default search action
Jianfeng Ma 0001
Person information
- affiliation: Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation: Xidian University, School of Computer Science, Xi'an, China
Other persons with the same name
- Jianfeng Ma (aka: Jian-Feng Ma) — disambiguation page
- Jianfeng Ma 0002 — North China Electric Power University, Department of Mathematics and Physics, Baoding, China
- Jianfeng Ma 0003 — University of Science and Technology Beijing, Dongling School of Economics and Management, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j496]Zehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jinchuan Tang, Jian-Feng Ma:
Membership inference attacks via spatial projection-based relative information loss in MLaaS. Inf. Process. Manag. 62(1): 103947 (2025) - 2024
- [j495]Zhuo Ma, Yilong Yang, Yang Liu, Xinjing Liu, Jianfeng Ma:
Mitigate noisy data for smart IoT via GAN based machine unlearning. Sci. China Inf. Sci. 67(3) (2024) - [j494]Teng Li, Weiguo Lin, Ruichen Ma, Zhuo Ma, Yulong Shen, Jianfeng Ma:
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67(5) (2024) - [j493]Yinbin Miao, Da Kuang, Lihuiwang, Tao Leng, Ximeng Liu, Jian Feng Ma:
Efficient privacy-preserving federated learning under dishonest-majority setting. Sci. China Inf. Sci. 67(5) (2024) - [j492]Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, Jianfeng Ma:
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems. Sci. China Inf. Sci. 67(6) (2024) - [j491]Qixian Ren, Yu Zheng, Chao Yang, Yue Li, Jian-Feng Ma:
Shadow backdoor attack: Multi-intensity backdoor attack against federated learning. Comput. Secur. 139: 103740 (2024) - [j490]Pengbin Feng, Le Gai, Li Yang, Qin Wang, Teng Li, Ning Xi, Jian Feng Ma:
DawnGNN: Documentation augmented windows malware detection using graph neural network. Comput. Secur. 140: 103788 (2024) - [j489]Feng Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Jianting Ning, Robert H. Deng:
A Survey on Searchable Symmetric Encryption. ACM Comput. Surv. 56(5): 119:1-119:42 (2024) - [j488]Ruikang Yang, Jianfeng Ma, Junying Zhang, Saru Kumari, Sachin Kumar, Joel J. P. C. Rodrigues:
Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things. IEEE Internet Things J. 11(1): 5-16 (2024) - [j487]Yingying Li, Jianfeng Ma, Yinbin Miao, Xiangyu Wang, Rongxing Lu, Wei Zhang:
Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things. IEEE Internet Things J. 11(3): 5024-5035 (2024) - [j486]Zhijun Li, Jianfeng Ma, Yinbin Miao, Xiangyu Wang, Jiayi Li, Chao Xu:
Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities. IEEE Internet Things J. 11(3): 5288-5300 (2024) - [j485]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma:
IoT Route Planning Based on Spatiotemporal Interactive Attention Neural Network. IEEE Internet Things J. 11(5): 7697-7709 (2024) - [j484]Zhenyong Zhang, Bingdong Wang, Mengxiang Liu, Yan Qin, Jingpei Wang, Youliang Tian, Jianfeng Ma:
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid. IEEE Internet Things J. 11(7): 11619-11631 (2024) - [j483]Sen Wang, Zhongyuan Jiang, Xinghua Li, Jianfeng Ma:
MLDR: An O(|V|/4) and Near-Optimal Routing Scheme for LEO Mega-Constellations. IEEE Internet Things J. 11(10): 18663-18675 (2024) - [j482]Mengqian Li, Youliang Tian, Junpeng Zhang, Zhou Zhou, Dongmei Zhao, Jianfeng Ma:
IMFL: An Incentive Mechanism for Federated Learning With Personalized Protection. IEEE Internet Things J. 11(13): 23862-23877 (2024) - [j481]Jiahui Zhang, Zhuzhu Wang, Zhuoran Ma, Jianfeng Ma:
Adaptive Robust Learning Against Backdoor Attacks in Smart Homes. IEEE Internet Things J. 11(13): 23906-23916 (2024) - [j480]Yue Wang, Chao Yang, Ruidong Han, Xinghua Li, Jianfeng Ma:
Dvatar: Simulating the Binary Firmware of Drones. IEEE Internet Things J. 11(19): 30661-30675 (2024) - [j479]Xiaomin Wei, Jianfeng Ma, Cong Sun:
A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures. IEEE Internet Things J. 11(21): 34826-34847 (2024) - [j478]Zheng Zhang, Jianfeng Ma, Xindi Ma, Ruikang Yang, Xiangyu Wang, Junying Zhang:
Defending against membership inference attacks: RM Learning is all you need. Inf. Sci. 670: 120636 (2024) - [j477]Jinhai Zhang, Junwei Zhang, Zhuo Ma, Yang Liu, Xindi Ma, Jianfeng Ma:
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay. J. Syst. Archit. 150: 103111 (2024) - [j476]Xiaomin Wei, Cong Sun, Xinghua Li, Jianfeng Ma:
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio. J. Syst. Archit. 153: 103212 (2024) - [j475]Haihan Nan, Ruidong Li, Xiaoyan Zhu, Jianfeng Ma, Kaiping Xue:
Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse. IEEE J. Sel. Areas Commun. 42(3): 669-679 (2024) - [j474]Zhongyuan Jiang, Haibo Liu, Jing Li, Xinghua Li, Jianfeng Ma, Philip S. Yu:
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk. Int. J. Mach. Learn. Cybern. 15(11): 4959-4971 (2024) - [j473]Haihan Nan, Ruidong Li, Xiaoyan Zhu, Jianfeng Ma, Dusit Niyato:
An Efficient Data-Driven Traffic Prediction Framework for Network Digital Twin. IEEE Netw. 38(1): 22-29 (2024) - [j472]Zhiquan Liu, Lin Wan, Yong Ma, Jingjing Guo, Suiming Guo, Jing Ma, Jianfeng Ma:
Establishing Trustworthy and Privacy-Preserving SAGIVNs in 6G: Architectures, Requirements, and Solutions. IEEE Netw. 38(2): 141-147 (2024) - [j471]Jianfeng Ma, Dongxu Liu, Senlin Qin, Ge Jia, Jianlin Zhang, Zhiyong Xu:
An Asymmetric Feature Enhancement Network for Multiple Object Tracking of Unmanned Aerial Vehicle. Remote. Sens. 16(1): 70 (2024) - [j470]Lin Wan, Zhiquan Liu, Yong Ma, Yudan Cheng, Yongdong Wu, Runchuan Li, Jianfeng Ma:
Lightweight and Privacy-Preserving Dual Incentives for Mobile Crowdsensing. IEEE Trans. Cloud Comput. 12(2): 504-521 (2024) - [j469]Cong Chen, Zhongyuan Jiang, Jianfeng Ma:
Privacy Protection for Marginal-Sensitive Community Individuals Against Adversarial Community Detection Attacks. IEEE Trans. Comput. Soc. Syst. 11(1): 782-794 (2024) - [j468]Yuchen Wang, Xiaoguang Li, Li Yang, Jianfeng Ma, Hui Li:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. IEEE Trans. Dependable Secur. Comput. 21(3): 1139-1154 (2024) - [j467]Teng Li, Ximeng Liu, Wei Qiao, Xiongjie Zhu, Yulong Shen, Jianfeng Ma:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. IEEE Trans. Dependable Secur. Comput. 21(3): 1179-1195 (2024) - [j466]Tao Jiang, Xu Yuan, Qiong Cheng, Yulong Shen, Liangmin Wang, Jianfeng Ma:
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination. IEEE Trans. Dependable Secur. Comput. 21(4): 3528-3544 (2024) - [j465]Yang Wei, Zhuo Ma, Zhuoran Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. IEEE Trans. Dependable Secur. Comput. 21(4): 4206-4219 (2024) - [j464]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j463]Chuang Tian, Jianfeng Ma, Teng Li, Junwei Zhang, Chengyan Ma, Ning Xi:
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings. IEEE Trans. Inf. Forensics Secur. 19: 4448-4463 (2024) - [j462]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse. IEEE Trans. Inf. Forensics Secur. 19: 6393-6408 (2024) - [j461]Yanrong Liang, Jianfeng Ma, Yinbin Miao, Yuan Su, Robert H. Deng:
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 19: 9085-9099 (2024) - [j460]Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, Yao Liu:
Eyes See Hazy while Algorithms Recognize Who You Are. ACM Trans. Priv. Secur. 27(1): 7:1-7:23 (2024) - [j459]Taifeng Liu, Chao Yang, Xinjing Liu, Ruidong Han, Jianfeng Ma:
RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches. IEEE Trans. Intell. Transp. Syst. 25(3): 2586-2598 (2024) - [j458]Runchuan Li, Zhiquan Liu, Yong Ma, Yunni Xia, Yudan Cheng, Lin Wan, Jianfeng Ma:
RPPM: A Reputation-Based and Privacy-Preserving Platoon Management Scheme in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 25(6): 6147-6160 (2024) - [j457]Xia Feng, Kaiping Cui, Liangmin Wang, Zhiquan Liu, Jianfeng Ma:
PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs. IEEE Trans. Intell. Transp. Syst. 25(10): 13524-13545 (2024) - [j456]Bin Luo, Xinghua Li, Ximeng Liu, Jingjing Guo, Yanbing Ren, Siqi Ma, Jianfeng Ma:
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing. IEEE Trans. Knowl. Data Eng. 36(3): 927-942 (2024) - [j455]Zhuoran Ma, Yang Liu, Yinbin Miao, Guowen Xu, Ximeng Liu, Jianfeng Ma, Robert H. Deng:
FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings. IEEE Trans. Knowl. Data Eng. 36(4): 1566-1581 (2024) - [j454]Chengyan Ma, Di Lu, Chaoyue Lv, Ning Xi, Xiaohong Jiang, Yulong Shen, Jianfeng Ma:
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems. IEEE Trans. Knowl. Data Eng. 36(9): 4472-4485 (2024) - [j453]Xueyang Feng, Zhongyuan Jiang, Wei You, Jie Yang, Xinghua Li, Jian Feng Ma:
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture. IEEE Trans. Netw. Serv. Manag. 21(3): 3609-3622 (2024) - [j452]Sen Wang, Zhongyuan Jiang, Xinghua Li, Jianfeng Ma:
K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs. IEEE/ACM Trans. Netw. 32(4): 3347-3360 (2024) - [j451]Ruidong Han, Siqi Ma, Juanru Li, Surya Nepal, David Lo, Zhuo Ma, Jianfeng Ma:
Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024) - [c259]Yuxin Liu, Ning Xi, Ruidong Han, Yuanzhao Li, Jian Feng Ma, Yulong Shen:
Action-Driven UAV Fingerprint Verification with Perception Data. ACISP (3) 2024: 303-322 - [c258]Chaoyue Lv, Di Lu, Yuanyuan Zhang, Xindi Ma, Yulong Shen, Liping Wang, Jianfeng Ma:
ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT. AIiH (2) 2024: 263-278 - [c257]Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma:
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz. CCS 2024: 1776-1790 - [c256]Hao Xiang, Zehui Cheng, Jinku Li, Jianfeng Ma, Kangjie Lu:
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness. CCS 2024: 4524-4538 - [c255]Chong Li, Xuelin Qian, Yun Wang, Jingyang Huo, Xiangyang Xue, Yanwei Fu, Jianfeng Ma:
Enhancing Cross-Subject fMRI-to-Video Decoding with Global-Local Functional Alignment. ECCV (83) 2024: 353-369 - [c254]Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma:
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction. ICASSP 2024: 4530-4534 - [c253]Yuchen Wang, Xiaoguang Li, Li Yang, Lu Zhou, Jianfeng Ma, Hui Li:
Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models. ICME 2024: 1-6 - [i31]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse. CoRR abs/2409.10850 (2024) - [i30]Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu:
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. CoRR abs/2410.17910 (2024) - 2023
- [j450]Xiaoyun Zhao, Chao Yang, Zhizhuang Jia, Yue Wang, Jianfeng Ma:
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily. Comput. Secur. 132: 103354 (2023) - [j449]Zhizhuang Jia, Chao Yang, Xiaoyun Zhao, Xinghua Li, Jian Feng Ma:
Design and implementation of an efficient container tag dynamic taint analysis. Comput. Secur. 135: 103528 (2023) - [j448]Ruikang Yang, Jianfeng Ma, Yinbin Miao, Xindi Ma:
Privacy-preserving generative framework for images against membership inference attacks. IET Commun. 17(1): 45-62 (2023) - [j447]Junwei Zhang, Yuqing Wang, Zhuo Ma, Xiaohan Yang, Zuobin Ying, Jianfeng Ma:
A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains. IEEE Internet Things J. 10(6, March 15): 4783-4798 (2023) - [j446]Haihan Nan, Xiaoyan Zhu, Jianfeng Ma:
MSTL-GLTP: A Global-Local Decomposition and Prediction Framework for Wireless Traffic. IEEE Internet Things J. 10(6, March 15): 5024-5034 (2023) - [j445]Yanbo Yang, Jiawei Zhang, Ximeng Liu, Jianfeng Ma:
A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics. IEEE Internet Things J. 10(10): 8603-8617 (2023) - [j444]Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Libo Wang, Zuobin Ying, Xin Chen:
Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks. IEEE Internet Things J. 10(17): 14925-14939 (2023) - [j443]Jingjing Guo, Zhiquan Liu, Siyi Tian, Feiran Huang, Jiaxing Li, Xinghua Li, Kostromitin Konstantin Igorevich, Jianfeng Ma:
TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks. IEEE J. Sel. Areas Commun. 41(11): 3548-3560 (2023) - [j442]Zhe Ren, Xinghua Li, Qi Jiang, Yunwei Wang, Jianfeng Ma, Chunyu Miao:
Network Slicing in 6G: An Authentication Framework for Unattended Terminals. IEEE Netw. 37(1): 78-86 (2023) - [j441]Zheng Zhang, Xindi Ma, Jianfeng Ma:
Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing. Remote. Sens. 15(20): 5050 (2023) - [j440]Zhuzhu Wang, Cui Hu, Bin Xiao, Yang Liu, Teng Li, Zhuo Ma, Jianfeng Ma:
Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database. IEEE Trans. Big Data 9(5): 1408-1419 (2023) - [j439]Yanrong Liang, Jianfeng Ma, Yinbin Miao, Da Kuang, Xiangdong Meng, Robert H. Deng:
Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data. IEEE Trans. Computers 72(11): 3086-3098 (2023) - [j438]Feng Li, Jianfeng Ma, Yinbin Miao, Qi Jiang, Ximeng Liu, Kim-Kwang Raymond Choo:
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap. IEEE Trans. Cloud Comput. 11(1): 336-348 (2023) - [j437]Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 11(1): 839-853 (2023) - [j436]Jiawei Zhang, Teng Li, Zuobin Ying, Jianfeng Ma:
Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT. IEEE Trans. Cloud Comput. 11(2): 1546-1561 (2023) - [j435]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Sheng Wen, Yang Xiang, Yinbin Miao:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j434]Linbo Luo, Xinyu Wang, Jianfeng Ma, Yew-Soon Ong:
GrpAvoid: Multigroup Collision-Avoidance Control and Optimization for UAV Swarm. IEEE Trans. Cybern. 53(3): 1776-1789 (2023) - [j433]Teng Li, Ya Jiang, Chi Lin, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 740-757 (2023) - [j432]Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023) - [j431]Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Yongdong Wu, Kaimin Wei, Caiqin Dong:
A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 1771-1788 (2023) - [j430]Tao Jiang, Xu Yuan, Yuan Chen, Ke Cheng, Liangmin Wang, Xiaofeng Chen, Jianfeng Ma:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(3): 2466-2483 (2023) - [j429]Xindi Ma, Qi Jiang, Ximeng Liu, Qingqi Pei, Jianfeng Ma, Wenjing Lou:
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy. IEEE Trans. Dependable Secur. Comput. 20(3): 2641-2656 (2023) - [j428]Zhuo Ma, Yang Liu, Ximeng Liu, Jian Liu, Jianfeng Ma, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. IEEE Trans. Dependable Secur. Comput. 20(4): 3194-3207 (2023) - [j427]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao, Yang Liu, Robert H. Deng:
Forward/Backward and Content Private DSSE for Spatial Keyword Queries. IEEE Trans. Dependable Secur. Comput. 20(4): 3358-3370 (2023) - [j426]Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma:
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3617-3635 (2023) - [j425]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 5087-5101 (2023) - [j424]Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Zhetao Li, Yongdong Wu, Caiqin Dong, Runchuan Li:
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 20(6): 5293-5311 (2023) - [j423]Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. IEEE Trans. Inf. Forensics Secur. 18: 581-596 (2023) - [j422]Bin Wang, Chao Yang, Jianfeng Ma:
IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis. IEEE Trans. Inf. Forensics Secur. 18: 2883-2898 (2023) - [j421]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. IEEE Trans. Inf. Forensics Secur. 18: 3817-3832 (2023) - [j420]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Yinbin Miao, Ximeng Liu, Zhongyuan Jiang:
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies. IEEE Trans. Inf. Forensics Secur. 18: 4144-4156 (2023) - [j419]Zhou Zhou, Youliang Tian, Jinbo Xiong, Jianfeng Ma, Changgen Peng:
Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Informatics 19(5): 6669-6681 (2023) - [j418]Jingjing Guo, Huamin Gao, Zhiquan Liu, Feiran Huang, Junwei Zhang, Xinghua Li, Jianfeng Ma:
ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(2): 2447-2460 (2023) - [j417]Dawei Wei, Junying Zhang, Mohammad Shojafar, Saru Kumari, Ning Xi, Jianfeng Ma:
Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET. IEEE Trans. Intell. Transp. Syst. 24(11): 13108-13122 (2023) - [j416]Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jian-Feng Ma:
BejaGNN: behavior-based Java malware detection via graph neural network. J. Supercomput. 79(14): 15390-15414 (2023) - [j415]Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong, Yulong Shen, Jianfeng Ma:
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. IEEE Trans. Mob. Comput. 22(2): 1143-1156 (2023) - [j414]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j413]Guichuan Zhao, Qi Jiang, Ximeng Liu, Xindi Ma, Ning Zhang, Jianfeng Ma:
Electrocardiogram Based Group Device Pairing for Wearables. IEEE Trans. Mob. Comput. 22(11): 6394-6409 (2023) - [j412]Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal N. Xiong, Jianfeng Ma:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. ACM Trans. Internet Techn. 23(2): 35:1-35:29 (2023) - [j411]Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. IEEE Trans. Serv. Comput. 16(1): 504-514 (2023) - [j410]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j409]Tengfei Yang, Jianfeng Ma, Yinbin Miao, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Bin Xiao:
MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting. IEEE Trans. Serv. Comput. 16(2): 1282-1295 (2023) - [j408]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks. IEEE Trans. Serv. Comput. 16(3): 2114-2125 (2023) - [j407]Teng Li, Jiawei Zhang, Yulong Shen, Jianfeng Ma:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(5): 3425-3438 (2023) - [j406]Dilxat Ghopur, Jianfeng Ma, Xindi Ma, Jialu Hao, Tao Jiang, Xiangyu Wang:
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation. IEEE Trans. Serv. Comput. 16(6): 3999-4011 (2023) - [j405]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Yunwei Wang, Qiuyun Tong, Jianfeng Ma:
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework. IEEE Trans. Serv. Comput. 16(6): 4591-4604 (2023) - [c252]Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. CCS 2023: 341-355 - [c251]Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma:
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. CCS 2023: 2725-2739 - [c250]Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma:
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. CCS 2023: 3048-3062 - [c249]Yu Zheng, Xinglin Lian, Zhangxuan Dang, Chunlei Peng, Chao Yang, Jianfeng Ma:
A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion. CIKM 2023: 4455-4459 - [c248]Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song:
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. ESORICS (1) 2023: 126-146 - [c247]Kaichao Shi, Yong Zeng, Baihe Ma, Zhihong Liu, Jianfeng Ma:
MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning. GLOBECOM 2023: 7538-7543 - [c246]Tianci Zhou, Yong Zeng, Yitao Chen, Zhihong Liu, Jianfeng Ma:
Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model. ICC 2023: 3768-3773 - [c245]Yong Zeng, Zhe Wang, Xiaoya Guo, Kaichao Shi, Zhihong Liu, Xiaoyan Zhu, Jianfeng Ma:
Social Networks Based Robust Federated Learning for Encrypted Traffic Classification. ICC 2023: 4937-4942 - [c244]Yue Wang, Chao Yang, Ning Xi, Yulong Shen, Jianfeng Ma:
SEBD: Sensor Emulation Based Backdoor for Autopilot. IoT 2023: 265-269 - [c243]Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma:
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections. ProvSec 2023: 44-63 - [c242]Li Yun-xi, Wang Zhong-hua, Du Cheng-lie, Li Ya-hui, Jianfeng Ma, Wensheng Niu:
Research on the Distributed Secure Storage of Embedded Terminals Based on the Blockchain. SNPD-Winter 2023: 205-210 - [c241]Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma:
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding. USENIX Security Symposium 2023: 7517-7534 - [i29]Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang:
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark. CoRR abs/2307.06123 (2023) - [i28]Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, Jianfeng Ma:
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems. CoRR abs/2309.05978 (2023) - [i27]Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song:
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. IACR Cryptol. ePrint Arch. 2023: 1712 (2023) - 2022
- [j404]Xiaoqin Feng, Jianfeng Ma, Shaobin Liu, Yinbin Miao, Ximeng Liu:
Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election. Sci. China Inf. Sci. 65(1) (2022) - [j403]Suixing Wang, Chao Yang, Gang Guo, Mingzhe Chen, Jian Feng Ma:
SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic. Comput. Networks 203: 108659 (2022) - [j402]Chuang Tian, Qi Jiang, Teng Li, Junwei Zhang, Ning Xi, Jianfeng Ma:
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput. Networks 218: 109421 (2022) - [j401]Kai Yang, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Sliding window based ON/OFF flow watermarking on Tor. Comput. Commun. 196: 66-75 (2022) - [j400]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyang Yan, Qun Zhang, Xinghua Li:
Detection of global positioning system spoofing attack on unmanned aerial vehicle system. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j399]Jiawei Zhang, Teng Li, Qi Jiang, Jianfeng Ma:
Enabling efficient traceable and revocable time-based data sharing in smart city. EURASIP J. Wirel. Commun. Netw. 2022(1): 1-26 (2022) - [j398]Xinghua Li, Ting Chen, Qingfeng Cheng, Jian-Feng Ma:
An efficient and authenticated key establishment scheme based on fog computing for healthcare system. Frontiers Comput. Sci. 16(4): 164815 (2022) - [j397]Zhuzhu Wang, Junwei Zhang, Yang Liu, Maobin Lu, Zuobin Ying, Jianfeng Ma:
A certificateless authentication scheme with fuzzy batch verification for federated UAV network. Int. J. Intell. Syst. 37(9): 6048-6079 (2022) - [j396]Yang Wei, Jianfeng Ma, Zhuzhu Wang, Bin Xiao, Wenying Zheng:
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces. Int. J. Intell. Syst. 37(11): 8291-8308 (2022) - [j395]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, Changgen Peng:
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT. IEEE Internet Things J. 9(4): 2761-2777 (2022) - [j394]Xinghua Li, Hengyou Zhang, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles. IEEE Internet Things J. 9(5): 3359-3371 (2022) - [j393]Xiaoqin Feng, Jianfeng Ma, Shaobin Liu, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT. IEEE Internet Things J. 9(5): 3784-3798 (2022) - [j392]Tao Zhang, Anxiao Song, Xuewen Dong, Yulong Shen, Jianfeng Ma:
Privacy-Preserving Asynchronous Grouped Federated Learning for IoT. IEEE Internet Things J. 9(7): 5511-5523 (2022) - [j391]Zhiquan Liu, Jian Weng, Jingjing Guo, Jianfeng Ma, Feiran Huang, Heng Sun, Yudan Cheng:
PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks. IEEE Internet Things J. 9(8): 5943-5956 (2022) - [j390]Xindi Ma, Baopu Li, Qi Jiang, Yimin Chen, Sheng Gao, Jianfeng Ma:
NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack. IEEE Internet Things J. 9(9): 6778-6789 (2022) - [j389]Teng Li, Jiawei Zhang, Mohammad S. Obaidat, Chi Lin, Yangxu Lin, Yulong Shen, Jianfeng Ma:
Energy-Efficient and Secure Communication Toward UAV Networks. IEEE Internet Things J. 9(12): 10061-10076 (2022) - [j388]Li Yang, Cheng Li, Teng Wei, Fengwei Zhang, Jianfeng Ma, Naixue Xiong:
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices. IEEE Internet Things J. 9(12): 10093-10107 (2022) - [j387]Jiawei Zhang, Jianfeng Ma, Yanbo Yang, Ximeng Liu, Neal N. Xiong:
Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things. IEEE Internet Things J. 9(13): 10446-10463 (2022) - [j386]Zhenyong Zhang, Youliang Tian, Ruilong Deng, Jianfeng Ma:
A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid. IEEE Internet Things J. 9(18): 17912-17925 (2022) - [j385]Ning Xi, Weihui Li, Lv Jing, Jianfeng Ma:
ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV. IEEE Internet Things J. 9(22): 22903-22913 (2022) - [j384]Li Yang, Cheng Li, Yuting Cheng, Shui Yu, Jianfeng Ma:
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection. Inf. Sci. 582: 529-546 (2022) - [j383]Cheng Li, Li Yang, Shui Yu, Wenjing Qin, Jian Feng Ma:
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things. Inf. Sci. 612: 151-167 (2022) - [j382]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. IEEE J. Sel. Areas Commun. 40(11): 3191-3206 (2022) - [j381]Jiawei Zhang, Ning Lu, Jian Feng Ma, Ruixiao Wang, Wenbo Shi:
A Secure Access Control Framework for Cloud Management. Mob. Networks Appl. 27(1): 404-416 (2022) - [j380]Jingjing Guo, Xuliang Wei, Yuling Zhang, Jianfeng Ma, Huamin Gao, Libo Wang, Zhiquan Liu:
Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain. Secur. Commun. Networks 2022: 5804109:1-5804109:19 (2022) - [j379]Jiawei Zhang, Teng Li, Mohammad S. Obaidat, Chi Lin, Jianfeng Ma:
Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems. IEEE Syst. J. 16(1): 1355-1366 (2022) - [j378]Hongyang Li, Qingfeng Cheng, Xinghua Li, Siqi Ma, Jianfeng Ma:
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing. IEEE Syst. J. 16(2): 1832-1841 (2022) - [j377]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Xinsheng Wen, Kefei Chen, Jianfeng Ma:
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems. IEEE Syst. J. 16(2): 3096-3107 (2022) - [j376]Yingying Li, Jianfeng Ma, Yinbin Miao, Huizhong Li, Qiang Yan, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
DVREI: Dynamic Verifiable Retrieval Over Encrypted Images. IEEE Trans. Computers 71(8): 1755-1769 (2022) - [j375]Yingying Li, Jianfeng Ma, Yinbin Miao, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
Similarity Search for Encrypted Images in Secure Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1142-1155 (2022) - [j374]Jiayi Li, Jianfeng Ma, Yinbin Miao, Ruikang Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 10(3): 2005-2019 (2022) - [j373]Yingying Li, Jianfeng Ma, Yinbin Miao, Yue Wang, Tengfei Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings. IEEE Trans. Cloud Comput. 10(4): 2936-2948 (2022) - [j372]Yanguo Peng, Long Wang, Jiangtao Cui, Ximeng Liu, Hui Li, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. IEEE Trans. Dependable Secur. Comput. 19(1): 388-401 (2022) - [j371]Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 2122-2137 (2022) - [j370]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. IEEE Trans. Dependable Secur. Comput. 19(4): 2318-2332 (2022) - [j369]Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. IEEE Trans. Dependable Secur. Comput. 19(5): 2873-2889 (2022) - [j368]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks. IEEE Trans. Dependable Secur. Comput. 19(6): 3621-3639 (2022) - [j367]Yang Liu, Zhuo Ma, Yilong Yang, Ximeng Liu, Jianfeng Ma, Kui Ren:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(6): 3671-3685 (2022) - [j366]Ning Lu, Junwei Zhang, Ximeng Liu, Wenbo Shi, Jianfeng Ma:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 17: 938-953 (2022) - [j365]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 1639-1654 (2022) - [j364]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Yu Gao, Robert H. Deng:
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(2): 953-964 (2022) - [j363]Youliang Tian, Ta Li, Jinbo Xiong, Md. Zakirul Alam Bhuiyan, Jianfeng Ma, Changgen Peng:
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT. IEEE Trans. Ind. Informatics 18(3): 1918-1929 (2022) - [j362]Junwei Zhang, Zhuzhu Wang, Dandan Wang, Xinglong Zhang, Brij B. Gupta, Ximeng Liu, Jianfeng Ma:
A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box. IEEE Trans. Ind. Informatics 18(9): 6160-6170 (2022) - [j361]Jingjing Guo, Haiyang Li, Feiran Huang, Zhiquan Liu, Yanguo Peng, Xinghua Li, Jianfeng Ma, Varun G. Menon, Konstantin Kostromitin Igorevich:
ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning. IEEE Trans. Ind. Informatics 18(10): 6526-6536 (2022) - [j360]Jiawei Zhang, Yanbo Yang, Ximeng Liu, Jianfeng Ma:
An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things. IEEE Trans. Ind. Informatics 18(10): 7139-7150 (2022) - [j359]Dawei Wei, Ning Xi, Xindi Ma, Mohammad Shojafar, Saru Kumari, Jianfeng Ma:
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing. IEEE Trans. Ind. Informatics 18(11): 7935-7945 (2022) - [j358]Zuobin Ying, Shuanglong Cao, Ximeng Liu, Zhuo Ma, Jianfeng Ma, Robert H. Deng:
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(9): 16290-16303 (2022) - [j357]Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. ACM Trans. Internet Techn. 22(2): 45:1-45:24 (2022) - [j356]Xiangyu Wang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Ruikang Yang:
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 710-723 (2022) - [j355]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Ruikang Yang, Xiangyu Wang:
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing. IEEE Trans. Serv. Comput. 15(3): 1606-1618 (2022) - [j354]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud. IEEE Trans. Serv. Comput. 15(6): 3429-3442 (2022) - [j353]Sheng Gao, Xiuhua Chen, Jianming Zhu, Xuewen Dong, Jianfeng Ma:
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing. IEEE Trans. Serv. Comput. 15(6): 3577-3590 (2022) - [j352]Jiayi Li, Jianfeng Ma, Yinbin Miao, Lei Chen, Yunbo Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing. IEEE Trans. Serv. Comput. 15(6): 3591-3605 (2022) - [j351]Zhongyuan Jiang, Xianyu Chen, Jianfeng Ma, Philip S. Yu:
RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 52(10): 6383-6395 (2022) - [j350]Zuobin Ying, Maode Ma, Zijun Zhao, Ximeng Liu, Jianfeng Ma:
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon. IEEE Trans. Veh. Technol. 71(4): 3519-3532 (2022) - [c240]Yueyao Zhao, Baihe Ma, Ziwen Wang, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Trajectory Obfuscation and Detection in Internet-of-vehicles. CSCWD 2022: 769-774 - [c239]Yingying Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Qi Jiang:
Blockchain-Based Encrypted Image Storage and Search in Cloud Computing. DASFAA (1) 2022: 413-421 - [c238]Shunjie Yuan, Chao Wang, Qi Jiang, Jianfeng Ma:
Community Detection with Graph Neural Network using Markov Stability. ICAIIC 2022: 437-442 - [c237]Cheng Li, Li Yang, Shui Yu, Wenjing Qin, Jianfeng Ma:
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things. ICC 2022: 2792-2797 - [c236]Yang Wei, Jianfeng Ma, Zhongyuan Jiang, Bin Xiao:
Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods. ICME 2022: 1-6 - [c235]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c234]Xiaoqing Zhao, Zhongyuan Jiang, Jianfeng Ma:
A Survey of Deep Anomaly Detection for System Logs. IJCNN 2022: 1-8 - [c233]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. INFOCOM 2022: 280-289 - [c232]Ruixin Li, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Representing the Topology of Complex Networks Based on Graph Embedding. NaNA 2022: 1-7 - [c231]XinDi Ma, Cunzhu Su, Jianfeng Ma, Qi Jiang, Ning Xi, Sheng Gao, Kang Xie:
Self-Anomaly-Detection Model Training via Initialized Meta Model. NaNA 2022: 471-476 - [c230]Yudan Cheng, Jianfeng Ma, Zhiquan Liu:
A Lightweight Privacy-Preserving Participant Selection Scheme for Mobile Crowdsensing. WCNC 2022: 1509-1514 - [i26]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. CoRR abs/2201.08133 (2022) - [i25]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. CoRR abs/2201.09538 (2022) - [i24]Ruikang Yang, Jianfeng Ma, Yinbin Miao, Xindi Ma:
Privacy-preserving Generative Framework Against Membership Inference Attacks. CoRR abs/2202.05469 (2022) - [i23]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. CoRR abs/2209.08893 (2022) - 2021
- [j349]Lei He, Jianfeng Ma, Limin Shen, Dawei Wei:
Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks. Sci. China Inf. Sci. 64(1) (2021) - [j348]Dawei Wei, Jianfeng Ma, Linbo Luo, Yunbo Wang, Lei He, Xinghua Li:
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach. Comput. Networks 199: 108439 (2021) - [j347]Baolin Ma, Chao Yang, Mingzhe Chen, Jianfeng Ma:
GramMatch: An automatic protocol feature extraction and identification system. Comput. Networks 201: 108528 (2021) - [j346]Qiuning Ren, Chao Yang, Jianfeng Ma:
App identification based on encrypted multi-smartphone sources traffic fingerprints. Comput. Networks 201: 108590 (2021) - [j345]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, Xindi Ma, Jianfeng Ma:
Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 173: 45-55 (2021) - [j344]Gaopan Hou, Jianfeng Ma, Chen Liang, Jiayi Li:
Efficient audit protocol supporting virtual nodes in cloud storage. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j343]Junshuai Sun, Qi Jiang, Jianfeng Ma, Qingfeng Cheng, Chih-Lin I, Chengguang Yin:
Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j342]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
Smart home: Keeping privacy based on Air-Padding. IET Inf. Secur. 15(2): 156-168 (2021) - [j341]Zhiquan Liu, Jianfeng Ma, Jian Weng, Feiran Huang, Yongdong Wu, Linfeng Wei, Yuxian Li:
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications. Inf. Fusion 73: 144-156 (2021) - [j340]Xinghua Li, Ting Chen, Qingfeng Cheng, Siqi Ma, Jianfeng Ma:
Smart Applications in Edge Computing: Overview on Authentication and Data Security. IEEE Internet Things J. 8(6): 4063-4080 (2021) - [j339]Xuewen Dong, Zhichao You, Tom H. Luan, Qingsong Yao, Yulong Shen, Jianfeng Ma:
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy. IEEE Internet Things J. 8(10): 8032-8043 (2021) - [j338]Jianfeng Ma, Tao Li, Jie Cui, Zuobin Ying, Jiujun Cheng:
Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain. IEEE Internet Things J. 8(13): 10873-10883 (2021) - [j337]Xiangyu Wang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Dan Zhu, Robert H. Deng:
Fast and Secure Location-Based Services in Smart Cities on Outsourced Data. IEEE Internet Things J. 8(24): 17639-17654 (2021) - [j336]Xinghua Li, Zhongyuan Hu, Mengfan Xu, Yunwei Wang, Jianfeng Ma:
Transfer learning based intrusion detection scheme for Internet of vehicles. Inf. Sci. 547: 119-135 (2021) - [j335]Zerui Chen, Youliang Tian, Jinbo Xiong, Changgen Peng, Jianfeng Ma:
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme. Inf. Sci. 568: 286-316 (2021) - [j334]Zhijun Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Forward and backward secure keyword search with flexible keyword shielding. Inf. Sci. 576: 507-521 (2021) - [j333]Mingkang Zhang, Yanbiao Ma, Linan Zheng, Yuanyuan Wang, Zhihong Liu, Jianfeng Ma, Qian Xiang, Kexin Zhang, Licheng Jiao:
An Explainable Diagnostic Method for Autism Spectrum Disorder Using Neural Network. J. Inf. Sci. Eng. 37(2): 347-363 (2021) - [j332]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Efficient First-Price Sealed-Bid Auction Scheme. J. Inf. Sci. Eng. 37(3): 635-652 (2021) - [j331]Tong Dong, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Xiaoyan Zhu:
A Differential Privacy Topology Scheme for Average Path Length Query. J. Inf. Sci. Eng. 37(4): 885-899 (2021) - [j330]Di Lu, Ruidong Han, Yulong Shen, Xuewen Dong, Jianfeng Ma, Xiaojiang Du, Mohsen Guizani:
xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE J. Sel. Areas Commun. 39(2): 370-383 (2021) - [j329]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection via Graph Representation Learning. Mob. Inf. Syst. 2021: 5538841:1-5538841:14 (2021) - [j328]Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian, Jian Feng Ma:
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users. Mob. Networks Appl. 26(6): 2407-2422 (2021) - [j327]Naijian Zhang, Qi Jiang, Long Li, Xindi Ma, Jianfeng Ma:
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. Peer-to-Peer Netw. Appl. 14(5): 3319-3332 (2021) - [j326]Dawei Wei, Ning Xi, Jianfeng Ma, Lei He:
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things. Remote. Sens. 13(23): 4853 (2021) - [j325]Jiawei Zhang, Jianfeng Ma, Teng Li, Qi Jiang:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. Secur. Commun. Networks 2021: 6646445:1-6646445:17 (2021) - [j324]Gaopan Hou, Jianfeng Ma, Jiayi Li, Chen Liang:
Audit Outsourced Data in Internet of Things. Secur. Commun. Networks 2021: 6662135:1-6662135:11 (2021) - [j323]Teng Li, Jiawei Zhang, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. Secur. Commun. Networks 2021: 6689448:1-6689448:13 (2021) - [j322]Zhe Ren, Xinghua Li, Qi Jiang, Qingfeng Cheng, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. Secur. Commun. Networks 2021: 6694058:1-6694058:19 (2021) - [j321]Yong Zeng, Yixin Li, Zhongyuan Jiang, Jianfeng Ma:
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum. Secur. Commun. Networks 2021: 8609278:1-8609278:11 (2021) - [j320]Zisheng Yu, Zhongyuan Jiang, Jianfeng Ma, Yu Zheng:
Safeness-Based Community Penetration. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2690-2694 (2021) - [j319]Xianyu Chen, Zhongyuan Jiang, Hui Li, Jianfeng Ma, Philip S. Yu:
Community Hiding by Link Perturbation in Social Networks. IEEE Trans. Comput. Soc. Syst. 8(3): 704-715 (2021) - [j318]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans. Dependable Secur. Comput. 18(3): 1080-1094 (2021) - [j317]Qi Jiang, Zhiren Chen, Jianfeng Ma, Xindi Ma, Jian Shen, Dapeng Wu:
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network. IEEE Trans. Emerg. Top. Comput. 9(2): 839-853 (2021) - [j316]Xiangyu Wang, Jianfeng Ma, Feng Li, Ximeng Liu, Yinbin Miao, Robert H. Deng:
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees. IEEE Trans. Inf. Forensics Secur. 16: 4909-4923 (2021) - [j315]Yingying Li, Jianfeng Ma, Yinbin Miao, Liming Liu, Ximeng Liu, Kim-Kwang Raymond Choo:
Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing. IEEE Trans. Ind. Informatics 17(8): 5348-5359 (2021) - [j314]Junwei Zhang, Fan Yang, Zhuo Ma, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 22(4): 2299-2313 (2021) - [j313]Yang Wei, Zhuzhu Wang, Bin Xiao, Ximeng Liu, Zheng Yan, Jianfeng Ma:
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection. ACM Trans. Multim. Comput. Commun. Appl. 16(4): 124:1-124:22 (2021) - [j312]Jianghong Wei, Xiaofeng Chen, Jianfeng Ma, Xuexian Hu, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [j311]Tao Jiang, Wenjuan Meng, Xu Yuan, Liangmin Wang, Jianhua Ge, Jianfeng Ma:
ReliableBox: Secure and Verifiable Cloud Storage With Location-Aware Backup. IEEE Trans. Parallel Distributed Syst. 32(12): 2996-3010 (2021) - [j310]Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys. IEEE Trans. Serv. Comput. 14(4): 1251-1263 (2021) - [j309]Jiayi Li, Jianfeng Ma, Yinbin Miao, Fan Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs. IEEE Trans. Veh. Technol. 70(9): 8912-8925 (2021) - [j308]Jiawei Zhang, Ning Lu, Teng Li, Jian-Feng Ma:
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing. Wirel. Commun. Mob. Comput. 2021: 8513869:1-8513869:15 (2021) - [c229]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [c228]Zhihong Liu, Huiyu Li, Ruixin Li, Yong Zeng, Jianfeng Ma:
Graph Embedding Based on Euclidean Distance Matrix and its Applications. CIKM 2021: 1140-1149 - [c227]Yong Zeng, Yixin Li, Jiale Liu, Jianfeng Ma, Zhihong Liu:
Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network. GLOBECOM 2021: 1-6 - [c226]Wenjing Qin, Li Yang, Jianfeng Ma:
FedGR: A Lossless-Obfuscation Approach for Secure Federated Learning. GLOBECOM 2021: 1-6 - [c225]Jin Wei, Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma:
Attention-aware Multi-encoder for Session-based Recommendation. GLOBECOM 2021: 1-6 - [c224]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma:
Joint Connection and Content Embedding for Link Prediction in Social Networks. GLOBECOM 2021: 1-6 - [c223]Xiangyu Wang, Jianfeng Ma, Ximeng Liu:
Enabling Efficient and Expressive Spatial Keyword Queries On Encrypted Data. ICASSP 2021: 2670-2674 - [c222]Zhihong Liu, Siqi Li, Yong Zeng, Jianfeng Ma:
Covert Wireless Communications in the Presence of an Active Adversary. ICC 2021: 1-6 - [c221]Yu Zheng, Chao Yang, Yanzhou Yang, Qixian Ren, Yue Li, Jianfeng Ma:
ShadowDGA: Toward Evading DGA Detectors with GANs. ICCCN 2021: 1-8 - [c220]Ziyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma:
Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks. ICPADS 2021: 364-371 - [c219]Yong Zeng, Tong Dong, Qingqi Pei, Jiale Liu, Jianfeng Ma:
LPDBN: A Privacy Preserving Scheme for Deep Belief Network. INFOCOM Workshops 2021: 1-6 - [c218]Jie Cui, Lingbiao Kong, Hong Zhong, Xiuwen Sun, Chengjie Gu, Jianfeng Ma:
Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks. ISCC 2021: 1-7 - [c217]Dawei Wei, Ning Xi, Jianfeng Ma, Jiayi Li:
Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain. IWQoS 2021: 1-10 - [c216]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Ruikang Yang, Xiangyu Wang:
Lightweight Privacy-preserving Medical Diagnosis in Edge Computing. SERVICES 2021: 9 - [c215]Xiangyu Wang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Ruikang Yang:
Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing. SERVICES 2021: 19 - [c214]Jianfeng Ma, Xiangxue Li, Haifeng Qian:
LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. TrustCom 2021: 1039-1048 - [i22]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021) - [i21]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - [i20]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma:
Structural Mutual Information and Its Application. IACR Cryptol. ePrint Arch. 2021: 1356 (2021) - 2020
- [j307]Di Lu, Ruidong Han, Yue Wang, Yongzhi Wang, Xuewen Dong, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. Comput. Secur. 97: 101922 (2020) - [j306]Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang, Jipeng Su, Jianfeng Ma:
RansomSpector: An introspection-based approach to detect crypto ransomware. Comput. Secur. 97: 101997 (2020) - [j305]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Kim-Kwang Raymond Choo, Ximeng Liu, Xiangyu Wang, Tengfei Yang:
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting. Future Gener. Comput. Syst. 106: 545-558 (2020) - [j304]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Gener. Comput. Syst. 108: 1338-1349 (2020) - [j303]Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:
Achieving secure and convenient WLAN sharing in personal. IET Inf. Secur. 14(6): 733-744 (2020) - [j302]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band. IEEE Internet Things J. 7(4): 3378-3388 (2020) - [j301]Zhuzhu Wang, Yang Liu, Zhuo Ma, Ximeng Liu, Jianfeng Ma:
LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid. IEEE Internet Things J. 7(5): 3935-3947 (2020) - [j300]Zhiquan Liu, Jian Weng, Jianfeng Ma, Jingjing Guo, Bingwen Feng, Zhongyuan Jiang, Kaimin Wei:
TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs. IEEE Internet Things J. 7(5): 4028-4048 (2020) - [j299]Jingjing Guo, Xinghua Li, Zhiquan Liu, Jianfeng Ma, Chao Yang, Junwei Zhang, Dapeng Wu:
TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 7(7): 6647-6662 (2020) - [j298]Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma, Xiaoming Huang:
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 7(12): 11789-11802 (2020) - [j297]Linbo Luo, Kexin Liu, Bin Guo, Jianfeng Ma:
User interaction-oriented community detection based on cascading analysis. Inf. Sci. 510: 70-88 (2020) - [j296]Bin Xiao, Yang Wei, Xiuli Bi, Weisheng Li, Jianfeng Ma:
Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf. Sci. 511: 172-191 (2020) - [j295]Yang Liu, Zhuo Ma, Zheng Yan, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
Privacy-preserving federated k-means for proactive caching in next generation cellular networks. Inf. Sci. 521: 14-31 (2020) - [j294]Tengfei Yang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Xuan Wang, Bin Xiao, Qian Meng:
Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data. Inf. Sci. 536: 244-262 (2020) - [j293]Junwei Zhang, Zhuzhu Wang, Lei Shang, Di Lu, Jianfeng Ma:
BTNC: A blockchain based trusted network connection protocol in IoT. J. Parallel Distributed Comput. 143: 1-16 (2020) - [j292]Ning Lu, Can Chen, Wenbo Shi, Junwei Zhang, Jianfeng Ma:
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images. Remote. Sens. 12(23): 3907 (2020) - [j291]Zhongyuan Jiang, Xianyu Chen, Bowen Dong, Junsan Zhang, Jibing Gong, Hui Yan, Zehua Zhang, Jianfeng Ma, Philip S. Yu:
Trajectory-Based Community Detection. IEEE Trans. Circuits Syst. II Express Briefs 67-II(6): 1139-1143 (2020) - [j290]Zhongyuan Jiang, Xi Chen, Jianfeng Ma, Yasheng Zhang, Jujuan Gu:
Traffic Dynamics Evaluation for the Future NFV Deployment. IEEE Trans. Circuits Syst. II Express Briefs 67-II(10): 2214-2218 (2020) - [j289]Zhongyuan Jiang, Jing Li, Jianfeng Ma, Philip S. Yu:
Similarity-Based and Sybil Attack Defended Community Detection for Social Networks. IEEE Trans. Circuits Syst. 67-II(12): 3487-3491 (2020) - [j288]Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. IEEE Trans. Dependable Secur. Comput. 17(3): 479-492 (2020) - [j287]Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". IEEE Trans. Inf. Forensics Secur. 15: 1586-1588 (2020) - [j286]Youliang Tian, Zuan Wang, Jinbo Xiong, Jianfeng Ma:
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs. IEEE Trans. Ind. Informatics 16(9): 6193-6202 (2020) - [j285]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. IEEE Trans. Serv. Comput. 13(6): 985-998 (2020) - [j284]Bin Luo, Xinghua Li, Jian Weng, Jingjing Guo, Jianfeng Ma:
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET. IEEE Trans. Veh. Technol. 69(2): 2034-2048 (2020) - [j283]Sheng Gao, Guirong Piao, Jianming Zhu, Xindi Ma, Jianfeng Ma:
TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain. IEEE Trans. Veh. Technol. 69(6): 5784-5798 (2020) - [j282]Qi Jiang, Ning Zhang, Jianbing Ni, Jianfeng Ma, Xindi Ma, Kim-Kwang Raymond Choo:
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles. IEEE Trans. Veh. Technol. 69(9): 9390-9401 (2020) - [j281]Xuewen Dong, Zhichao You, Liangmin Wang, Sheng Gao, Yulong Shen, Jianfeng Ma:
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation. IEEE Trans. Wirel. Commun. 19(7): 4632-4642 (2020) - [j280]Cheng Li, Li Yang, Jian-Feng Ma:
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model. Wirel. Commun. Mob. Comput. 2020: 8825623:1-8825623:16 (2020) - [j279]Xuewen Dong, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma:
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing. World Wide Web 23(2): 1035-1055 (2020) - [c213]Yang Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma:
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach. Inscrypt 2020: 277-287 - [c212]Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization. CNCERT 2020: 175-190 - [c211]Xiaohan Huang, Guichuan Zhao, Qi Jiang, Xindi Ma, Youliang Tian, Jianfeng Ma:
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users. CollaborateCom (1) 2020: 493-510 - [c210]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao, Dan Zhu:
Spatial Dynamic Searchable Encryption with Forward Security. DASFAA (2) 2020: 746-762 - [c209]Zhong-Hua Wang, Jian-Feng Ma, Wen Sheng Niu, Hui-Ya Li:
Architecture of Security Protection technology for Aviation Cyberspace. DSA 2020: 21-24 - [c208]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Xiang Li:
Flexible and Privacy-preserving Framework for Decentralized Collaborative Learning. GLOBECOM 2020: 1-6 - [c207]Zuobin Ying, Yuanping Si, Jianfeng Ma, Ximeng Liu, Shengmin Xu:
FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability. GLOBECOM 2020: 1-6 - [c206]Danni Yuan, Kaoru Ota, Mianxiong Dong, Xiaoyan Zhu, Tao Wu, Linjie Zhang, Jianfeng Ma:
Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing. ICC 2020: 1-6 - [c205]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma, Zhuo Ma, Danni Yuan:
Medical Privacy-preserving Service Recommendation. ICC 2020: 1-6 - [c204]Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma:
A Preliminary Analysis of Password Guessing Algorithm. ICCCN 2020: 1-9 - [c203]Weidong Luo, Bowen Lan, Xinyi Wan, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel. ICCT 2020: 1089-1096 - [c202]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. ICDE 2020: 1862-1865 - [c201]Duo Zhang, Youliang Tian, Linjie Wang, Sheng Gao, Jianfeng Ma:
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators. INFOCOM Workshops 2020: 62-67 - [c200]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Robert H. Deng, Yinbin Miao, Dan Zhu, Zhuoran Ma:
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data. INFOCOM 2020: 2253-2262 - [c199]Xindi Ma, Junying Zhang, Jianfeng Ma, Qi Jiang, Sheng Gao, Kang Xie:
Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT. NaNA 2020: 348-354 - [c198]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection Based on Call Graph via Graph Neural Network. NaNA 2020: 368-374 - [c197]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. SEC 2020: 189-202 - [c196]Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. SPDE 2020: 249-262 - [i19]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. CoRR abs/2002.03284 (2020) - [i18]Yang Liu, Zhuo Ma, Ximeng Liu, Jianfeng Ma:
Learn to Forget: User-Level Memorization Elimination in Federated Learning. CoRR abs/2003.10933 (2020) - [i17]Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma:
Cloud-based Federated Boosting for Mobile Crowdsensing. CoRR abs/2005.05304 (2020) - [i16]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. CoRR abs/2005.08997 (2020) - [i15]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud. CoRR abs/2009.10918 (2020)
2010 – 2019
- 2019
- [j278]Zhuo Ma, Haoran Ge, Yang Liu, Meng Zhao, Jianfeng Ma:
A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms. IEEE Access 7: 21235-21245 (2019) - [j277]Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun:
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7: 35302-35316 (2019) - [j276]Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li, Jinku Li, Jiao Liu:
Energy-Aware RFID Authentication in Edge Computing. IEEE Access 7: 77964-77980 (2019) - [j275]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Xiaoling Tao:
New efficient constructions of verifiable data streaming with accountability. Ann. des Télécommunications 74(7-8): 483-499 (2019) - [j274]Jingting Xue, Chunxiang Xu, Jining Zhao, Jianfeng Ma:
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3): 32104:1-32104:16 (2019) - [j273]Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang:
Universally composable secure geographic area verification without pre-shared secret. Sci. China Inf. Sci. 62(3): 32113:1-32113:15 (2019) - [j272]Xuewen Dong, Feng Wu, Anter Faree, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. Comput. Secur. 87 (2019) - [j271]Hui Li, Jiangtao Cui, Xue Meng, Jianfeng Ma:
IHP: improving the utility in differential private histogram publication. Distributed Parallel Databases 37(4): 721-750 (2019) - [j270]Chen Liang, Qun Zhang, Jianfeng Ma, Kaiming Li:
Research on neural network chaotic encryption algorithm in wireless network security communication. EURASIP J. Wirel. Commun. Netw. 2019: 151 (2019) - [j269]Teng Li, Jianfeng Ma, Yulong Shen, Qingqi Pei:
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning. Entropy 21(8): 734 (2019) - [j268]Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma:
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 21(8): 753 (2019) - [j267]Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu:
Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model. IET Inf. Secur. 13(3): 167-173 (2019) - [j266]Qi Jiang, Yuanyuan Qian, Jianfeng Ma, XinDi Ma, Qingfeng Cheng, Fushan Wei:
User centric three-factor authentication protocol for cloud-assisted wearable devices. Int. J. Commun. Syst. 32(6) (2019) - [j265]Junwei Zhang, Wenxuan Cui, Jianfeng Ma, Chao Yang:
Blockchain-based secure and fair crowdsourcing scheme. Int. J. Distributed Sens. Networks 15(7) (2019) - [j264]Qi Jiang, Xiaohan Huang, Ning Zhang, Kuan Zhang, XinDi Ma, Jianfeng Ma:
Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices. IEEE Internet Things J. 6(3): 5618-5630 (2019) - [j263]Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren:
Lightweight Privacy-Preserving Ensemble Classification for Face Recognition. IEEE Internet Things J. 6(3): 5778-5790 (2019) - [j262]Ran Ding, Hong Zhong, Jianfeng Ma, Ximeng Liu, Jianting Ning:
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System. IEEE Internet Things J. 6(5): 8393-8405 (2019) - [j261]Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Feifei Li:
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices. IEEE Internet Things J. 6(5): 8406-8420 (2019) - [j260]Meixia Miao, Jianfeng Wang, Sheng Wen, Jianfeng Ma:
Publicly verifiable database scheme with efficient keyword search. Inf. Sci. 475: 18-28 (2019) - [j259]Xu An Wang, Jian Weng, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j258]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu:
Privacy-preserving and high-accurate outsourced disease predictor on random forest. Inf. Sci. 496: 225-241 (2019) - [j257]Tengfei Yang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Xuan Wang, Qian Meng:
PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data. Inf. Sci. 505: 198-214 (2019) - [j256]Tengfei Yang, Jianfeng Ma, Yinbin Miao, Xuan Wang, Bin Xiao, Bing He, Qian Meng:
Quaternion weighted spherical Bessel-Fourier moment and its invariant for color image reconstruction and object recognition. Inf. Sci. 505: 388-405 (2019) - [j255]Hui Li, Sizhe Peng, Jian Li, Jingjing Li, Jiangtao Cui, Jianfeng Ma:
Counting the frequency of time-constrained serial episodes in a streaming sequence. Inf. Sci. 505: 422-439 (2019) - [j254]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. J. Ambient Intell. Humaniz. Comput. 10(8): 3045-3057 (2019) - [j253]Baihe Ma, Zhihong Liu, Yong Zeng, Zhuo Ma, Hui Zhang, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. J. Inf. Sci. Eng. 35(5): 1029-1044 (2019) - [j252]Yan Gao, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Yang Liu, Yi-Kai Liu:
Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things. J. Inf. Sci. Eng. 35(5): 1113-1132 (2019) - [j251]Li Yang, Yifang Zhi, Teng Wei, Shui Yu, Jianfeng Ma:
Inference attack in Android Activity based on program fingerprint. J. Netw. Comput. Appl. 127: 92-106 (2019) - [j250]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Zhiheng Zheng:
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. J. Parallel Distributed Comput. 130: 153-165 (2019) - [j249]Paerhatijiang Sidike, Jianfeng Ma, Cong Sun:
一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries). 计算机科学 46(11A): 417-420 (2019) - [j248]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang, Hui Li:
Pruneable sharding-based blockchain protocol. Peer-to-Peer Netw. Appl. 12(4): 934-950 (2019) - [j247]Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. Secur. Commun. Networks 2019: 1694702:1-1694702:12 (2019) - [j246]Lei He, Jianfeng Ma, Ruo Mo, Dawei Wei:
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing. Secur. Commun. Networks 2019: 8583130:1-8583130:12 (2019) - [j245]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li:
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing. IEEE Trans. Serv. Comput. 12(5): 772-785 (2019) - [j244]Xuewen Dong, Tao Zhang, Di Lu, Guangxia Li, Yulong Shen, Jianfeng Ma:
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing. IEEE Trans. Veh. Technol. 68(9): 8881-8892 (2019) - [j243]Xinghua Li, Yunwei Wang, Pandi Vijayakumar, Debiao He, Neeraj Kumar, Jianfeng Ma:
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network. IEEE Trans. Veh. Technol. 68(11): 11309-11322 (2019) - [j242]Teng Li, Jianfeng Ma, Cong Sun:
SRDPV: secure route discovery and privacy-preserving verification in MANETs. Wirel. Networks 25(4): 1731-1747 (2019) - [c195]Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma:
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. ACISP 2019: 533-551 - [c194]Zhongyuan Jiang, Jianfeng Ma, Philip S. Yu:
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction. IEEE BigData 2019: 1381-1388 - [c193]Yuting Cheng, Li Yang, Shui Yu, Jianfeng Ma:
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation. CANS 2019: 392-411 - [c192]Yifang Zhi, Li Yang, Shui Yu, Jianfeng Ma:
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function. CSS (1) 2019: 73-88 - [c191]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. ESORICS (2) 2019: 134-150 - [c190]Teng Li, Jianfeng Ma, XinDi Ma, Chenyang Gao, He Wang, Chengyan Ma, Jing Yu, Di Lu, Jiawei Zhang:
Lightweight Secure Communication Mechanism Towards UAV Networks. GLOBECOM Workshops 2019: 1-6 - [c189]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c188]Zhuo Ma, Meng Zhao, Ximeng Liu, Chong Shen, Jianfeng Ma:
Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent. GLOBECOM 2019: 1-6 - [c187]Boyao Yu, Chao Yang, Jianfeng Ma:
Continuous Authentication for the Internet of Things Using Channel State Information. GLOBECOM 2019: 1-6 - [c186]Danni Yuan, Xiaoyan Zhu, Mingkui Wei, Jianfeng Ma:
Collaborative Deep Learning for Medical Image Analysis with Differential Privacy. GLOBECOM 2019: 1-6 - [c185]Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, Cong Sun:
Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks. ICC 2019: 1-6 - [c184]Shaobin Liu, Jianfeng Ma, Xiaoqin Feng:
Transparent Access and Integration of Heterogeneous Encrypted Database in Hybrid Cloud Environment. ICC 2019: 1-6 - [c183]Ximeng Liu, Tengfei Yang, Zhuoran Ma, Jianfeng Ma, Yinbin Miao:
Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation. ICC 2019: 1-6 - [c182]Mengfan Xu, Xinghua Li, Jianfeng Ma, Cheng Zhong, Weidong Yang:
Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network. ICC 2019: 1-6 - [c181]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, XinDi Ma, Jianfeng Ma:
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV. ICCC 2019: 195-200 - [c180]Shijia Mei, Zhihong Liu, Yong Zeng, Lin Yang, Jianfeng Ma:
Listen!: Audio-based Smart IoT Device Pairing Protocol. ICCT 2019: 391-397 - [c179]Qin Qiao, Xinghua Li, Yunwei Wang, Bin Luo, Yanbing Ren, Jianfeng Ma:
Credible Routing Scheme of SDN-Based Cloud Using Blockchain. ICPCSEE (1) 2019: 189-206 - [c178]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao:
Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key. INFOCOM 2019: 2485-2493 - [c177]Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019: 2494-2502 - [c176]Cong Sun, Jun Chen, Pengbin Feng, Jianfeng Ma:
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications. ML4CS 2019: 63-77 - [c175]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyan Yan, Qun Zhang, Xinghua Li, Teng Li:
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. ML4CS 2019: 123-139 - [c174]Jun Niu, Xiaoyan Zhu, Lei Shi, Jianfeng Ma:
Time-Aware Dummy-Based Privacy Protection for Continuous LBSs. NaNA 2019: 15-20 - [c173]Muyu Zhao, Xiaoyan Zhu, Jun Niu, Jianfeng Ma:
A Semantic-Based Dummy Generation Strategy for Location Privacy. NaNA 2019: 21-26 - [c172]Lin Yang, Zhihong Liu, Yong Zeng, Shijia Mei, Jianfeng Ma:
Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning. NaNA 2019: 58-63 - [c171]Longfei Wang, Yong Zeng, Yixin Li, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Research on Resolution Limit of Community Detection in Location-Based Social Networks. NaNA 2019: 90-95 - [c170]Lingjie Zhou, Yong Zeng, Yang Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Edge Weight Differential Privacy Based Spectral Query Algorithm. NaNA 2019: 259-267 - [c169]Mengli Liu, Yong Zeng, Yi-Kai Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Collective Influence Based Privacy Preservation for Social Networks. NaNA 2019: 282-289 - [c168]Jiawei Zhang, Jianfeng Ma, Zhuo Ma, Ning Lu, Yanbo Yang, Teng Li, Dawei Wei:
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health. NaNA 2019: 319-324 - [c167]Mingkang Zhang, Yanbiao Ma, Linan Zheng, Yuanyuan Wang, Zhihong Liu, Jianfeng Ma:
Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles. NaNA 2019: 338-343 - [c166]Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
A Topology Based Differential Privacy Scheme for Average Path Length Query. NaNA 2019: 350-355 - [c165]Huichuan Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method. NaNA 2019: 356-361 - [c164]Teng Li, Jianfeng Ma, Pengbin Feng, Yue Meng, XinDi Ma, Jiawei Zhang, Chenyang Gao, Di Lu:
Lightweight Security Authentication Mechanism Towards UAV Networks. NaNA 2019: 379-384 - [c163]Junshuai Sun, Jianfeng Ma, Jiao Quan, Xinghui Zhu, Chih-Lin I:
A Fuzzy String Matching Scheme Resistant to Statistical Attack. NaNA 2019: 396-402 - [c162]Li Yang, Jiaxue Wang, Huihui Guo, Jianfeng Ma:
An Automatic Crisis Information Recognition Model Based on BP Neural Network. NaNA 2019: 446-451 - [c161]Chenyang Gao, Jianfeng Ma, Yulong Shen, Teng Li, Fei Li, Yuelin Gao:
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm. NaNA 2019: 458-463 - [c160]Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma:
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration. NSS 2019: 520-535 - [c159]Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv:
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. TrustCom/BigDataSE 2019: 200-207 - [c158]Yaoru Mao, Xiaoyan Zhu, Wenbin Zheng, Danni Yuan, Jianfeng Ma:
A Novel User Membership Leakage Attack in Collaborative Deep Learning. WCSP 2019: 1-6 - [c157]Linjie Zhang, Xiaoyan Zhu, Xuexue Han, Jianfeng Ma:
Differentially Privacy-preserving Social IoT. WCSP 2019: 1-6 - [i14]Zhihong Liu, Jiajia Liu, Yong Zeng, Zhuo Ma, Jianfeng Ma, Qiping Huang:
Challenges in Covert Wireless Communications with Active Warden on AWGN channels. CoRR abs/1901.03185 (2019) - [i13]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty. CoRR abs/1909.12752 (2019) - 2018
- [j241]Jingjing Guo, Jianfeng Ma, Xinghua Li, Tao Zhang, Zhiquan Liu:
A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication. IEEE Access 6: 4375-4386 (2018) - [j240]Jinku Li, Yangtian Ye, Yajin Zhou, Jianfeng Ma:
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages. IEEE Access 6: 10107-10120 (2018) - [j239]Yanguo Peng, Hui Li, Jiangtao Cui, Jianfeng Ma, Yingfan Liu:
Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data. IEEE Access 6: 23137-23151 (2018) - [j238]Pengbin Feng, Jianfeng Ma, Cong Sun, Xinpeng Xu, Yuwan Ma:
A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access 6: 30996-31011 (2018) - [j237]Tengfei Yang, Jianfeng Ma, Qian Wang, Yinbin Miao, Xuan Wang, Qian Meng:
Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments. IEEE Access 6: 47521-47534 (2018) - [j236]Cong Sun, Jiao Liu, Yinjuan Jie, Yuwan Ma, Jianfeng Ma:
Ridra: A Rigorous Decentralized Randomized Authentication in VANETs. IEEE Access 6: 50358-50371 (2018) - [j235]Xiaoqin Feng, Jianfeng Ma, Tao Feng, Yinbin Miao, Ximeng Liu:
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network. IEEE Access 6: 52248-52260 (2018) - [j234]Liumei Zhang, Jianfeng Ma, Tianshi Liu, Yichuan Wang, Di Lu:
AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud. Comput. Informatics 37(2): 291-310 (2018) - [j233]Yinbin Miao, Jianfeng Ma, Qi Jiang, Xiong Li, Arun Kumar Sangaiah:
Verifiable keyword search over encrypted cloud data in smart city. Comput. Electr. Eng. 65: 90-101 (2018) - [j232]Linbo Luo, Cheng Chai, Jianfeng Ma, Suiping Zhou, Wentong Cai:
ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation. Comput. Graph. Forum 37(1): 375-388 (2018) - [j231]Kai Zhang, Hui Li, Jianfeng Ma, Ximeng Liu:
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci. China Inf. Sci. 61(3): 32102 (2018) - [j230]Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma:
SADUS: Secure data deletion in user space for mobile devices. Comput. Secur. 77: 612-626 (2018) - [j229]Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen:
Information flow control on encrypted data for service composition among multiple clouds. Distributed Parallel Databases 36(3): 511-527 (2018) - [j228]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Gener. Comput. Syst. 79: 82-94 (2018) - [j227]Hui Lin, Jia Hu, Chuanfeng Xu, Jianfeng Ma, Mengyang Yu:
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing. Future Gener. Comput. Syst. 83: 293-302 (2018) - [j226]Yinbin Miao, Jianfeng Ma, Fushan Wei, Kai Zhang, Zhiquan Liu:
VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner. Int. J. High Perform. Comput. Netw. 12(1): 39-48 (2018) - [j225]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Leonard Barolli, Yunlong Ge:
PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1): 44-69 (2018) - [j224]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Zhiquan Liu, Hui Li:
Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing. IEEE Internet Things J. 5(4): 3008-3018 (2018) - [j223]Hui Li, Ke Deng, Jiangtao Cui, Zhenhua Dong, Jianfeng Ma, Jianbin Huang:
Hidden community identification in location-based social network via probabilistic venue sequences. Inf. Sci. 422: 188-203 (2018) - [j222]Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma:
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput. 9(4): 1061-1073 (2018) - [j221]Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. J. Inf. Sci. Eng. 34(4): 943-960 (2018) - [j220]Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Hi-Hong Liu, Jianfeng Ma:
Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones. J. Inf. Sci. Eng. 34(4): 961-976 (2018) - [j219]Yaxian Ji, Junwei Zhang, Jianfeng Ma, Chao Yang, Xin Yao:
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J. Medical Syst. 42(8): 147:1-147:13 (2018) - [j218]Li Yang, Ziyi Han, Zhengan Huang, Jianfeng Ma:
A remotely keyed file encryption scheme under mobile cloud computing. J. Netw. Comput. Appl. 106: 90-99 (2018) - [j217]Qi Jiang, Jianbing Ni, Jianfeng Ma, Li Yang, Xuemin Shen:
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing. IEEE Netw. 32(3): 28-35 (2018) - [j216]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei:
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw. Appl. 11(2): 287-297 (2018) - [j215]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei:
DOAS: Efficient data owner authorized search over encrypted cloud data. Peer-to-Peer Netw. Appl. 11(3): 349-360 (2018) - [j214]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. Peer-to-Peer Netw. Appl. 11(3): 473-485 (2018) - [j213]Jingjing Guo, Jianfeng Ma, Xinxin Guo, Xinghua Li, Junwei Zhang, Tao Zhang:
Trust-based service composition and selection in service oriented architecture. Peer-to-Peer Netw. Appl. 11(5): 862-880 (2018) - [j212]Ruo Mo, Jianfeng Ma, Ximeng Liu, Hai Liu:
EOABS: expressive outsourced attribute-based signature. Peer-to-Peer Netw. Appl. 11(5): 979-988 (2018) - [j211]Zhuo Ma, Xinglong Wang, Rui Ma, Zhuzhu Wang, Jianfeng Ma:
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept. Sensors 18(9): 2894 (2018) - [j210]Qi Jiang, Jianfeng Ma, Fushan Wei:
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 2039-2042 (2018) - [j209]Li Yang, Yafeng Qiao, Zhihong Liu, Jianfeng Ma, Xinghua Li:
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Comput. 22(2): 453-464 (2018) - [j208]Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. IEEE Trans. Inf. Forensics Secur. 13(2): 511-520 (2018) - [j207]Jinku Li, Xiaomeng Tong, Fengwei Zhang, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. IEEE Trans. Inf. Forensics Secur. 13(6): 1535-1550 (2018) - [j206]Teng Li, Jianfeng Ma, Cong Sun:
Dlog: diagnosing router events with syslogs for anomaly detection. J. Supercomput. 74(2): 845-867 (2018) - [j205]Xuewen Dong, Yanmin Gong, Jianfeng Ma, Yuanxiong Guo:
Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks. IEEE Trans. Veh. Technol. 67(7): 6561-6572 (2018) - [j204]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Covert Wireless Communications in IoT Systems: Hiding Information in Interference. IEEE Wirel. Commun. 25(6): 46-52 (2018) - [j203]Qi Gao, Junwei Zhang, Jianfeng Ma, Chao Yang, Jingjing Guo, Yinbin Miao:
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 9436120:1-9436120:14 (2018) - [j202]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) - [c156]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA 2018: 240-246 - [c155]Xiaoyan Zhu, Linjie Zhang, Yizhe Huang, Baoming Bai, Jianfeng Ma:
TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs. APSIPA 2018: 266-271 - [c154]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang:
Inference Attack in Android Activity based on Program Fingerprint. CNS 2018: 1-9 - [c153]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma, Qiping Huang:
On Covert Communication with Interference Uncertainty. ICC 2018: 1-6 - [c152]Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - [c151]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. INFOCOM Workshops 2018: 1-2 - [c150]Xiangyu Wang, Jianfeng Ma, Yinbin Miao, Ruikang Yang, Yijia Chang:
EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System. INFOCOM 2018: 819-827 - [c149]Baihe Ma, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. NaNA 2018: 14-21 - [c148]Yan Gao, Yong Zeng, Zhihong Liu, Jianfeng Ma, Yeqiu Xiao:
Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network. NaNA 2018: 74-79 - [c147]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. NaNA 2018: 206-211 - [c146]Yao Guo, Zhihong Liu, Yong Zeng, Ruiheng Wang, Jianfeng Ma:
Preserving Privacy for Hubs and Links in Social Networks. NaNA 2018: 263-269 - [c145]Pengfei Song, Yong Zeng, Zhihong Liu, Jianfeng Ma, Huichuan Liu:
True Random Number Generation Using Process Scheduling of Android Systems. NaNA 2018: 304-309 - [i12]Hui Li, Sizhe Peng, Jian Li, Jingjing Li, Jiangtao Cui, Jianfeng Ma:
ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence. CoRR abs/1801.09639 (2018) - [i11]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma, Qiping Huang:
Covert Wireless Communications with Active Eavesdropper on AWGN Channels. CoRR abs/1805.06182 (2018) - 2017
- [j201]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j200]Xinghua Li, Jiajia Liu, Qingsong Yao, Jianfeng Ma:
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks. IEEE Access 5: 5281-5291 (2017) - [j199]Di Lu, Jianfeng Ma, Cong Sun, Qixuan Wu, Zhaochang Sun, Ning Xi:
Building a Secure Scheme for a Trusted Hardware Sharing Environment. IEEE Access 5: 20260-20271 (2017) - [j198]Cong Sun, Jiao Liu, Xinpeng Xu, Jianfeng Ma:
A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access 5: 24012-24022 (2017) - [j197]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Zhengxin Yu:
A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems. IEEE Access 5: 27679-27690 (2017) - [j196]Qi Jiang, Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen, Shehzad Ashraf Chaudhry:
Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017) - [j195]Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi:
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing. Sci. China Inf. Sci. 60(5): 52103:1-52103:17 (2017) - [j194]Yanguo Peng, Hui Li, Jiangtao Cui, Junwei Zhang, Jianfeng Ma, Changgen Peng:
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6): 62101 (2017) - [j193]Fushan Wei, Jianfeng Ma, Ruijie Zhang, Chuangui Ma, Xu An Wang:
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model. Sci. China Inf. Sci. 60(7): 72103 (2017) - [j192]Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Yinbin Miao:
FCT: a fully-distributed context-aware trust model for location based service recommendation. Sci. China Inf. Sci. 60(8): 082102:1-082102:16 (2017) - [j191]Hai Liu, Xinghua Li, Jianfeng Ma, Mengfan Xu, Jingjing Guo:
Reconstruction methodology for rational secret sharing based on mechanism design. Sci. China Inf. Sci. 60(8): 088101:1-088101:3 (2017) - [j190]XinDi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao, Ning Xi, Di Lu:
APPLET: a privacy-preserving framework for location-aware recommender system. Sci. China Inf. Sci. 60(9): 92101 (2017) - [j189]Teng Li, Jianfeng Ma, Cong Sun:
NetPro: detecting attacks in MANET routing with provenance and verification. Sci. China Inf. Sci. 60(11): 118101 (2017) - [j188]Sheng Gao, XinDi Ma, Jianming Zhu, Jianfeng Ma:
APRS: a privacy-preserving location-aware recommender system based on differentially private histogram. Sci. China Inf. Sci. 60(11): 119103:1-119103:3 (2017) - [j187]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu:
VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings. Sci. China Inf. Sci. 60(12): 122105:1-122105:15 (2017) - [j186]Li Yang, Yaping Tian, Jin Li, Jianfeng Ma, Junwei Zhang:
Identifying opinion leaders in social networks with topic limitation. Clust. Comput. 20(3): 2403-2413 (2017) - [j185]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo:
Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Gener. Comput. Syst. 67: 242-254 (2017) - [j184]Qingfeng Cheng, Siqi Lu, Jianfeng Ma:
Analysis and improvement of the Internet-Draft IKEv3 protocol. Int. J. Commun. Syst. 30(9) (2017) - [j183]Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma:
An efficient revocable ID-based encryption scheme in the standard model. Int. J. Embed. Syst. 9(2): 168-176 (2017) - [j182]Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen K. Chilamkurti:
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 27(3) (2017) - [j181]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Yunfei Cao, Dianhua Tang:
Reusable garbled gates for new fully homomorphic encryption service. Int. J. Web Grid Serv. 13(1): 25-48 (2017) - [j180]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Int. J. Web Grid Serv. 13(3): 246-269 (2017) - [j179]Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei, Meixia Miao:
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks. IEEE Internet Things J. 4(2): 546-554 (2017) - [j178]Linbo Luo, Xiangting Hou, Jinghui Zhong, Wentong Cai, Jianfeng Ma:
Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems. Inf. Sci. 382-383: 216-233 (2017) - [j177]Yanguo Peng, Jiangtao Cui, Hui Li, Jianfeng Ma:
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Inf. Sci. 387: 146-164 (2017) - [j176]Hai Liu, Xinghua Li, Mengfan Xu, Ruo Mo, Jianfeng Ma:
A fair data access control towards rational users in cloud storage. Inf. Sci. 418: 258-271 (2017) - [j175]Wenbo Wang, Qingfeng Cheng, Siqi Lu, Jianfeng Ma:
A Multi-Party Secret Handshake Scheme Based on Chaotic Maps. Inf. Technol. Control. 46(1): 138-149 (2017) - [j174]Meixia Miao, Jianfeng Wang, Jianfeng Ma, Willy Susilo:
Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86: 49-58 (2017) - [j173]Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. J. Inf. Sci. Eng. 33(4): 1007-1023 (2017) - [j172]Qingfeng Cheng, Xinglong Zhang, Jianfeng Ma:
ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment. J. Medical Syst. 41(3): 44:1-44:14 (2017) - [j171]Pengbin Feng, Jianfeng Ma, Cong Sun:
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection. Mob. Inf. Syst. 2017: 7397812:1-7397812:16 (2017) - [j170]Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:
Distributed Secure Service Composition with Declassification in Mobile Clouds. Mob. Inf. Syst. 2017: 7469342:1-7469342:13 (2017) - [j169]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu:
VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob. Comput. 40: 205-219 (2017) - [j168]Chao Yang, Min Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - [j167]Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Netw. Appl. 10(4): 995-1007 (2017) - [j166]Tian-Yin Wang, Jian-Feng Ma, Xiao-Qiu Cai:
The postprocessing of quantum digital signatures. Quantum Inf. Process. 16(1): 19 (2017) - [j165]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. Secur. Commun. Networks 2017: 6430850:1-6430850:11 (2017) - [j164]Xinghua Li, Meixia Miao, Hai Liu, Jianfeng Ma, Kuan-Ching Li:
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. 21(14): 3907-3917 (2017) - [j163]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j162]Jiahao Dai, Jiajia Liu, Yongpeng Shi, Shubin Zhang, Jianfeng Ma:
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks. IEEE Trans. Veh. Technol. 66(8): 6633-6644 (2017) - [c144]Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, Jianfeng Ma:
Multi-hop Based Centrality of a Path in Complex Network. CIS 2017: 292-296 - [c143]Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
A Survey of Network Reconstruction on Social Network. CIS 2017: 297-301 - [c142]Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
Centrality Based Privacy Preserving for Weighted Social Networks. CIS 2017: 574-577 - [c141]Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma:
Data-Oriented Instrumentation against Information Leakages of Android Applications. COMPSAC (2) 2017: 485-490 - [c140]Cong Sun, Ning Xi, Jianfeng Ma:
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. COMPSAC (1) 2017: 586-595 - [c139]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. CSS 2017: 148-162 - [c138]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - [c137]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. ICDCS 2017: 414-424 - [c136]Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li:
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. ICICS 2017: 39-50 - [c135]Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. INFOCOM 2017: 1-9 - [c134]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Jianfeng Ma, Yang Xiang:
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization. ISPA/IUCC 2017: 1212-1216 - [c133]XinDi Ma, Jianfeng Ma, Sheng Gao, Qingsong Yao:
APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices. MSN 2017: 377-390 - [c132]Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA 2017: 5-10 - [c131]Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Zhihong Liu, Jianfeng Ma:
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence. NaNA 2017: 158-163 - [c130]Cong Sun, Qingsong Yao, Jianfeng Ma:
Certia: Certifying Interface Automata for Cyber-Physical Systems. SMARTCOMP 2017: 1-3 - [i10]Hui Li, Sourav S. Bhowmick, Jiangtao Cui, Jianfeng Ma:
Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization. CoRR abs/1705.10977 (2017) - [i9]Zhihong Liu, Jiajia Liu, Yong Zeng, Li Yang, Jianfeng Ma:
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty. CoRR abs/1712.05099 (2017) - 2016
- [j161]Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei:
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56: 871-883 (2016) - [j160]Zuobin Ying, Hui Li, Jianfeng Ma, Junwei Zhang, Jiangtao Cui:
Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci. China Inf. Sci. 59(4): 042701:1-042701:16 (2016) - [j159]Kai Zhang, Jianfeng Ma, Jiajia Liu, Hui Li:
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci. China Inf. Sci. 59(9): 99105 (2016) - [j158]Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Clust. Comput. 19(2): 647-662 (2016) - [j157]Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:
Secure, efficient and revocable multi-authority access control system in cloud storage. Comput. Secur. 59: 45-59 (2016) - [j156]Yinbin Miao, Jianfeng Ma, Zhiquan Liu:
Revocable and anonymous searchable encryption in multi-user setting. Concurr. Comput. Pract. Exp. 28(4): 1204-1218 (2016) - [j155]Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma:
DALP: A demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4): 1219-1236 (2016) - [j154]Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Haiyong Bao:
Efficient and privacy-preserving skyline computation framework across domains. Future Gener. Comput. Syst. 62: 161-174 (2016) - [j153]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
Improved algorithm for secure outsourcing of modular exponentiations with high checkability. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 182-191 (2016) - [j152]Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang:
Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int. J. Grid Util. Comput. 7(1): 1-11 (2016) - [j151]Hui Li, Jiangtao Cui, Bingqing Shen, Jianfeng Ma:
An intelligent movie recommendation system through group-level sentiment analysis in microblogs. Neurocomputing 210: 164-173 (2016) - [j150]Fushan Wei, Jianfeng Ma, Qi Jiang, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Inf. Technol. Control. 45(1): 62-70 (2016) - [j149]Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Yinbin Miao:
LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment. KSII Trans. Internet Inf. Syst. 10(2): 914-934 (2016) - [j148]Cong Sun, Jianfeng Ma, Qingsong Yao:
On the architecture and development life cycle of secure cyber-physical systems. J. Commun. Inf. Networks 1(4): 1-21 (2016) - [j147]Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang:
Position based key exchange: defnitions and implementations. J. Commun. Inf. Networks 1(4): 33-43 (2016) - [j146]Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J. Medical Syst. 40(11): 231:1-231:10 (2016) - [j145]Limin Shen, Jianfeng Ma, Ximeng Liu, Meixia Miao:
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks. J. Medical Syst. 40(11): 244:1-244:10 (2016) - [j144]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Fushan Wei, Zhiquan Liu, Xu An Wang:
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting. J. Medical Syst. 40(11): 246:1-246:12 (2016) - [j143]Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76: 37-48 (2016) - [j142]Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Hui Zhu, Yinbin Miao:
LSOT: A Lightweight Self-Organized Trust Model in VANETs. Mob. Inf. Syst. 2016: 7628231:1-7628231:15 (2016) - [j141]Jiajia Liu, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jammer Placement for Physical Layer Security Enhancement. IEEE Netw. 30(6): 56-61 (2016) - [j140]Shuai Fu, Jianfeng Ma, Hongtao Li, Qi Jiang:
A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. Secur. Commun. Networks 9(15): 2779-2788 (2016) - [j139]Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:
Dynamic game model of botnet DDoS attack and defense. Secur. Commun. Networks 9(16): 3127-3140 (2016) - [j138]Yinbin Miao, Jiajia Liu, Jianfeng Ma:
Efficient keyword search over encrypted data in multi-cloud setting. Secur. Commun. Networks 9(16): 3808-3820 (2016) - [j137]Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma:
A new method to deduce counterexamples in secure routing protocols based on strand space model. Secur. Commun. Networks 9(18): 5834-5848 (2016) - [j136]Pengbin Feng, Cong Sun, Jianfeng Ma:
Measuring the risk value of sensitive dataflow path in Android applications. Secur. Commun. Networks 9(18): 5918-5933 (2016) - [j135]Tao Jiang, Xiaofeng Chen, Jianfeng Ma:
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation. IEEE Trans. Computers 65(8): 2363-2373 (2016) - [j134]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [j133]Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma:
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains. IEEE Trans. Computers 65(12): 3567-3579 (2016) - [j132]Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Baodong Qin:
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification. IEEE J. Biomed. Health Informatics 20(2): 655-668 (2016) - [j131]Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016) - [c129]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c128]Hui Li, Jiangtao Cui, Xiaobin Lin, Jianfeng Ma:
Improving the utility in differential private histogram publishing: Theoretical study and practice. IEEE BigData 2016: 1100-1109 - [c127]Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805 - [c126]Qi Jiang, Bingyan Li, Jianfeng Ma:
On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. BWCCA 2016: 879-884 - [c125]Linbo Luo, Cheng Chai, Suiping Zhou, Jianfeng Ma:
Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation. CASA 2016: 37-43 - [c124]Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang:
On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations. ICC 2016: 1-6 - [c123]Qi Jiang, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing. ICCCS (1) 2016: 311-321 - [c122]Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang:
Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity. INFOCOM 2016: 1-9 - [c121]Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li:
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC@MobiHoc 2016: 23-28 - [c120]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:
Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259 - [c119]Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma:
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control. SAC 2016: 2202-2209 - 2015
- [j130]Chao Yang, Jianfeng Ma, Jian Ren:
Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc Sens. Wirel. Networks 26(1-4): 43-72 (2015) - [j129]Hongtao Li, Jianfeng Ma, Shuai Fu:
A privacy-preserving data collection model for digital community. Sci. China Inf. Sci. 58(3): 1-16 (2015) - [j128]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015) - [j127]Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li:
Survey on cyberspace security. Sci. China Inf. Sci. 58(11): 1-43 (2015) - [j126]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang:
Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11): 1-15 (2015) - [j125]Cong Gao, Jianfeng Ma, Zhiquan Liu, XinDi Ma:
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information. Sci. China Inf. Sci. 58(12): 1-14 (2015) - [j124]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. Comput. J. 58(4): 656-667 (2015) - [j123]Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang:
A delegation based cross trusted domain direct anonymous attestation scheme. Comput. Networks 81: 245-257 (2015) - [j122]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:
Stability analysis of an e-SEIAR model with point-to-group worm propagation. Commun. Nonlinear Sci. Numer. Simul. 20(3): 897-904 (2015) - [j121]Jiajia Liu, Nei Kato, Jianfeng Ma, Naoto Kadowaki:
Device-to-Device Communication in LTE-Advanced Networks: A Survey. IEEE Commun. Surv. Tutorials 17(4): 1923-1940 (2015) - [j120]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen:
Secure service composition with information flow control in service clouds. Future Gener. Comput. Syst. 49: 142-148 (2015) - [j119]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j118]Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li:
Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2): 383-393 (2015) - [j117]Qi Jiang, Jianfeng Ma, Youliang Tian:
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int. J. Commun. Syst. 28(7): 1340-1351 (2015) - [j116]Weigang Ma, Cao Yuan, Wei Wei, Xinhong Hei, Jian-Feng Ma:
Energy-Efficient Collaborative Communication for Optimization Cluster Heads Selection Based on Genetic Algorithms in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 396121:1-396121:10 (2015) - [j115]Cong Gao, Jianfeng Ma, Shangwei Zhang:
A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment. Int. J. Distributed Sens. Networks 11: 456146:1-456146:21 (2015) - [j114]Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li:
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. Int. J. Embed. Syst. 7(3/4): 257-265 (2015) - [j113]Tianwei Che, Jianfeng Ma, Na Li, Chao Wang:
A Security Quantitative Analysis Method For Access Control Based on Security Entropy. Int. J. Netw. Secur. 17(5): 517-521 (2015) - [j112]Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma:
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. Inf. Technol. Control. 44(2): 195-206 (2015) - [j111]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. J. Ambient Intell. Humaniz. Comput. 6(6): 699-711 (2015) - [j110]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. J. Comput. Secur. 23(6): 659-683 (2015) - [j109]Hui Li, Jiangtao Cui, Jian-Feng Ma:
Social Influence Study in Online Networks: A Three-Level Review. J. Comput. Sci. Technol. 30(1): 184-199 (2015) - [j108]Bin Xiao, Gang Lu, Guoyin Wang, Jianfeng Ma:
基于离散Hermite多项式的图像压缩 (Image Compression Based on Discrete Hermite Polynomials). 计算机科学 42(Z11): 140-141 (2015) - [j107]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Attribute Based Multisignature Scheme for Wireless Communications. Mob. Inf. Syst. 2015: 827320:1-827320:11 (2015) - [j106]Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw. Appl. 8(6): 1025-1037 (2015) - [j105]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6): 1070-1081 (2015) - [j104]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Large universe decentralized key-policy attribute-based encryption. Secur. Commun. Networks 8(3): 501-509 (2015) - [j103]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of files in deduplication cloud storage. Secur. Commun. Networks 8(14): 2457-2468 (2015) - [j102]Junwei Zhang, Jianfeng Ma, Chao Yang:
Protocol Derivation System for the Needham-Schroeder family. Secur. Commun. Networks 8(16): 2687-2703 (2015) - [j101]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur. Commun. Networks 8(18): 4098-4109 (2015) - [j100]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei:
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Comput. Collect. Intell. 19: 69-88 (2015) - [j99]Xu An Wang, Jianfeng Ma, Yinbin Miao, Kai Zhang:
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles. Trans. Comput. Collect. Intell. 19: 126-139 (2015) - [j98]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j97]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j96]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j95]Jiajia Liu, Nei Kato, Jianfeng Ma, Toshikazu Sakano:
Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility. IEEE Trans. Wirel. Commun. 14(3): 1266-1279 (2015) - [j94]Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan:
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Wirel. Commun. Mob. Comput. 15(1): 155-169 (2015) - [c118]Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Another Look at Ciphertext Updating Algorithms for Cloud Storage. 3PGCIC 2015: 424-429 - [c117]Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. 3PGCIC 2015: 444-448 - [c116]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. AINA Workshops 2015: 73-76 - [c115]Xinghua Li, Hai Liu, Fushan Wei, Jianfeng Ma, Weidong Yang:
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. GLOBECOM 2015: 1-6 - [c114]Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462 - [c113]Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma:
Continuous Context-Aware Device Comfort Evaluation Method. IFIPTM 2015: 203-211 - [c112]Jindan Zhang, Xu An Wang, Jianfeng Ma:
Data Owner Based Attribute Based Encryption. INCoS 2015: 144-148 - [c111]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model. INCoS 2015: 379-383 - [c110]Meixia Miao, Jianfeng Wang, Jianfeng Ma:
New Publicly Verifiable Databases Supporting Insertion Operation. NBiS 2015: 640-642 - [c109]Hui Li, Sourav S. Bhowmick, Jiangtao Cui, Yunjun Gao, Jianfeng Ma:
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks. SIGMOD Conference 2015: 1525-1537 - [c108]Yinbin Miao, Jiajia Liu, Jianfeng Ma:
Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds. WASA 2015: 407-416 - 2014
- [j93]Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun:
Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9): 1-16 (2014) - [j92]Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j91]Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang:
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Clust. Comput. 17(4): 1369-1381 (2014) - [j90]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j89]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu:
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. IET Inf. Secur. 8(4): 217-223 (2014) - [j88]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu:
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. Int. J. Netw. Secur. 16(6): 437-443 (2014) - [j87]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Efficient attribute based sequential aggregate signature for wireless sensor networks. Int. J. Sens. Networks 16(3): 172-184 (2014) - [j86]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma:
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud. KSII Trans. Internet Inf. Syst. 8(1): 282-304 (2014) - [j85]Fangwei Wang, Fang Yang, Yunkai Zhang, Jianfeng Ma:
Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms. J. Comput. 9(10): 2420-2427 (2014) - [j84]Tianwei Che, Jianfeng Ma, Na Li, Chao Wang:
Access Control Capability Assessment Method Based on Security Entropy. J. Comput. 9(12): 2804-2808 (2014) - [j83]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma:
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. J. Inf. Sci. Eng. 30(3): 875-893 (2014) - [j82]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(2): 12 (2014) - [j81]Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li:
Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38: 125-134 (2014) - [j80]Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. J. Softw. 9(1): 190-194 (2014) - [j79]Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen:
A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Trans. Cloud Comput. 2(4): 448-458 (2014) - [j78]Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma:
FLAP: An Efficient WLAN Initial Access Authentication Protocol. IEEE Trans. Parallel Distributed Syst. 25(2): 488-497 (2014) - [j77]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [j76]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Atulya Nagar:
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks. Wirel. Pers. Commun. 75(3): 1611-1633 (2014) - [j75]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wirel. Pers. Commun. 77(2): 1489-1506 (2014) - [c107]Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma:
Verifying Secure Interface Composition for Component-Based System Designs. APSEC (1) 2014: 359-366 - [c106]Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. CIS 2014: 603-607 - [c105]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - [c104]Ximeng Liu, Hui Zhu, Jianfeng Ma, Jun Ma, Siqi Ma:
Key-Policy Weighted Attribute based Encryption for fine-grained access control. ICC Workshops 2014: 694-699 - [c103]Xinghua Li, Lingjuan Deng, Sheng Gao, Jianfeng Ma, Qingsong Yao:
A demand-aware location privacy protection scheme in continuous location-based services. ICCVE 2014: 112-117 - [c102]Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma:
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621 - [c101]Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong:
Trustworthy Service Composition in Service-Oriented Mobile Social Networks. ICWS 2014: 684-687 - [c100]Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang:
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. INFOCOM 2014: 2768-2776 - [c99]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c98]Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao:
Multi-domain Direct Anonymous Attestation Scheme from Pairings. NSS 2014: 566-573 - 2013
- [j74]Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme. IET Inf. Secur. 7(2) (2013) - [j73]Shuai Fu, Jianfeng Ma, Hongtao Li, Changguang Wang:
Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j72]Yuanbo Guo, Jianfeng Ma, Chao Wang, Kuiwu Yang:
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes. Int. J. Distributed Sens. Networks 9 (2013) - [j71]Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang:
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. Int. J. Distributed Sens. Networks 9 (2013) - [j70]Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu, Shan Chang, Jianfeng Ma:
MAP: Towards Authentication for Multiple Tags. Int. J. Distributed Sens. Networks 9 (2013) - [j69]Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu:
Access control requirements for structured document in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 95-102 (2013) - [j68]Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang:
A rational framework for secure communication. Inf. Sci. 250: 215-226 (2013) - [j67]Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:
An Improved Password-Based Remote User Authentication Protocol without Smart Cards. Inf. Technol. Control. 42(2): 113-123 (2013) - [j66]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
Constructing Verifiable Random Number in Finite Field. J. Internet Serv. Inf. Secur. 3(3/4): 106-115 (2013) - [j65]Qi Jiang, Jianfeng Ma, Zhuo Ma, Guangsong Li:
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(1): 9897 (2013) - [j64]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:
An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1): 498-503 (2013) - [j63]Cong Gao, Jianfeng Ma:
A Collaborative QoS-Aware Service Evaluation Method for Service Selection. J. Networks 8(6): 1370-1379 (2013) - [j62]Xinghua Li, Xiang Lu, Jianfeng Ma:
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. Smart Comput. Rev. 3(3): 174-189 (2013) - [j61]Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun:
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. IEEE Trans. Inf. Forensics Secur. 8(6): 874-887 (2013) - [j60]Xiang Lu, Wenye Wang, Jianfeng Ma:
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation. IEEE Trans. Smart Grid 4(1): 170-183 (2013) - [j59]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 68(4): 1477-1491 (2013) - [c97]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang:
PRAM: privacy preserving access management scheme in cloud services. SCC@ASIACCS 2013: 41-46 - [c96]Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang:
Attribute Based Multi-signature Scheme in the Standard Model. CIS 2013: 738-742 - [c95]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609 - [c94]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700 - [c93]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme: An ABE Approach. HPCC/EUC 2013: 59-64 - [c92]Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi:
Service Composition in Multi-domain Environment under Time Constraint. ICWS 2013: 227-234 - [c91]Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang:
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments. ICWS 2013: 563-570 - [c90]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li:
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing. IDCS 2013: 238-251 - [c89]Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8 - [c88]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma:
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. INCoS 2013: 51-57 - [c87]Liumei Zhang, Jianfeng Ma, Yichuan Wang:
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese. INCoS 2013: 69-76 - [c86]Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92 - [c85]Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai:
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network. INCoS 2013: 173-180 - [c84]Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu:
Fully Secure Decentralized Key-Policy Attribute-Based Encryption. INCoS 2013: 220-225 - [c83]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme with Identity Based Encryption. INCoS 2013: 239-243 - [c82]Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong:
Fault and Intrusion Tolerance of Complex Networks: A Controllability View. INCoS 2013: 516-520 - [c81]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. ITCS 2013: 397-406 - [c80]Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun:
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617 - [c79]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Flexible relay selection for secure communication in two-hop wireless networks. WiOpt 2013: 648-651 - [i8]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1301.1746 (2013) - 2012
- [j58]Xuan Wang, Fang-xia Guo, Jian-Feng Ma:
User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digit. Signal Process. 22(5): 707-712 (2012) - [j57]Hui Lin, Jianfeng Ma, Jia Hu, Kai Yang:
PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2012: 69 (2012) - [j56]Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang:
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. Trans. Emerg. Telecommun. Technol. 23(7): 618-624 (2012) - [j55]Zhihong Liu, Jianfeng Ma, Yong Zeng, Yang Li, YoungHo Park:
Secrecy Transfer. Int. J. Distributed Sens. Networks 8 (2012) - [j54]Xiang Lu, Wenye Wang, Jianfeng Ma:
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems. Int. J. Distributed Sens. Networks 8 (2012) - [j53]Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma:
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j52]Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma:
A method for efficient parallel computation of Tate pairing. Int. J. Grid Util. Comput. 3(1): 43-52 (2012) - [j51]Youliang Tian, Changgen Peng, Jianfeng Ma:
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. Int. J. Netw. Secur. 14(3): 142-148 (2012) - [j50]Li Yang, Jianfeng Ma, Qi Jiang:
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. Int. J. Netw. Secur. 14(3): 156-163 (2012) - [j49]Chao Lv, Hui Li, Jianfeng Ma, Ben Niu:
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. Int. J. Radio Freq. Identif. Technol. Appl. 4(1): 3-12 (2012) - [j48]Bin Xiao, Jian-Feng Ma, Jiangtao Cui:
Radial Tchebichef moment invariants for image recognition. J. Vis. Commun. Image Represent. 23(2): 381-386 (2012) - [j47]Bin Xiao, Jian-Feng Ma, Jiangtao Cui:
Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms. Pattern Recognit. 45(1): 314-321 (2012) - [j46]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
A security enhanced authentication and key distribution protocol for wireless networks. Secur. Commun. Networks 5(4): 343-352 (2012) - [j45]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
Security enhancement of the communication-efficient AUTHMAC_DH protocols. Secur. Commun. Networks 5(6): 674-680 (2012) - [j44]Zhihong Liu, Jianfeng Ma, Youngho Park, Shangrong Xiang:
Data security in unattended wireless sensor networks with mobile sinks. Wirel. Commun. Mob. Comput. 12(13): 1131-1146 (2012) - [c78]Cong Sun, Sheng Gao, Jianfeng Ma:
Verifying Location-Based Services with Declassification Enforcement. APWeb 2012: 695-702 - [c77]Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu:
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. CIS 2012: 683-686 - [c76]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556 - [c75]Shichao Wang, Ruonan Zhang, Jianfeng Ma, Lin Cai:
A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field. GLOBECOM 2012: 225-231 - [c74]Xinghua Li, Jianfeng Ma, Yulong Shen:
An efficient WLAN initial access authentication protocol. GLOBECOM 2012: 1035-1040 - [c73]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu:
The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. INCoS 2012: 185-192 - [c72]Li Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng:
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation. INCoS 2012: 279-285 - [c71]Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang:
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. TrustCom 2012: 303-309 - [i7]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1211.7075 (2012) - [i6]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks. CoRR abs/1212.0287 (2012) - [i5]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System. CoRR abs/1212.6627 (2012) - 2011
- [j43]Xinghua Li, Jianfeng Ma, YoungHo Park, Li Xu:
A USIM-Based Uniform Access Authentication Framework in Mobile Communication. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j42]Haizheng Yu, Jianfeng Ma, Hong Bian:
Reasonable routing in delay/disruption tolerant networks. Frontiers Comput. Sci. China 5(3): 327-334 (2011) - [j41]Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao:
Security analysis of two recently proposed RFID authentication protocols. Frontiers Comput. Sci. China 5(3): 335-340 (2011) - [j40]Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:
Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario. Intell. Autom. Soft Comput. 17(2): 191-203 (2011) - [j39]Chao Yang, Jianfeng Ma, Xuewen Dong:
A New Evaluation Model for Security Protocols. J. Commun. 6(6): 485-494 (2011) - [j38]Guangsong Li, Jianfeng Ma, Qi Jiang, Xi Chen:
A novel re-authentication scheme based on tickets in wireless local area networks. J. Parallel Distributed Comput. 71(7): 906-914 (2011) - [j37]Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park:
Authentications and Key Management in 3G-WLAN Interworking. Mob. Networks Appl. 16(3): 394-407 (2011) - [c70]Junwei Zhang, Chao Yang, Jianfeng Ma:
Protocol Derivation System for the Needham-Schroeder family. CHINACOM 2011: 836-840 - [c69]Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan:
PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. CIS 2011: 123-126 - [c68]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. CIS 2011: 545-549 - [c67]Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. CIS 2011: 635-639 - [c66]Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. CIS 2011: 731-735 - [c65]Jiang Hong Guo, Jian Feng Ma, Xiu Qiang Wu:
Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks. CIS 2011: 754-758 - [c64]Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma:
Analysis of the Authentication Protocols Based on Game Theory. CIS 2011: 788-792 - [c63]Xiang Lu, Zhuo Lu, Wenye Wang, Jianfeng Ma:
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6 - [c62]Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma:
A Multi-compositional Enforcement on Information Flow Security. ICICS 2011: 345-359 - [c61]Bin Xiao, Jian-Feng Ma, Jiangtao Cui:
Invariant Image Recognition Using Radial Jacobi Moment Invariants. ICIG 2011: 280-285 - [c60]Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan:
Fast Parallel Computation of Tate Pairing. INCoS 2011: 178-183 - [c59]Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. INCoS 2011: 251-257 - [c58]Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. INCoS 2011: 320-327 - [c57]Xiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma:
From security to vulnerability: Data authentication undermines message delivery in smart grid. MILCOM 2011: 1183-1188 - [c56]Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan:
Towards Location and Trajectory Privacy Protection in Participatory Sensing. MobiCASE 2011: 381-386 - [c55]Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. TrustCom 2011: 494-500 - 2010
- [j36]Junzhi Yan, Jianfeng Ma, Fenghua Li, Sang-Jae Moon:
Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 10(2-3): 235-251 (2010) - [j35]Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci. China Inf. Sci. 53(3): 465-482 (2010) - [j34]Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable one-time signature and broadcast authentication. Sci. China Inf. Sci. 53(3): 567-580 (2010) - [j33]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon:
Stability analysis of a SEIQV epidemic model for rapid spreading worms. Comput. Secur. 29(4): 410-418 (2010) - [j32]Guangsong Li, Jianfeng Ma, Qi Jiang:
SAM: Secure Access of Media Independent Information Service with User Anonymity. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j31]Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. IEICE Trans. Inf. Syst. 93-D(3): 430-437 (2010) - [j30]Yahui Li, Jianfeng Ma, Sang-Jae Moon:
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks. IEICE Trans. Inf. Syst. 93-D(3): 484-490 (2010) - [j29]Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 10(3): 188-193 (2010) - [j28]Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 11(1): 17-22 (2010) - [j27]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks. Int. J. Netw. Secur. 11(1): 39-45 (2010) - [j26]Kai Liu, Yu Zhou, Yunsong Li, Jian Feng Ma:
A high performance MQ encoder architecture in JPEG2000. Integr. 43(3): 305-317 (2010) - [j25]Kai Yang, Jianfeng Ma:
A Hierarchical Hybrid Routing Protocol for Wireless Mesh Network. J. Convergence Inf. Technol. 5(8): 146-156 (2010) - [j24]Yantao Zhong, Jianfeng Ma:
A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Networks 12(6): 592-599 (2010) - [j23]Yiling Wen, Jianfeng Ma, Sang-Jae Moon:
Efficient and Identity-based Signcryption with Provably-secure. J. Digit. Content Technol. its Appl. 4(7): 148-153 (2010) - [j22]Xuan Wang, Fang-xia Guo, Bin Xiao, Jian-Feng Ma:
Rotation invariant analysis and orientation estimation method for texture classification based on Radon transform and correlation analysis. J. Vis. Commun. Image Represent. 21(1): 29-32 (2010) - [j21]Bin Xiao, Jian-Feng Ma, Xuan Wang:
Image analysis by Bessel-Fourier moments. Pattern Recognit. 43(8): 2620-2629 (2010) - [j20]Zhihong Liu, Jianfeng Ma, Qingqi Pei, Liaojun Pang, YoungHo Park:
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks. IEEE Trans. Wirel. Commun. 9(8): 2643-2653 (2010) - [c54]Li Yang, Jianfeng Ma, Junwei Zhang:
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. CIS 2010: 334-338 - [c53]Guangsong Li, Qi Jiang, Jianfeng Ma:
A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks. ICEE 2010: 1285-1288 - [c52]Tao Feng, Yongguo Gao, Jianfeng Ma:
Changeable Threshold Signature Scheme Based on Lattice Theory. ICEE 2010: 1311-1315 - [c51]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A novel data communication approach in wireless sensor networks. HPCS 2010: 509-511 - [c50]Guojun Ma, Li Jian, Qingqi Pei, Jianfeng Ma:
A Digital Rights Management scheme based on rational share content. HPCS 2010: 517-520 - [c49]Yong Zeng, Qinqi Pei, Jianfeng Ma, Lihua Dong:
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks. HPCS 2010: 676-678
2000 – 2009
- 2009
- [j19]Junzhi Yan, Jianfeng Ma, Hongyue Liu:
Key hierarchies for hierarchical access control in secure group communications. Comput. Networks 53(3): 353-364 (2009) - [j18]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput. Secur. 28(7): 628-636 (2009) - [j17]Ayong Ye, Jianfeng Ma, Xiaohong Jiang, Susumu Horiguchi:
Robust Node Positioning in Wireless Sensor Networks. IEICE Trans. Commun. 92-B(6): 2023-2031 (2009) - [j16]Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:
Security and Trust in Digital Rights Management: A Survey. Int. J. Netw. Secur. 9(3): 247-263 (2009) - [j15]Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon:
Asymmetric Key Pre-distribution Scheme for sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1366-1372 (2009) - [j14]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Modeling and analysis of a self-learning worm based on good point set scanning. Wirel. Commun. Mob. Comput. 9(4): 573-586 (2009) - [c48]Chao Lv, Hui Li, Jianfeng Ma:
Analysis the Properties of TLS Based on Temporal Logic of Knowledge. IAS 2009: 19-22 - [c47]Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei:
An Active Defense Model and Framework of Insider Threats Detection and Sense. IAS 2009: 258-261 - [c46]Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang:
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. IAS 2009: 287-290 - [c45]Liqiang Mao, Jianfeng Ma, Xuewen Dong:
Towards Provably Secure On-demand Source Routing in MANET. IAS 2009: 299-302 - [c44]Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. IAS 2009: 423-426 - [c43]Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su:
Action-Based Access Control for Web Services. IAS 2009: 637-642 - [c42]Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefeng Fan:
Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM. CCNC 2009: 1-5 - [c41]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:
Predators Combat Good Point Set Scanning-Based Self-Learning Worms. CIS (1) 2009: 418-422 - [c40]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. CIS (2) 2009: 431-435 - [c39]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks. CIS (2) 2009: 441-445 - [c38]Kai Yang, Jian-Feng Ma, Zi-hui Miao:
Hybrid Routing Protocol for Wireless Mesh Network. CIS (1) 2009: 547-551 - [c37]Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. CIS (2) 2009: 584-586 - [c36]Yulong Shen, Qingqi Pei, Xinghua Li, Hailin Feng, Jianfeng Ma:
The Development Mode of Trust E-commerce Services. ICEBE 2009: 181-187 - [c35]Yong Zeng, Qinqi Pei, Jianfeng Ma, Sang-Jae Moon:
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. ISPAN 2009: 243-248 - [c34]Yejun Zhou, Hui Li, Jianfeng Ma:
Secure Error-Correction Network Coding in a Randomized Setting. ISA 2009: 570-577 - [p1]Jianfeng Ma, Chunjie Cao:
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access. Guide to Wireless Mesh Networks 2009: 299-323 - [i4]Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li:
UC-Secure Source Routing Protocol. IACR Cryptol. ePrint Arch. 2009: 85 (2009) - 2008
- [j13]Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon:
Keying Material Based Key Pre-distribution Scheme for Sensor Networks. Ad Hoc Sens. Wirel. Networks 6(1-2): 67-89 (2008) - [j12]Tao Feng, Fenghua Li, Jianfeng Ma, Sang-Jae Moon:
A new approach for UC security concurrent deniable authentication. Sci. China Ser. F Inf. Sci. 51(4): 352-367 (2008) - [j11]Chunjie Cao, Chao Yang, Jianfeng Ma, Sang-Jae Moon:
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [j10]Liang-Min Wang, Jian-Feng Ma, Yan-Bo Guo:
Node-failure Tolerance of Topology in Wireless Sensor Networks. Int. J. Netw. Secur. 7(2): 261-264 (2008) - [c33]Qingqi Pei, Jianfeng Ma:
ECC-Based Threshold Digital Signature Scheme without a Trusted Party. CIS (2) 2008: 288-292 - [c32]Liqiang Mao, Jianfeng Ma:
Towards Provably Secure On-Demand Distance Vector Routing in MANET. CIS (1) 2008: 417-420 - [c31]Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefeng Fan:
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement. CIS (2) 2008: 457-462 - [c30]Changguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma:
Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. CSSE (3) 2008: 546-549 - [c29]Yiling Wen, Jianfeng Ma:
An Aggregate Signature Scheme with Constant Pairing Operations. CSSE (3) 2008: 830-833 - [c28]Yahui Li, Ding Yong, Jianfeng Ma:
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. EUC (2) 2008: 10-15 - [c27]Zhuo Ma, Jianfeng Ma, Yulong Shen:
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. EUC (2) 2008: 43-48 - [c26]Wei Wang, Jianfeng Ma, Sang-Jae Moon:
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. ICC 2008: 1551-1555 - [c25]Fenghua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding:
Enhanced Architecture of TPM. ICYCS 2008: 1532-1537 - [c24]Tao Feng, Yilin Wang, Jianfeng Ma:
A Secure and Efficient Group Key Agreement for Ad Hoc Networks. ISCSCT (2) 2008: 540-543 - [c23]Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon:
Keying material based key pre-distribution scheme. ISI 2008: 218-221 - [c22]Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon:
A pairwise key establishment scheme for heterogeneous sensor networks. HeterSanet 2008: 53-60 - [c21]Tao Feng, Xian Guo, Jian-Feng Ma:
SMNDP: A Practical and Provably Secure Multi-path Source Routing. MSN 2008: 63-67 - [c20]Yong Zeng, Jianfeng Ma, Lihua Dong, Liaojun Pang, Yuanbo Guo:
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. MSN 2008: 208-211 - [c19]Chen Chen, Qingqi Pei, Jianfeng Ma:
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks. MSN 2008: 276-279 - [i3]Yejun Zhou, Hui Li, Jianfeng Ma:
Secure Network Coding Against the Contamination and Eavesdropping Adversaries. CoRR abs/0805.2286 (2008) - [i2]Zhitu Su, Hui Li, Jianfeng Ma:
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves. IACR Cryptol. ePrint Arch. 2008: 8 (2008) - [i1]Zhitu Su, Hui Li, Jianfeng Ma:
Polynomials for Ate Pairing and Atei Pairing. IACR Cryptol. ePrint Arch. 2008: 202 (2008) - 2007
- [j9]Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable anonymous Hash certification model. Sci. China Ser. F Inf. Sci. 50(3): 440-455 (2007) - [j8]Liang-Min Wang, Jian-Feng Ma, Yongzhao Zhan:
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor. Int. J. Autom. Control. 1(1): 100-114 (2007) - [j7]Xuan Wang, Bin Xiao, Jian-Feng Ma, Xiu-Li Bi:
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms. Pattern Recognit. 40(12): 3503-3508 (2007) - [c18]Yulong Shen, Jianfeng Ma, Qingqi Pei:
Research on the Resilience of Key Management in Sensor Networks. CIS 2007: 716-720 - [c17]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. NPC 2007: 306-314 - 2006
- [j6]JoongHyo Oh, Sang-Jae Moon, Jianfeng Ma:
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(3): 826-829 (2006) - [c16]Xinghua Li, Sang-Jae Moon, Jianfeng Ma:
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. ACNS 2006: 340-348 - [c15]Wei Wang, Jianfeng Ma, Sang-Jae Moon:
Ternary Tree Based Group Key Management in Dynamic Peer Networks. CIS 2006: 513-522 - [c14]Qingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma:
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. CIS 2006: 750-757 - [c13]Liangmin Wang, Jianfeng Ma, Chao Wang, A. C. Kot:
Fault and intrusion tolerance of wireless sensor networks. IPDPS 2006 - 2005
- [j5]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security extension for the Canetti-Krawczyk model in identity-based systems. Sci. China Ser. F Inf. Sci. 48(1): 117-124 (2005) - [c12]Yong Zeng, Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. CIS (2) 2005: 228-235 - [c11]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model. CIS (2) 2005: 356-363 - [c10]Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network. CIS (2) 2005: 476-481 - [c9]Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. CIS (2) 2005: 488-493 - [c8]Yuanbo Guo, Jianfeng Ma:
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. HICSS 2005 - [c7]Yuanbo Guo, Jianfeng Ma, Yadi Wang:
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. International Conference on Computational Science (3) 2005: 229-236 - [c6]Chao Wang, Jianfeng Ma, Jianming Zhu:
Design and Implementation of Survivable Network Systems. ICIC (2) 2005: 376-385 - [c5]Fan Zhang, Jianfeng Ma:
Security Analysis on Chinese Wireless LAN Standard and Its Solution. ICPP Workshops 2005: 436-443 - [c4]Wei Wang, Jianfeng Ma, Sang-Jae Moon:
Efficient Group Key Management for Dynamic Peer Networks. MSN 2005: 753-762 - [e2]Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I. Lecture Notes in Computer Science 3801, Springer 2005, ISBN 3-540-30818-0 [contents] - [e1]Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3802, Springer 2005, ISBN 3-540-30819-9 [contents] - 2004
- [j4]Yuanbo Guo, Jianfeng Ma:
Practical Secret Sharing Scheme Realizing Generalized Adversary Structure. J. Comput. Sci. Technol. 19(4): 564-569 (2004) - [j3]Yuanbo Guo, Jianfeng Ma:
An intrusion-tolerant authorization and authentication scheme in distributed environments. ACM SIGOPS Oper. Syst. Rev. 38(4): 45-51 (2004) - [j2]Jianming Zhu, Jianfeng Ma:
A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consumer Electron. 50(1): 231-235 (2004) - [j1]Yuanbo Guo, Jianfeng Ma:
An efficient and secure fault-tolerant conference-key distribution scheme. IEEE Trans. Consumer Electron. 50(2): 571-575 (2004) - [c3]Liang-Min Wang, Jian-Feng Ma, Yongzhao Zhan:
Enhancing the Content of the Intrusion Alerts Using Logic Correlation. AWCC 2004: 137-142 - [c2]Chao Wang, Jianfeng Ma:
Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. AWCC 2004: 161-166 - 2003
- [c1]Yong Zeng, Jian Feng Ma:
Pseudorandom number generators based on evolutionary algorithm. IEEE Congress on Evolutionary Computation 2003: 1662-1668
Coauthor Index
aka: Xindi Ma
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint