC, September, 2017
An Approach for Building Security Resilience in AUTOSAR Based Safety Critical Systems.
J. Cyber Secur. Mobil., 2017
A low complexity algorithm for across range unit effect correction of the moving target via range frequency polynomial-phase transform.
Digit. Signal Process., 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015
Social Community-Oriented Social Attribute Analysis: An Empirical Study on QQ Group Data.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the Imaging and Multimedia Analytics in a Web and Mobile World 2015, 2015
2014
IEEE Wirel. Commun., 2014
IEEE Trans. Geosci. Remote. Sens., 2014
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014
J. Netw. Comput. Appl., 2014
IEEE Internet Things J., 2014
A parameter selection strategy for particle swarm optimization based on particle positions.
Expert Syst. Appl., 2014
Sci. China Inf. Sci., 2014
Proceedings of the Document Recognition and Retrieval XXI, 2014
2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Emerg. Top. Comput., 2013
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the Document Recognition and Retrieval XX, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Telecommun. Syst., 2012
Int. J. Cooperative Inf. Syst., 2012
Comput. Networks, 2012
Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Document Recognition and Retrieval XIX, 2012
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
2010
Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization.
IEEE Trans. Veh. Technol., 2010
The hop count shift problem and its impacts on protocol design in wireless ad hoc networks.
Telecommun. Syst., 2010
A novel approach toward source-to-sink distance estimation in wireless sensor networks.
IEEE Commun. Lett., 2010
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the 11th International Conference on Control, 2010
Proceedings of the International Conference on Body Sensor Networks, 2010
2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
IEEE Netw., 2009
A survey of movement strategies for improving network coverage in wireless sensor networks.
Comput. Commun., 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Information Security Practice and Experience, 2007
2006
Proceedings of the 7th International Symposium on Quality of Electronic Design (ISQED 2006), 2006
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004
2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002
2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1985
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1985