![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Zhuo Ma 0001
Person information
- affiliation: Xidian University, Xi'an, China
Other persons with the same name
- Zhuo Ma — disambiguation page
- Zhuo Ma 0002 — Jiangsu Police Institute, Nanjing, China
- Zhuo Ma 0003 — Xi'an Jiaotong University, Xi'an, Shaanxi, China
- Zhuo Ma 0004
— Tianjin University, Tianjin, China
- Zhuo Ma 0005 — University Of New South Wales, NSW, Australia
- Zhuo Ma 0006 — Beijing Information Science & Technology University, Beijing, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j43]Xindi Ma, Xinfu Li, Junying Zhang, Zhuo Ma, Qi Jiang, Ximeng Liu, Jianfeng Ma:
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles. IEEE Trans. Dependable Secur. Comput. 22(1): 804-818 (2025) - 2024
- [j42]Zhuo Ma, Yilong Yang, Yang Liu, Xinjing Liu, Jianfeng Ma:
Mitigate noisy data for smart IoT via GAN based machine unlearning. Sci. China Inf. Sci. 67(3) (2024) - [j41]Teng Li, Weiguo Lin, Ruichen Ma, Zhuo Ma, Yulong Shen, Jianfeng Ma:
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67(5) (2024) - [j40]Xinjing Liu
, Taifeng Liu
, Hao Yang, Jiakang Dong, Zuobin Ying
, Zhuo Ma
:
Model Stealing Detection for IoT Services Based on Multidimensional Features. IEEE Internet Things J. 11(24): 39183-39194 (2024) - [j39]Jinhai Zhang
, Junwei Zhang
, Zhuo Ma, Yang Liu, Xindi Ma, Jianfeng Ma:
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay. J. Syst. Archit. 150: 103111 (2024) - [j38]Yang Wei, Zhuo Ma, Zhuoran Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi
, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. IEEE Trans. Dependable Secur. Comput. 21(4): 4206-4219 (2024) - [j37]Ruidong Han
, Huihui Gong, Siqi Ma
, Juanru Li, Chang Xu
, Elisa Bertino
, Surya Nepal
, Zhuo Ma
, Jianfeng Ma
:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j36]Yuqing Wang
, Junwei Zhang
, Zhuo Ma
, Ning Lu
, Teng Li
, Jianfeng Ma
:
Location-Aware and Privacy-Preserving Data Cleaning for Intelligent Transportation. IEEE Trans. Intell. Transp. Syst. 25(12): 20405-20418 (2024) - [j35]Xin Kang
, Zhuo Ma
, Yang Liu
, Teng Li
, Zuobin Ying
, Bingsheng Zhang
:
Multi-Party Private Edge Computing for Collaborative Quantitative Exposure Detection of Endemic Diseases. IEEE Trans. Mob. Comput. 23(12): 12020-12034 (2024) - [j34]Tanren Liu
, Zhuo Ma
, Yang Liu
, Xin Kang
, Bingsheng Zhang
, Jianfeng Ma
:
A Privacy-Preserving Computation Framework for Multisource Label Propagation Services. IEEE Trans. Serv. Comput. 17(6): 3078-3091 (2024) - [j33]Ruidong Han
, Siqi Ma
, Juanru Li
, Surya Nepal
, David Lo
, Zhuo Ma
, Jianfeng Ma
:
Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024) - [c16]Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. SP 2024: 1217-1235 - [i8]Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu:
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. CoRR abs/2410.17910 (2024) - [i7]Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren:
Efficient 2PC for Constant Round Secure Equality Testing and Comparison. IACR Cryptol. ePrint Arch. 2024: 949 (2024) - 2023
- [j32]Zhuo Ma, Jiawei Zhang
:
Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems. IEEE Access 11: 45206-45221 (2023) - [j31]Weihao Huang, Guozhu Meng
, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - [j30]Junwei Zhang
, Yuqing Wang
, Zhuo Ma
, Xiaohan Yang, Zuobin Ying
, Jianfeng Ma
:
A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains. IEEE Internet Things J. 10(6, March 15): 4783-4798 (2023) - [j29]Yuanpeng Li
, Feiyu Wang
, Xiang Yu
, Yilong Yang
, Kaicheng Yang
, Tong Yang
, Zhuo Ma
, Bin Cui
, Steve Uhlig
:
LadderFilter: Filtering Infrequent Items with Small Memory and Time Overhead. Proc. ACM Manag. Data 1(1): 10:1-10:21 (2023) - [j28]Zhuo Ma, Yilong Yang, Bin Xiao, Yang Liu, Xinjing Liu, Zhuoran Ma, Tong Yang:
