XinDi Ma

Orcid: 0000-0002-0764-3741

According to our database1, XinDi Ma authored at least 53 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024

Deep Hashing Based Cancelable Multi-Biometric Template Protection.
IEEE Trans. Dependable Secur. Comput., 2024

FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay.
J. Syst. Archit., 2024

Defending against membership inference attacks: RM Learning is all you need.
Inf. Sci., 2024

BeniFul: Backdoor Defense via Middle Feature Analysis for Deep Neural Networks.
CoRR, 2024

ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT.
Proceedings of the Artificial Intelligence in Healthcare - First International Conference, 2024

2023
Electrocardiogram Based Group Device Pairing for Wearables.
IEEE Trans. Mob. Comput., November, 2023

Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing.
Remote. Sens., October, 2023

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-preserving generative framework for images against membership inference attacks.
IET Commun., January, 2023

Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting.
IEEE Trans. Cloud Comput., 2023

On the Security of a Cloud Auditing Storage Protocol.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

2022
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022

Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022

A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections.
Peer-to-Peer Netw. Appl., 2022

NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack.
IEEE Internet Things J., 2022

Privacy-preserving Generative Framework Against Membership Inference Attacks.
CoRR, 2022

Self-Anomaly-Detection Model Training via Initialized Meta Model.
Proceedings of the International Conference on Networking and Network Applications, 2022

HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Proceedings of the Information Security - 25th International Conference, 2022

2021
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys.
IEEE Trans. Serv. Comput., 2021

Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021

An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones.
Peer-to-Peer Netw. Appl., 2021

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021

Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

Siamese pyramid residual module with local binary convolution network for single object tracking.
Int. J. Wavelets Multiresolution Inf. Process., 2021

Three-factor authentication protocol using physical unclonable function for IoV.
Comput. Commun., 2021

Indian Buffet Process-Based on Nonnegative Matrix Factorization with Single Binary Component.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Channel Hourglass Residual Network For Single Image Super-Resolution.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Frictional Wear and Corrosion Behavior of AlCoCrFeNi High-Entropy Alloy Coatings Synthesized by Atmospheric Plasma Spraying.
Entropy, 2020

A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT.
Proceedings of the International Conference on Networking and Network Applications, 2020

Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019

Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Lightweight Secure Communication Mechanism Towards UAV Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018

2017
APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
Sci. China Inf. Sci., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2015
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.
Sci. China Inf. Sci., 2015


  Loading...