Hua Ma

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Multi-source adaptive meta-learning framework for domain generalization person re-identification.
Soft Comput., March, 2024

Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Quantization Backdoors to Deep Learning Commercial Frameworks.
IEEE Trans. Dependable Secur. Comput., 2024

One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning.
Knowl. Based Syst., 2024

Towards robustness evaluation of backdoor defense on quantized deep learning models.
Expert Syst. Appl., 2024

qMRI Diffusor: Quantitative T1 Mapping of the Brain using a Denoising Diffusion Probabilistic Model.
CoRR, 2024

Enhancing LoRA Model Serving Capacity via Adaptive Operator Scheduling for Multi-Tenancy on GPU.
IEEE Access, 2024

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

qMRI Diffuser: Quantitative T1 Mapping of the Brain Using a Denoising Diffusion Probabilistic Model.
Proceedings of the Deep Generative Models - 4th MICCAI Workshop, 2024

Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Exploration of the effect of CDC20 in the diagnosis and prognosis of gastric cancer patients from a statistical and bioinformatics-based approach.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024

2023
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023

Visualising emotion in support of patient-physician communication: an empirical study.
Behav. Inf. Technol., August, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

Horizontal Class Backdoor to Deep Learning.
CoRR, 2023

CIT-EmotionNet: CNN Interactive Transformer Network for EEG Emotion Recognition.
CoRR, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

Atrial Fibrillation Detection Algorithm Based on Graph Convolution Network.
IEEE Access, 2023

Bi-Branch Vision Transformer Network for EEG Emotion Recognition.
IEEE Access, 2023

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Phantom Undulations: Remote Physiological Sensing in Abstract Installation Works.
Proceedings of the Augmented Humans International Conference 2023, 2023

2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

SenSequins: Smart Textile Using 3D Printed Conductive Sequins.
Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, 2022

Smart Textile Using 3D Printed Conductive Sequins.
Proceedings of the TEI '22: Sixteenth International Conference on Tangible, Embedded, and Embodied Interaction, Daejeon, Republic of Korea, February 13, 2022

4D Embroidery: Implementing Parametric Structures in Textiles for Sculptural Embroidery.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

2021
Integration of InSAR and LiDAR Technologies for a Detailed Urban Subsidence and Hazard Assessment in Shenzhen, China.
Remote. Sens., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Quantization Backdoors to Deep Learning Models.
CoRR, 2021

2020
Randomized deduplication with ownership management and data sharing in cloud storage.
J. Inf. Secur. Appl., 2020

Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing.
Int. J. Netw. Secur., 2020

Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage.
Int. J. Netw. Secur., 2020

2019
Secure deduplication of encrypted data in online and offline environments.
Int. J. High Perform. Comput. Netw., 2019

Large universe multi-authority attribute-based PHR sharing with user revocation.
Int. J. Comput. Sci. Eng., 2019

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019

2018
PUF-FSM: A Controlled Strong PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing.
Int. J. Netw. Secur., 2018

An adaptive system for detecting malicious queries in web attacks.
Sci. China Inf. Sci., 2018

Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018

Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe.
Int. J. Netw. Secur., 2017

Expressive ciphertext-policy attribute-based encryption with direct user revocation.
Int. J. Embed. Syst., 2017

Exploiting PUF Models for Error Free Response Generation.
CoRR, 2017

Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability.
CoRR, 2017

A PUF sensor: Securing physical measurements.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017

Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Large Universe Revocable Fine-Grained Encryption with Public Auditing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons.
Intell. Autom. Soft Comput., 2015

Extend the Concept of Public Key Encryption with Delegated Search.
Comput. J., 2015

2014
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

Outsourcing Decryption of Multi-Authority ABE Ciphertexts.
Int. J. Netw. Secur., 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013

Dynamic generating algorithm on path selection and optimisation in travel planning.
Int. J. Comput. Appl. Technol., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure and Verifiable Outsourcing of Sequence Comparisons.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Refine the Concept of Public Key Encryption with Delegated Search.
IACR Cryptol. ePrint Arch., 2012

2011
Provably secure multi-proxy signature scheme with revocation in the standard model.
Comput. Commun., 2011

2010
Certificateless signcryption scheme in the standard model.
Inf. Sci., 2010

Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Analysis of Enterprise Workflow Solutions.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

Distributed Event-Triggered Trust Management for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Secure Proxy Multi-signature Scheme in the Standard Model.
Proceedings of the Provable Security, Second International Conference, 2008

2007
A Traitor Tracing Scheme Based on the RSA System.
Int. J. Netw. Secur., 2007

2005
Exploring XML for data exchange in the context of an undergraduate database curriculum.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005

GridPML: A Process Modeling Language and History Capture System for Grid Service Composition.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

2001
Simulation of GaAs MESFET devices using TCAD tools.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001


  Loading...