Duohe Ma
Orcid: 0000-0002-2160-8344
According to our database1,
Duohe Ma
authored at least 23 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the Advances in Digital Forensics XX, 2024
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
计算机科学, 2019
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018
Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun., 2018
2017
IEEE Access, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006