Hua Ma
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Multi-source adaptive meta-learning framework for domain generalization person re-identification.
Soft Comput., March, 2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning.
Knowl. Based Syst., 2024
Expert Syst. Appl., 2024
qMRI Diffusor: Quantitative T1 Mapping of the Brain using a Denoising Diffusion Probabilistic Model.
CoRR, 2024
Enhancing LoRA Model Serving Capacity via Adaptive Operator Scheduling for Multi-Tenancy on GPU.
IEEE Access, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
qMRI Diffuser: Quantitative T1 Mapping of the Brain Using a Denoising Diffusion Probabilistic Model.
Proceedings of the Deep Generative Models - 4th MICCAI Workshop, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Exploration of the effect of CDC20 in the diagnosis and prognosis of gastric cancer patients from a statistical and bioinformatics-based approach.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024
2023
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023
Visualising emotion in support of patient-physician communication: an empirical study.
Behav. Inf. Technol., August, 2023
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023
CoRR, 2023
IEEE Access, 2023
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the Augmented Humans International Conference 2023, 2023
2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, 2022
Proceedings of the TEI '22: Sixteenth International Conference on Tangible, Embedded, and Embodied Interaction, Daejeon, Republic of Korea, February 13, 2022
4D Embroidery: Implementing Parametric Structures in Textiles for Sculptural Embroidery.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022
2021
Integration of InSAR and LiDAR Technologies for a Detailed Urban Subsidence and Hazard Assessment in Shenzhen, China.
Remote. Sens., 2021
2020
Randomized deduplication with ownership management and data sharing in cloud storage.
J. Inf. Secur. Appl., 2020
Int. J. Netw. Secur., 2020
Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage.
Int. J. Netw. Secur., 2020
2019
Int. J. High Perform. Comput. Netw., 2019
Int. J. Comput. Sci. Eng., 2019
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019
2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing.
Int. J. Netw. Secur., 2018
Sci. China Inf. Sci., 2018
Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
IEEE Trans. Circuits Syst. I Regul. Pap., 2017
Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe.
Int. J. Netw. Secur., 2017
Int. J. Embed. Syst., 2017
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017
Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
2016
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Intell. Autom. Soft Comput., 2015
2014
J. Internet Serv. Inf. Secur., 2014
Int. J. Netw. Secur., 2014
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013
Int. J. Comput. Appl. Technol., 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Comput. Commun., 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
2007
2005
Exploring XML for data exchange in the context of an undergraduate database curriculum.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005
GridPML: A Process Modeling Language and History Capture System for Grid Service Composition.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005
2001
Simulation of GaAs MESFET devices using TCAD tools.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001