Jun Ma

Orcid: 0000-0002-0187-2236

Affiliations:
  • Xidian University, School of Telecommunications Engineering, Xi'an, China
  • PLA Information Engineering University, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China


According to our database1, Jun Ma authored at least 12 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification.
Wirel. Commun. Mob. Comput., 2021

CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.
Secur. Commun. Networks, 2021

2020
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.
Wirel. Commun. Mob. Comput., 2020

A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.
J. Organ. End User Comput., 2020

2017
An Insider Threat Detection Method Based on Business Process Mining.
Int. J. Bus. Data Commun. Netw., 2017

2016
大数据环境下威胁的协作式检测综述 (Review of Collaborative Detection of Threat in Big Data).
计算机科学, 2016

Business Process Mining based Insider Threat Detection System.
Proceedings of the Advances on P2P, 2016

2014
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A TNC Protocol for 3GPP-WLAN Integrated Environment.
Proceedings of the Information Computing and Applications - Third International Conference, 2012


  Loading...