Sniffer: A Novel Model Type Detection System against Machine-Learning-as-a-Service Platforms. Proc. VLDB Endow. 16(12): 3942-3945 (2023) - [j27]Junwei Zhang, Xin Kang, Yang Liu, Huawei Ma, Teng Li, Zhuo Ma
, Sergey Gataullin
:
A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem. Symmetry 15(2): 319 (2023) - [j26]Zhuzhu Wang
, Cui Hu
, Bin Xiao
, Yang Liu
, Teng Li
, Zhuo Ma
, Jianfeng Ma
:
Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database. IEEE Trans. Big Data 9(5): 1408-1419 (2023) - [j25]Zhuo Ma
, Yang Liu
, Ximeng Liu
, Jian Liu, Jianfeng Ma
, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. IEEE Trans. Dependable Secur. Comput. 20(4): 3194-3207 (2023) - [j24]Zhuo Ma
, Xinjing Liu
, Yang Liu
, Ximeng Liu
, Zhan Qin
, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. IEEE Trans. Dependable Secur. Comput. 20(6): 4810-4822 (2023) - [j23]Yang Liu
, Bingsheng Zhang
, Yuxiang Ma, Zhuo Ma
, Zecheng Wu
:
iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning. IEEE Trans. Inf. Forensics Secur. 18: 4300-4312 (2023) - [j22]Yilong Yang
, Zhuo Ma
, Bin Xiao
, Yang Liu
, Teng Li
, Junwei Zhang
:
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation. IEEE Trans. Knowl. Data Eng. 35(12): 12958-12971 (2023) - [c15]Yang Wei, Bin Xiao, Xiuli Bi
, Zhuoran Ma, Yang Liu, Zhuo Ma:
Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection. ACM Multimedia 2023: 8225-8232 - [c14]Teng Li, Shengkai Zhang, Zexu Dang, Yongcai Xiao, Zhuo Ma:
TripleLP: Privacy-Preserving Log Parsing Based on Blockchain. PAAP 2023: 1-6 - 2022
- [j21]Yang Liu
, Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Jianfeng Ma
, Kui Ren
:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(6): 3671-3685 (2022) - [j20]Yang Liu
, Zhuo Ma
, Ximeng Liu
, Siqi Ma, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j19]Zuobin Ying
, Shuanglong Cao, Ximeng Liu
, Zhuo Ma
, Jianfeng Ma
, Robert H. Deng
:
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(9): 16290-16303 (2022) - [j18]Yuanpeng Li
, Xiang Yu
, Yilong Yang
, Yang Zhou
, Tong Yang
, Zhuo Ma
, Shigang Chen
:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. IEEE/ACM Trans. Netw. 30(2): 586-600 (2022) - [c13]Yinbin Miao
, Rongpeng Xie
, Xinghua Li
, Ximeng Liu
, Zhuo Ma
, Robert H. Deng
:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. ACSAC 2022: 159-170 - [c12]Xinjing Liu, Zhuo Ma, Yang Liu, Zhan Qin, Junwei Zhang, Zhuzhu Wang:
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection. ESORICS (1) 2022: 610-630 - [c11]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. INFOCOM 2022: 280-289 - [i6]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. CoRR abs/2201.09538 (2022) - 2021
- [j17]Xinghua Li
, Mengyao Zhu
, Laurence T. Yang
, Mengfan Xu
, Zhuo Ma
, Cheng Zhong, Hui Li
, Yang Xiang
:
Sustainable Ensemble Learning Driving Intrusion Detection Model. IEEE Trans. Dependable Secur. Comput. 18(4): 1591-1604 (2021) - [j16]Junwei Zhang
, Fan Yang, Zhuo Ma
, Zhuzhu Wang, Ximeng Liu
, Jianfeng Ma
:
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 22(4): 2299-2313 (2021) - 2020
- [j15]Bin Xiao
, Yunqiu Xu, Xiuli Bi
, Weisheng Li
, Zhuo Ma
, Junhui Zhang, Xu Ma:
Follow the Sound of Children's Heart: A Deep-Learning-Based Computer-Aided Pediatric CHDs Diagnosis System. IEEE Internet Things J. 7(3): 1994-2004 (2020) - [j14]Zhuzhu Wang, Yang Liu
, Zhuo Ma
, Ximeng Liu
, Jianfeng Ma:
LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid. IEEE Internet Things J. 7(5): 3935-3947 (2020) - [j13]Yang Liu, Zhuo Ma
, Zheng Yan
, Zhuzhu Wang, Ximeng Liu
, Jianfeng Ma:
Privacy-preserving federated k-means for proactive caching in next generation cellular networks. Inf. Sci. 521: 14-31 (2020) - [j12]Zhuo Ma
, Yang Liu, Zhuzhu Wang, Haoran Ge, Meng Zhao:
A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Comput. Appl. 32(22): 16819-16831 (2020) - [j11]Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Yang Liu
