default search action
Duohe Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Kai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu:
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention. CSCWD 2024: 2870-2875 - [c15]Zhitong Lu, Duohe Ma, Linna Fan, Zhen Xu, Kai Chen:
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion. IH&MMSec 2024: 165-174 - 2023
- [c14]Xinzhe Wang, Duohe Ma, Liming Wang, Zhitong Lu, Zhenchao Zhang, Junye Jiang:
Deepfake Detection Using Multiple Facial Features. IFIP Int. Conf. Digital Forensics 2023: 161-175 - [c13]Zhimin Tang, Duohe Ma, Xiaoyan Sun, Kai Chen, Liming Wang, Junye Jiang:
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense. ISCC 2023: 568-574 - 2022
- [c12]Duohe Ma, Zhimin Tang, Xiaoyan Sun, Lu Guo, Liming Wang, Kai Chen:
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. MTD@CCS 2022: 67-77 - 2021
- [c11]Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, Duohe Ma:
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models. ICICS (1) 2021: 119-135 - 2020
- [c10]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Zhitong Lu, Yijun Lu:
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud. HPCC/DSS/SmartCity 2020: 483-490 - [c9]Tong Kong, Liming Wang, Duohe Ma, Kai Chen, Zhen Xu, Yijun Lu:
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud. HPCC/DSS/SmartCity 2020: 794-801 - [c8]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. ICWS 2020: 364-371 - [c7]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IPCCC 2020: 1-8
2010 – 2019
- 2019
- [j4]Zhaocan Li, Liming Wang, Sijiang Ge, Duohe Ma, Bo Qin:
基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding). 计算机科学 46(12): 148-154 (2019) - [c6]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Kai Chen:
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. HPCC/SmartCity/DSS 2019: 1825-1832 - 2018
- [j3]Cheng Lei, Hongqi Zhang, Liming Wang, Lu Liu, Duohe Ma:
Incomplete information Markov game theoretic approach to strategy generation for moving target defense. Comput. Commun. 116: 184-199 (2018) - [j2]Xuehu Yan, Yuliang Lu, Lintao Liu, Duohe Ma:
Image Secret Sharing Construction for General Access Structure with Meaningful Share. Int. J. Digit. Crime Forensics 10(3): 66-77 (2018) - 2017
- [j1]Cheng Lei, Duohe Ma, Hongqi Zhang:
Optimal Strategy Selection for Moving Target Defense Based on Markov Game. IEEE Access 5: 156-169 (2017) - [c5]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Quantitative Security Assessment Method based on Entropy for Moving Target Defense. AsiaCCS 2017: 920-922 - 2016
- [c4]Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ICICS 2016: 39-53 - [c3]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Thwart eavesdropping attacks on network communication based on moving target defense. IPCCC 2016: 1-2 - 2014
- [c2]Duohe Ma, Zhen Xu, Dongdai Lin:
Defending Blind DDoS Attack on SDN Based on Moving Target Defense. SecureComm (1) 2014: 463-480
2000 – 2009
- 2006
- [c1]Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen:
Research on Applying Java Card to Database Encryption Systems. IIH-MSP 2006: 575-578
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint