Liran Ma

Orcid: 0000-0002-1003-1770

According to our database1, Liran Ma authored at least 76 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems.
IEEE Internet Things J., February, 2024

Distributed Physical Layer Authentication: Overview and Opportunities.
IEEE Commun. Mag., January, 2024

2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023

EScope: Effective Event Validation for IoT Systems Based on State Correlation.
Big Data Min. Anal., June, 2023

Cooperative Physical Layer Authentication With Reputation-Inspired Collaborator Selection.
IEEE Internet Things J., 2023

Enhanced Collaborative Physical Layer Authentication Through An Impression-Weighted Decision Aggregation Scheme.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Video Aficionado: We Know What You Are Watching.
IEEE Trans. Mob. Comput., 2022

Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain.
IEEE Internet Things J., 2022

Quantitative models for friendly jammer trustworthiness evaluation in IoT networks.
Ad Hoc Networks, 2022

IEEE Access Special Section: Privacy Preservation for Large-Scale User Data in Social Networks.
IEEE Access, 2022

2021
Cross-layer based intermittent jamming schemes for securing energy-constraint networks.
CoRR, 2021

Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities.
Proceedings of the 2021 IEEE SmartWorld, 2021

2020
Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services.
IEEE Trans. Parallel Distributed Syst., 2020

Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies.
IEEE Trans. Inf. Forensics Secur., 2020

Paradox of AlphaZero: Strategic vs. Optimal Plays.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

2019
Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming.
IEEE Trans. Wirel. Commun., 2019

A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2019

An Intermittent Cooperative Jamming Strategy for Securing Energy-Constrained Networks.
IEEE Trans. Commun., 2019

Security and Privacy for Smart Cyber-Physical Systems.
Secur. Commun. Networks, 2019

A Context-Aware Multiarmed Bandit Incentive Mechanism for Mobile Crowd Sensing Systems.
IEEE Internet Things J., 2019

An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
A Secure and Scalable Data Communication Scheme in Smart Grids.
Wirel. Commun. Mob. Comput., 2018

Jamming Strategies for Physical Layer Security.
IEEE Wirel. Commun., 2018

Big data analysis for evaluating bioinvasion risk.
BMC Bioinform., 2018

A Context-Aware Budget-Constrained Targeted Advertising System for Vehicular Networks.
IEEE Access, 2018

Spark: A Smart Parking Lot Monitoring System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
A coalition formation game based relay selection scheme for cooperative cognitive radio networks.
Wirel. Networks, 2017

Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks.
IET Commun., 2017

An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Quantum Game Analysis of Privacy-Leakage for Application Ecosystems.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Optimal Spectrum Sensing-Access Policy in Energy Harvesting Cognitive Radio Sensor Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
An Efficient Scheme for Tag Information Update in RFID Systems on Roads.
IEEE Trans. Veh. Technol., 2016

On Connected Target <i>k</i>-Coverage in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.
Sensors, 2016

An enhanced low overhead and stable clustering scheme for crossroads in VANETs.
EURASIP J. Wirel. Commun. Netw., 2016

An Adaptive Beaconing Scheme Based on Traffic Environment Parameters Prediction in VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

iBeaconing: A Low-Cost, Wireless Student Protection System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

An IoT-based Real Time Low Cost Low Power Monitoring and Notification System for Aged Care.
Proceedings of the International Conference on Identification, 2016

Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Fuzzy Adaptive Data Fusion Strategy for Intelligent Vehicle Systems.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks.
IEEE Trans. Computers, 2015

TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks.
Ad Hoc Sens. Wirel. Networks, 2015

A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Towards Security-Aware Virtual Server Migration Optimization to the Cloud.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Poster: A robust vehicular accident detection system using inexpensive portable devices.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Enhanced Web Warehouse Model: A Secure Approach.
Proceedings of the International Conference on Identification, 2014

2013
Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Maximizing throughput when achieving time fairness in multi-rate wireless LANs.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A Novel Channel Assignment Scheme for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A Novel Free-Rider Detection Scheme for IEEE 802.11 Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2009
A novel rate adaptation scheme for 802.11 networks.
IEEE Trans. Wirel. Commun., 2009

3D Underwater Sensor Network Localization.
IEEE Trans. Mob. Comput., 2009

2008
A power controlled interference aware routing protocol for dense multi-hop wireless networks.
Wirel. Networks, 2008

SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks.
IEEE Trans. Mob. Comput., 2008

An one-way function based framework for pairwise key establishment in sensor networks.
Int. J. Secur. Networks, 2008

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Underwater Localization in Sparse 3D Acoustic Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

RAP: protecting commodity wi-fi networks from rogue access points.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Passive Listening and Intrusion Management in Commodity Wi-Fi Networks.
Proceedings of the Global Communications Conference, 2007

2006
The Effective Radius Model for Multi-hop Wireless Networks.
Proceedings of the Wireless Algorithms, 2006

2005
Signaling cost and performance of SIGMA: A seamless handover scheme for data networks.
Wirel. Commun. Mob. Comput., 2005

DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

SeGrid: A Secure Grid Infrastructure for Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Interference aware metric for dense multi-hop wireless networks.
Proceedings of IEEE International Conference on Communications, 2005

Architecture and performance of SIGMA: a seamless mobility architecture for data networks.
Proceedings of IEEE International Conference on Communications, 2005


  Loading...