, Siqi Ma, Kui Ren
, Chang Yao
:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6597-6606 (2020) - [j10]Zhuo Ma
, Junwei Zhang
, Yongzhen Guo
, Yang Liu
, Ximeng Liu
, Wei He:
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain. IEEE Trans. Veh. Technol. 69(6): 5836-5849 (2020) - [c10]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma, Zhuo Ma, Danni Yuan:
Medical Privacy-preserving Service Recommendation. ICC 2020: 1-6 - [c9]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal
, Robert H. Deng
, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c8]Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma:
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication. IWQoS 2020: 1-10 - [c7]Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. SPDE 2020: 249-262 - [i5]Zhuo Ma, Haoran Ge, Zhuzhu Wang, Yang Liu, Ximeng Liu:
Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning. CoRR abs/2002.03594 (2020) - [i4]Yang Liu, Zhuo Ma, Ximeng Liu, Jianfeng Ma:
Learn to Forget: User-Level Memorization Elimination in Federated Learning. CoRR abs/2003.10933 (2020)
2010 – 2019
- 2019
- [j9]Zhuo Ma
, Haoran Ge, Yang Liu, Meng Zhao, Jianfeng Ma:
A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms. IEEE Access 7: 21235-21245 (2019) - [j8]Zhuo Ma
, Yang Liu
, Ximeng Liu
, Jianfeng Ma, Kui Ren:
Lightweight Privacy-Preserving Ensemble Classification for Face Recognition. IEEE Internet Things J. 6(3): 5778-5790 (2019) - [j7]Zhuo Ma
, Yang Liu
, Ximeng Liu
, Jianfeng Ma, Feifei Li:
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices. IEEE Internet Things J. 6(5): 8406-8420 (2019) - [j6]Baihe Ma, Zhihong Liu, Yong Zeng, Zhuo Ma, Hui Zhang, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. J. Inf. Sci. Eng. 35(5): 1029-1044 (2019) - [j5]Zhuo Ma
, Tian Zhang
, Ximeng Liu
, Xinghua Li
, Kui Ren:
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory. IEEE Trans. Veh. Technol. 68(8): 8091-8102 (2019) - [c6]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha
:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c5]Jiayin Li
, Wenzhong Guo, Zhuo Ma, Xianjia Meng, Yang Yang, Ximeng Liu:
Privacy-Preserving Compressive Sensing for Traffic Estimation. GLOBECOM 2019: 1-6 - [c4]Zhuo Ma, Meng Zhao, Ximeng Liu, Chong Shen, Jianfeng Ma:
Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent. GLOBECOM 2019: 1-6 - [c3]Xuewen Dong, Qiao Kang, Yang Xu, Zhuo Ma, Teng Li:
Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation. INFOCOM Workshops 2019: 1047-1048 - [c2]Jiawei Zhang, Jianfeng Ma, Zhuo Ma, Ning Lu, Yanbo Yang, Teng Li, Dawei Wei:
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health. NaNA 2019: 319-324 - [i3]Zhihong Liu, Jiajia Liu, Yong Zeng, Zhuo Ma, Jianfeng Ma, Qiping Huang:
Challenges in Covert Wireless Communications with Active Warden on AWGN channels. CoRR abs/1901.03185 (2019) - [i2]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019) - [i1]Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren:
Revocable Federated Learning: A Benchmark of Federated Forest. CoRR abs/1911.03242 (2019) - 2018
- [j4]Zhuo Ma
, Xinglong Wang
, Rui Ma, Zhuzhu Wang, Jianfeng Ma:
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept. Sensors 18(9): 2894 (2018) - 2013
- [j3]Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:
An Improved Password-Based Remote User Authentication Protocol without Smart Cards. Inf. Technol. Control. 42(2): 113-123 (2013) - [j2]Qi Jiang
, Jianfeng Ma, Zhuo Ma, Guangsong Li:
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(1): 9897 (2013) - 2010
- [j1]Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. IEICE Trans. Inf. Syst. 93-D(3): 430-437 (2010)
2000 – 2009
- 2008
- [c1]Zhuo Ma, Jianfeng Ma, Yulong Shen:
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. EUC (2) 2008: 43-48
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint