default search action
BibTeX records: Di Ma
@article{DBLP:journals/access/BazziSM24, author = {Abir Bazzi and Adnan Shaout and Di Ma}, title = {A Novel Variability-Rich Scheme for Software Updates of Automotive Systems}, journal = {{IEEE} Access}, volume = {12}, pages = {79530--79548}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3409629}, doi = {10.1109/ACCESS.2024.3409629}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BazziSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/YaoWMCM24, author = {Xianshuang Yao and Yao Wang and Di Ma and Shengxian Cao and Qingchuan Ma}, title = {Fractional-integer-order echo state network for time series prediction}, journal = {Appl. Soft Comput.}, volume = {153}, pages = {111289}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2024.111289}, doi = {10.1016/J.ASOC.2024.111289}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/YaoWMCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LuZCFZM24, author = {Hai Lu and Yan Zhu and Cecilia E. Chen and Rongquan Feng and Lejun Zhang and Di Ma}, title = {Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {1893--1909}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3328719}, doi = {10.1109/JIOT.2023.3328719}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LuZCFZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoZCZFM24, author = {Guanglai Guo and Yan Zhu and Cecilia E. Chen and Lejun Zhang and Rongquan Feng and Di Ma}, title = {Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {11353--11367}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3329660}, doi = {10.1109/JIOT.2023.3329660}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GuoZCZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ChoeHM24, author = {Kwang{-}Il Choe and Xiaoxia Huang and Di Ma}, title = {Uncertain multi-period project adjustment and selection under the carbon tax and carbon quota policies}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {1}, pages = {619--637}, year = {2024}, url = {https://doi.org/10.3233/jifs-231970}, doi = {10.3233/JIFS-231970}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/ChoeHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/ChoeHM24, author = {Kwang{-}Il Choe and Xiaoxia Huang and Di Ma}, title = {Uncertain mean-risk index portfolio selection considering inflation: Chaos adaptive genetic algorithm}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {15}, number = {4}, pages = {1261--1275}, year = {2024}, url = {https://doi.org/10.1007/s13042-023-01966-8}, doi = {10.1007/S13042-023-01966-8}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mlc/ChoeHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/MaZB24, author = {Di Ma and Fan Zhang and David R. Bull}, title = {{CVEGAN:} {A} perceptually-inspired {GAN} for Compressed Video Enhancement}, journal = {Signal Process. Image Commun.}, volume = {127}, pages = {117127}, year = {2024}, url = {https://doi.org/10.1016/j.image.2024.117127}, doi = {10.1016/J.IMAGE.2024.117127}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/MaZB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuZCM24, author = {Hai Lu and Yan Zhu and Cecilia E. Chen and Di Ma}, title = {Toward Efficient Key Extraction of {LBC} Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4301--4315}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376206}, doi = {10.1109/TIFS.2024.3376206}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuZCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangYM24, author = {Linxi Zhang and Xuke Yan and Di Ma}, title = {Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network}, booktitle = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications, Vancouver, BC, Canada, May 20-23, 2024}, pages = {2299--2307}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/INFOCOM52122.2024.10621400}, doi = {10.1109/INFOCOM52122.2024.10621400}, timestamp = {Tue, 20 Aug 2024 13:54:36 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaMLL23, author = {Zhoujun Ma and Di Ma and Mengjie Lv and Yutong Liu}, title = {Virtual Machine Migration Techniques for Optimizing Energy Consumption in Cloud Data Centers}, journal = {{IEEE} Access}, volume = {11}, pages = {86739--86753}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3305268}, doi = {10.1109/ACCESS.2023.3305268}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaMLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eeel/PengLPM23, author = {Weiping Peng and Jiabao Liu and Yuan Ping and Di Ma}, title = {Model Protection Scheme Against Distillation Attack in Internet of Vehicles}, journal = {{EAI} Endorsed Trans. e Learn.}, volume = {8}, number = {3}, year = {2023}, url = {https://doi.org/10.4108/eetel.v8i3.3318}, doi = {10.4108/EETEL.V8I3.3318}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eeel/PengLPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eeel/PengMSCL23, author = {Weiping Peng and Di Ma and Cheng Song and Daochen Cheng and Jiabao Liu}, title = {A K-Anonymous Location Privacy-Preserving Scheme for Mobile Terminals}, journal = {{EAI} Endorsed Trans. e Learn.}, volume = {9}, year = {2023}, url = {https://doi.org/10.4108/eetel.4468}, doi = {10.4108/EETEL.4468}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eeel/PengMSCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YaoWCMS23, author = {Ruizhe Yao and Ning Wang and Peng Chen and Di Ma and Xianjun Sheng}, title = {A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure}, journal = {Multim. Tools Appl.}, volume = {82}, number = {13}, pages = {19463--19486}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14121-2}, doi = {10.1007/S11042-022-14121-2}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YaoWCMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/KasterM23, author = {Robert Kaster and Di Ma}, title = {Digital Shadows for Remote Automotive {SW} Verification}, booktitle = {Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, CPS-IoT Week 2023 Workshops, San Antonio, TX, USA, May 9-12, 2023}, pages = {25--30}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576914.3587488}, doi = {10.1145/3576914.3587488}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpsweek/KasterM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imw2/FengJQZKKCSLYHZ23, author = {Daohuan Feng and Yi Jiang and Yunsong Qiu and Yuhong Zheng and Harry Kim and Jaewoo Kim and Jian Chu and Guangsu Shao and Yucheng Liao and Chen Yang and Minrui Hu and Wenli Zhao and Linjiang Xia and Jianfeng Xiao and Di Ma and Yuan Cheng and Xiangbo Kong and Chao Lin and Tianming Li and Yongjie Li and Jingheng Meng and Kai Shao and Yan Wang and Xiaoan Yang and Xiang Liu and Qinghua Han and Huiming Li and Yanzhe Tang and Mingde Liu and Eric Wu and Xiaoping Li and Renrui Huang and Mingtang Zhang and Long Hou and Xuan Pan and Xinwen Jin and Shuiping Zhao and Dh Han and Ted Park and Deyuan Xiao and Chao Zhao and Abraham Yoo}, title = {Vertical Channel Transistor {(VCT)} as Access Transistor for Future 4F\({}^{\mbox{2}}\) {DRAM} Architecture}, booktitle = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA, May 21-24, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IMW56887.2023.10145977}, doi = {10.1109/IMW56887.2023.10145977}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imw2/FengJQZKKCSLYHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangM22, author = {Linxi Zhang and Di Ma}, title = {A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks}, journal = {{IEEE} Access}, volume = {10}, pages = {10852--10866}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3145007}, doi = {10.1109/ACCESS.2022.3145007}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangYM22, author = {Linxi Zhang and Xuke Yan and Di Ma}, title = {A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion Detection}, journal = {{IEEE} Access}, volume = {10}, pages = {123505--123520}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3208091}, doi = {10.1109/ACCESS.2022.3208091}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/GuoZCZMC22, author = {Guanglai Guo and Yan Zhu and E. Chen and Guizhen Zhu and Di Ma and William Cheng{-}Chung Chu}, title = {Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols}, journal = {Peer-to-Peer Netw. Appl.}, volume = {15}, number = {1}, pages = {304--323}, year = {2022}, url = {https://doi.org/10.1007/s12083-021-01243-x}, doi = {10.1007/S12083-021-01243-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/GuoZCZMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/MaZB22, author = {Di Ma and Fan Zhang and David R. Bull}, title = {{BVI-DVC:} {A} Training Database for Deep Video Compression}, journal = {{IEEE} Trans. Multim.}, volume = {24}, pages = {3847--3858}, year = {2022}, url = {https://doi.org/10.1109/TMM.2021.3108943}, doi = {10.1109/TMM.2021.3108943}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/MaZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiZCXMMHX22, author = {Yanbiao Li and Hui Zou and Yuxuan Chen and Yinbo Xu and Zhuoran Ma and Di Ma and Ying Hu and Gaogang Xie}, title = {The Hanging {ROA:} {A} Secure and Scalable Encoding Scheme for Route Origin Authorization}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}, pages = {21--30}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOM48880.2022.9796844}, doi = {10.1109/INFOCOM48880.2022.9796844}, timestamp = {Tue, 28 Jun 2022 08:49:13 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiZCXMMHX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/MaC21, author = {Di Ma and Songcan Chen}, title = {Semi-blind compressed sensing via adaptive dictionary learning and one-pass online extension}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {9}, year = {2021}, url = {https://doi.org/10.1007/s11432-019-9945-2}, doi = {10.1007/S11432-019-9945-2}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/MaC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/ZhangMFB21, author = {Fan Zhang and Di Ma and Chen Feng and David R. Bull}, title = {Video Compression With CNN-Based Postprocessing}, journal = {{IEEE} Multim.}, volume = {28}, number = {4}, pages = {74--83}, year = {2021}, url = {https://doi.org/10.1109/MMUL.2021.3052437}, doi = {10.1109/MMUL.2021.3052437}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/ZhangMFB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/SunM21, author = {Changxin Sun and Di Ma}, title = {SVM-based global vision system of sports competition and action recognition}, journal = {J. Intell. Fuzzy Syst.}, volume = {40}, number = {2}, pages = {2265--2276}, year = {2021}, url = {https://doi.org/10.3233/JIFS-189224}, doi = {10.3233/JIFS-189224}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/SunM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/MaZB21, author = {Di Ma and Fan Zhang and David R. Bull}, title = {MFRNet: {A} New {CNN} Architecture for Post-Processing and In-loop Filtering}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {15}, number = {2}, pages = {378--387}, year = {2021}, url = {https://doi.org/10.1109/JSTSP.2020.3043064}, doi = {10.1109/JSTSP.2020.3043064}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/MaZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/KatsenouDMB21, author = {Angeliki V. Katsenou and Goce Dimitrov and Di Ma and David R. Bull}, title = {BVI-SynTex: {A} Synthetic Video Texture Dataset for Video Compression and Quality Assessment}, journal = {{IEEE} Trans. Multim.}, volume = {23}, pages = {26--38}, year = {2021}, url = {https://doi.org/10.1109/TMM.2020.2976591}, doi = {10.1109/TMM.2020.2976591}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/KatsenouDMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/0010SWMC21, author = {Yan Zhu and Weijing Song and Di Wang and Di Ma and William Cheng{-}Chung Chu}, title = {{TA-SPESC:} Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain}, journal = {{IEEE} Trans. Reliab.}, volume = {70}, number = {3}, pages = {1255--1270}, year = {2021}, url = {https://doi.org/10.1109/TR.2021.3054617}, doi = {10.1109/TR.2021.3054617}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/0010SWMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitee/MaL21, author = {Di Ma and Wenlong Li}, title = {Influence of Negative Stimulation on Gap Junction-mediated Communication under Electrical Coupling}, booktitle = {{ICITEE} 2021: The 4th International Conference on Information Technologies and Electrical Engineering, Changde, Hunan, China, October 29 - 31, 2021}, pages = {7:1--7:5}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3513142.3513149}, doi = {10.1145/3513142.3513149}, timestamp = {Wed, 20 Apr 2022 15:53:57 +0200}, biburl = {https://dblp.org/rec/conf/icitee/MaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ZouMSM21, author = {Hui Zou and Di Ma and Qing Shao and Wei Mao}, editor = {Toufik Ahmed and Olivier Festor and Yacine Ghamri{-}Doudane and Joon{-}Myung Kang and Alberto E. Schaeffer Filho and Abdelkader Lahmadi and Edmundo R. M. Madeira}, title = {The Horizontal {INR} Conflict-Detection Algorithm: Revealing {INR} Reallocation and Reauthorization in {RPKI}}, booktitle = {17th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2021, Bordeaux, France, May 17-21, 2021}, pages = {459--465}, publisher = {{IEEE}}, year = {2021}, url = {https://ieeexplore.ieee.org/document/9463976}, timestamp = {Mon, 05 Jul 2021 08:04:03 +0200}, biburl = {https://dblp.org/rec/conf/im/ZouMSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcs/MackinM0B21, author = {Alex Mackin and Di Ma and Fan Zhang and David Bull}, title = {A Subjective Study on Videos at Various Bit Depths}, booktitle = {Picture Coding Symposium, {PCS} 2021, Bristol, United Kingdom, June 29 - July 2, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PCS50896.2021.9477460}, doi = {10.1109/PCS50896.2021.9477460}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pcs/MackinM0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08147, author = {Di Ma and Mariana Afonso and Fan Zhang and David R. Bull}, title = {Perceptually-inspired super-resolution of compressed videos}, journal = {CoRR}, volume = {abs/2106.08147}, year = {2021}, url = {https://arxiv.org/abs/2106.08147}, eprinttype = {arXiv}, eprint = {2106.08147}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08147.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HaoSCGM20, author = {Fengjie Hao and Junfeng Shi and Yongjun Chen and Xuefeng Gu and Di Ma}, title = {Integrated Analysis of a Noncoding RNA-Associated Competing Endogenous {RNA} Network in Non-Alcoholic Fatty Liver Disease}, journal = {{IEEE} Access}, volume = {8}, pages = {88977--88989}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2992109}, doi = {10.1109/ACCESS.2020.2992109}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HaoSCGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoZYCM20, author = {Guanglai Guo and Yan Zhu and Ruyun Yu and William Cheng{-}Chung Chu and Di Ma}, title = {A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {157116--157129}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3016041}, doi = {10.1109/ACCESS.2020.3016041}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoZYCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiuMAZ20, author = {Longlong Liu and Di Ma and Ahmad Taher Azar and Quanmin Zhu}, title = {Neural Computing Enhanced Parameter Estimation for Multi-Input and Multi-Output Total Non-Linear Dynamic Models}, journal = {Entropy}, volume = {22}, number = {5}, pages = {510}, year = {2020}, url = {https://doi.org/10.3390/e22050510}, doi = {10.3390/E22050510}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/LiuMAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/MaC20, author = {Di Ma and Songcan Chen}, title = {Bayesian compressive principal component analysis}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {4}, pages = {144303}, year = {2020}, url = {https://doi.org/10.1007/s11704-019-8308-9}, doi = {10.1007/S11704-019-8308-9}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/MaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/MaC20, author = {Di Ma and Songcan Chen}, title = {Distribution agnostic Bayesian matching pursuit based on the exponential embedded family}, journal = {Neurocomputing}, volume = {410}, pages = {401--409}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2020.06.007}, doi = {10.1016/J.NEUCOM.2020.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/MaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/MaWW20, author = {Di Ma and Yangpeng Wang and Kejin Wei}, title = {Practical source-independent quantum random number generation with detector efficiency mismatch}, journal = {Quantum Inf. Process.}, volume = {19}, number = {10}, pages = {384}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02865-5}, doi = {10.1007/S11128-020-02865-5}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/MaWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCZMWS20, author = {Huaxin Li and Qingrong Chen and Haojin Zhu and Di Ma and Hong Wen and Xuemin Sherman Shen}, title = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {350--362}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754249}, doi = {10.1109/TDSC.2017.2754249}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/NasserM20, author = {Ahmad M. K. Nasser and Di Ma}, title = {SecMonQ: An {HSM} based security monitoring approach for protecting {AUTOSAR} safety-critical systems}, journal = {Veh. Commun.}, volume = {21}, year = {2020}, url = {https://doi.org/10.1016/j.vehcom.2019.100201}, doi = {10.1016/J.VEHCOM.2019.100201}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/NasserM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccv/YanDWWMZ20, author = {Hong Yan and Jin Deng and Yiru Wan and Qiang Wang and Di Ma and Zhousheng Zhang}, title = {An Efficient Object Detection Network for Ammeter Inspection Task on Mobile Devices}, booktitle = {ICCCV'20: The 3rd International Conference on Control and Computer Vision, Macau, SAR, China, August, 2020}, pages = {104--108}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3425577.3425596}, doi = {10.1145/3425577.3425596}, timestamp = {Thu, 22 Feb 2024 13:36:47 +0100}, biburl = {https://dblp.org/rec/conf/icccv/YanDWWMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/MaZB20, author = {Di Ma and Fan Zhang and David R. Bull}, title = {Gan-Based Effective Bit Depth Adaptation for Perceptual Video Compression}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2020, London, UK, July 6-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICME46284.2020.9102865}, doi = {10.1109/ICME46284.2020.9102865}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/MaZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/XiMLSAJ20, author = {Nan Xi and Di Ma and Marcus Liou and Zachary C. Steinert{-}Threlkeld and Jason Anastasopoulos and Jungseock Joo}, editor = {Munmun De Choudhury and Rumi Chunara and Aron Culotta and Brooke Foucault Welles}, title = {Understanding the Political Ideology of Legislators from Social Media Images}, booktitle = {Proceedings of the Fourteenth International {AAAI} Conference on Web and Social Media, {ICWSM} 2020, Held Virtually, Original Venue: Atlanta, Georgia, USA, June 8-11, 2020}, pages = {726--737}, publisher = {{AAAI} Press}, year = {2020}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/7338}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/XiMLSAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13552, author = {Di Ma and Fan Zhang and David R. Bull}, title = {{BVI-DVC:} {A} Training Database for Deep Video Compression}, journal = {CoRR}, volume = {abs/2003.13552}, year = {2020}, url = {https://arxiv.org/abs/2003.13552}, eprinttype = {arXiv}, eprint = {2003.13552}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13552.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-07099, author = {Di Ma and Fan Zhang and David R. Bull}, title = {MFRNet: {A} New {CNN} Architecture for Post-Processing and In-loop Filtering}, journal = {CoRR}, volume = {abs/2007.07099}, year = {2020}, url = {https://arxiv.org/abs/2007.07099}, eprinttype = {arXiv}, eprint = {2007.07099}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-07099.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-14726, author = {Di Ma and Fan Zhang and David R. Bull}, title = {Video compression with low complexity CNN-based spatial resolution adaptation}, journal = {CoRR}, volume = {abs/2007.14726}, year = {2020}, url = {https://arxiv.org/abs/2007.14726}, eprinttype = {arXiv}, eprint = {2007.14726}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-14726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-07583, author = {Fan Zhang and Di Ma and Chen Feng and David R. Bull}, title = {Video Compression with CNN-based Post Processing}, journal = {CoRR}, volume = {abs/2009.07583}, year = {2020}, url = {https://arxiv.org/abs/2009.07583}, eprinttype = {arXiv}, eprint = {2009.07583}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-07583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09190, author = {Di Ma and Fan Zhang and David R. Bull}, title = {{CVEGAN:} {A} Perceptually-inspired {GAN} for Compressed Video Enhancement}, journal = {CoRR}, volume = {abs/2011.09190}, year = {2020}, url = {https://arxiv.org/abs/2011.09190}, eprinttype = {arXiv}, eprint = {2011.09190}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8897, author = {Di Ma and Stephen T. Kent}, title = {Requirements for Resource Public Key Infrastructure {(RPKI)} Relying Parties}, journal = {{RFC}}, volume = {8897}, pages = {1--11}, year = {2020}, url = {https://doi.org/10.17487/RFC8897}, doi = {10.17487/RFC8897}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/rfc/rfc8897.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/KajaSM19, author = {Nevrus Kaja and Adnan Shaout and Di Ma}, title = {An intelligent intrusion detection system}, journal = {Appl. Intell.}, volume = {49}, number = {9}, pages = {3235--3247}, year = {2019}, url = {https://doi.org/10.1007/s10489-019-01436-1}, doi = {10.1007/S10489-019-01436-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/KajaSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ml/MaC19, author = {Di Ma and Songcan Chen}, title = {2D compressed learning: support matrix machine with bilinear random projections}, journal = {Mach. Learn.}, volume = {108}, number = {12}, pages = {2035--2060}, year = {2019}, url = {https://doi.org/10.1007/s10994-019-05804-3}, doi = {10.1007/S10994-019-05804-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ml/MaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ZhuYMC19, author = {Yan Zhu and Ruyun Yu and Di Ma and William Cheng{-}Chung Chu}, title = {Cryptographic Attribute-Based Access Control {(ABAC)} for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens}, journal = {{IEEE} Trans. Reliab.}, volume = {68}, number = {4}, pages = {1330--1346}, year = {2019}, url = {https://doi.org/10.1109/TR.2019.2948713}, doi = {10.1109/TR.2019.2948713}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ZhuYMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acit3/KajaSM19, author = {Nevrus Kaja and Adnan Shaout and Di Ma}, title = {Fuzzy Based Threat Assessment Model {(FTAM)}}, booktitle = {International Arab Conference on Information Technology, {ACIT} 2019, Al Ain, United Arab Emirates, December 3-5, 2019}, pages = {144--149}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ACIT47987.2019.8991129}, doi = {10.1109/ACIT47987.2019.8991129}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acit3/KajaSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/NasserM19, author = {Ahmad M. K. Nasser and Di Ma}, editor = {Ziming Zhao and Qi Alfred Chen and Gail{-}Joon Ahn}, title = {Defending {AUTOSAR} Safety Critical Systems Against Code Reuse Attacks}, booktitle = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019}, pages = {15--18}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309171.3309172}, doi = {10.1145/3309171.3309172}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/NasserM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/MaKB19, author = {Di Ma and Angeliki V. Katsenou and David R. Bull}, title = {A Synthetic Video Dataset for Video Compression Evaluation}, booktitle = {2019 {IEEE} International Conference on Image Processing, {ICIP} 2019, Taipei, Taiwan, September 22-25, 2019}, pages = {1094--1098}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIP.2019.8803798}, doi = {10.1109/ICIP.2019.8803798}, timestamp = {Wed, 11 Dec 2019 16:30:23 +0100}, biburl = {https://dblp.org/rec/conf/icip/MaKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-09594, author = {Nan Xi and Di Ma and Marcus Liou and Zachary C. Steinert{-}Threlkeld and Jason Anastasopoulos and Jungseock Joo}, title = {Understanding the Political Ideology of Legislators from Social Media Images}, journal = {CoRR}, volume = {abs/1907.09594}, year = {2019}, url = {http://arxiv.org/abs/1907.09594}, eprinttype = {arXiv}, eprint = {1907.09594}, timestamp = {Tue, 30 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-09594.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/MaCM18, author = {Zhongchen Ma and Songcan Chen and Di Ma}, title = {Heterogeneous multi-output classification by structured conditional risk minimization}, journal = {Pattern Recognit. Lett.}, volume = {116}, pages = {50--57}, year = {2018}, url = {https://doi.org/10.1016/j.patrec.2018.09.011}, doi = {10.1016/J.PATREC.2018.09.011}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/MaCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiZM18, author = {Huaxin Li and Haojin Zhu and Di Ma}, title = {Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {5}, pages = {1033--1047}, year = {2018}, url = {https://doi.org/10.1109/TMC.2017.2753244}, doi = {10.1109/TMC.2017.2753244}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/LiZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbk/LiZMZH18, author = {Lei Li and Fang Zhang and Di Ma and Chuan Zhou and Xuegang Hu}, editor = {Xindong Wu and Yew{-}Soon Ong and Charu C. Aggarwal and Huanhuan Chen}, title = {Multi-target Core Network-Based Networked Multi-label Classification}, booktitle = {2018 {IEEE} International Conference on Big Knowledge, {ICBK} 2018, Singapore, November 17-18, 2018}, pages = {274--281}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICBK.2018.00044}, doi = {10.1109/ICBK.2018.00044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbk/LiZMZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/OuyangZMA18, author = {Xu Ouyang and Xi Zhang and Di Ma and Gady Agam}, title = {Generating Image Sequence from Description with {LSTM} Conditional {GAN}}, booktitle = {24th International Conference on Pattern Recognition, {ICPR} 2018, Beijing, China, August 20-24, 2018}, pages = {2456--2461}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICPR.2018.8545419}, doi = {10.1109/ICPR.2018.8545419}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/OuyangZMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ZhangMOJGA18, author = {Xi Zhang and Di Ma and Xu Ouyang and Shanshan Jiang and Lin Gan and Gady Agam}, editor = {J{\'{e}}r{\^{o}}me Lang}, title = {Layered Optical Flow Estimation Using a Deep Neural Network with a Soft Mask}, booktitle = {Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm, Sweden}, pages = {1170--1176}, publisher = {ijcai.org}, year = {2018}, url = {https://doi.org/10.24963/ijcai.2018/163}, doi = {10.24963/IJCAI.2018/163}, timestamp = {Tue, 20 Aug 2019 16:19:08 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ZhangMOJGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcs/KatsenouMB18, author = {Angeliki V. Katsenou and Di Ma and David R. Bull}, title = {Perceptually-Aligned Frame Rate Selection Using Spatio-Temporal Features}, booktitle = {2018 Picture Coding Symposium, {PCS} 2018, San Francisco, CA, USA, June 24-27, 2018}, pages = {288--292}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PCS.2018.8456274}, doi = {10.1109/PCS.2018.8456274}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/pcs/KatsenouMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/0010YQMC18, author = {Yan Zhu and Ruyun Yu and Yao Qin and Di Ma and William Cheng{-}Chung Chu}, title = {Provably Secure Cryptographic {ABAC} System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {277--288}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS.2018.00041}, doi = {10.1109/QRS.2018.00041}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/0010YQMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-03596, author = {Xi Zhang and Di Ma and Xu Ouyang and Shanshan Jiang and Lin Gan and Gady Agam}, title = {Layered Optical Flow Estimation Using a Deep Neural Network with a Soft Mask}, journal = {CoRR}, volume = {abs/1805.03596}, year = {2018}, url = {http://arxiv.org/abs/1805.03596}, eprinttype = {arXiv}, eprint = {1805.03596}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-03596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-03027, author = {Xu Ouyang and Xi Zhang and Di Ma and Gady Agam}, title = {Generating Image Sequence from Description with {LSTM} Conditional {GAN}}, journal = {CoRR}, volume = {abs/1806.03027}, year = {2018}, url = {http://arxiv.org/abs/1806.03027}, eprinttype = {arXiv}, eprint = {1806.03027}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-03027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8416, author = {Di Ma and David Mandelberg and Tim Bruijnzeels}, title = {Simplified Local Internet Number Resource Management with the {RPKI} {(SLURM)}}, journal = {{RFC}}, volume = {8416}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.17487/RFC8416}, doi = {10.17487/RFC8416}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LiMW17, author = {Hai Li and Di Ma and Renbiao Wu}, title = {A low complexity algorithm for across range unit effect correction of the moving target via range frequency polynomial-phase transform}, journal = {Digit. Signal Process.}, volume = {62}, pages = {176--186}, year = {2017}, url = {https://doi.org/10.1016/j.dsp.2016.12.001}, doi = {10.1016/J.DSP.2016.12.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/LiMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NasserMM17, author = {Ahmad M. K. Nasser and Di Ma and Priya Muralidharan}, title = {An Approach for Building Security Resilience in {AUTOSAR} Based Safety Critical Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {271--304}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.633}, doi = {10.13052/JCSM2245-1439.633}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/NasserMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiuMMZ17, author = {Jiao Liu and Di Ma and Teng{-}bo Ma and Wei Zhang}, title = {Ecosystem particle swarm optimization}, journal = {Soft Comput.}, volume = {21}, number = {7}, pages = {1667--1691}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2111-4}, doi = {10.1007/S00500-016-2111-4}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiuMMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acm/LiCZM17, author = {Huaxin Li and Qingrong Chen and Haojin Zhu and Di Ma}, editor = {John C. S. Lui and Xinbing Wang and Alexander Wolf and Yunhao Liu and Chuanping Hu}, title = {Hybrid de-anonymization across real-world heterogeneous social networks}, booktitle = {Proceedings of the {ACM} Turing 50th Celebration Conference - China, {TUR-C} 2017, Shanghai, China, May 12-14, 2017}, pages = {33:1--33:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3063955.3063988}, doi = {10.1145/3063955.3063988}, timestamp = {Tue, 20 Dec 2022 21:20:01 +0100}, biburl = {https://dblp.org/rec/conf/acm/LiCZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuMWZ17, author = {Jiafa Liu and Di Ma and Andr{\'{e}} Weimerskirch and Haojin Zhu}, editor = {Jianying Zhou and Ernesto Damiani}, title = {A Functional Co-Design towards Safe and Secure Vehicle Platooning}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {81--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055193}, doi = {10.1145/3055186.3055193}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuMWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/MaZOA17, author = {Di Ma and Xi Zhang and Xu Ouyang and Gady Agam}, editor = {Xuewen Chen and Bo Luo and Feng Luo and Vasile Palade and M. Arif Wani}, title = {Lecture Vdeo Indexing Using Boosted Margin Maximizing Neural Networks}, booktitle = {16th {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2017, Cancun, Mexico, December 18-21, 2017}, pages = {221--227}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICMLA.2017.0-155}, doi = {10.1109/ICMLA.2017.0-155}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/icmla/MaZOA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/NasserML17, author = {Ahmad M. K. Nasser and Di Ma and Sam Lauzon}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Exploiting {AUTOSAR} Safety Mechanisms to Launch Security Attacks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {73--86}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_6}, doi = {10.1007/978-3-319-64701-2\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/NasserML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-00575, author = {Di Ma and Xi Zhang and Xu Ouyang and Gady Agam}, title = {Lecture video indexing using boosted margin maximizing neural networks}, journal = {CoRR}, volume = {abs/1712.00575}, year = {2017}, url = {http://arxiv.org/abs/1712.00575}, eprinttype = {arXiv}, eprint = {1712.00575}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-00575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8211, author = {Stephen T. Kent and Di Ma}, title = {Adverse Actions by a Certification Authority {(CA)} or Repository Manager in the Resource Public Key Infrastructure {(RPKI)}}, journal = {{RFC}}, volume = {8211}, pages = {1--26}, year = {2017}, url = {https://doi.org/10.17487/RFC8211}, doi = {10.17487/RFC8211}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ZhangLFLM16, author = {Wei Zhang and Jiao Liu and Lv{-}bin Fan and Yahong Liu and Di Ma}, title = {Control strategy {PSO}}, journal = {Appl. Soft Comput.}, volume = {38}, pages = {75--86}, year = {2016}, url = {https://doi.org/10.1016/j.asoc.2015.09.030}, doi = {10.1016/J.ASOC.2015.09.030}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/ZhangLFLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/LiuGM16, author = {Jun Liu and Jinhua Guo and Di Ma}, title = {Traffic Aware Virtual Machine Packing in Cloud Data Centers}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {256--261}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.37}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.37}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatasec/LiuGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DominicCEMW16, author = {Derrick Dominic and Sumeet Chhawri and Ryan M. Eustice and Di Ma and Andr{\'{e}} Weimerskirch}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {Risk Assessment for Cooperative Automated Driving}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {47--58}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487.2994499}, doi = {10.1145/2994487.2994499}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DominicCEMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ZhangMGJA16, author = {Xi Zhang and Di Ma and Lin Gan and Shanshan Jiang and Gady Agam}, editor = {Snehasis Mukhopadhyay and ChengXiang Zhai and Elisa Bertino and Fabio Crestani and Javed Mostafa and Jie Tang and Luo Si and Xiaofang Zhou and Yi Chang and Yunyao Li and Parikshit Sondhi}, title = {{CGMOS:} Certainty Guided Minority OverSampling}, booktitle = {Proceedings of the 25th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2016, Indianapolis, IN, USA, October 24-28, 2016}, pages = {1623--1631}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2983323.2983789}, doi = {10.1145/2983323.2983789}, timestamp = {Thu, 13 Aug 2020 18:13:41 +0200}, biburl = {https://dblp.org/rec/conf/cikm/ZhangMGJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuLLZRM16, author = {Jiafa Liu and Junyi Liu and Huaxin Li and Haojin Zhu and Na Ruan and Di Ma}, title = {Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842384}, doi = {10.1109/GLOCOM.2016.7842384}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiuLLZRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiXZMLX16, author = {Huaxin Li and Zheyu Xu and Haojin Zhu and Di Ma and Shuai Li and Kai Xing}, title = {Demographics inference through Wi-Fi network traffic analysis}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524528}, doi = {10.1109/INFOCOM.2016.7524528}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiXZMLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangMGJA16, author = {Xi Zhang and Di Ma and Lin Gan and Shanshan Jiang and Gady Agam}, title = {{CGMOS:} Certainty Guided Minority OverSampling}, journal = {CoRR}, volume = {abs/1607.06525}, year = {2016}, url = {http://arxiv.org/abs/1607.06525}, eprinttype = {arXiv}, eprint = {1607.06525}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangMGJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShresthaM0LS15, author = {Babins Shrestha and Di Ma and Yan Zhu and Haoyu Li and Nitesh Saxena}, title = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2270--2283}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2436364}, doi = {10.1109/TIFS.2015.2436364}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuWMG15, author = {Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {191--202}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714602}, doi = {10.1145/2714576.2714602}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuWMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ei-imawm/MaA15, author = {Di Ma and Gady Agam}, editor = {Qian Lin and Jan P. Allebach and Zhigang Fan}, title = {Enhanced features for supervised lecture video segmentation and indexing}, booktitle = {Imaging and Multimedia Analytics in a Web and Mobile World 2015, San Francisco, California, USA, February 8-12, 2015}, series = {{SPIE} Proceedings}, volume = {9408}, pages = {940809}, publisher = {{SPIE}}, year = {2015}, url = {https://doi.org/10.1117/12.2083475}, doi = {10.1117/12.2083475}, timestamp = {Tue, 01 Aug 2023 13:43:25 +0200}, biburl = {https://dblp.org/rec/conf/ei-imawm/MaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobserv/ZhuYM15, author = {Yan Zhu and Liguang Yang and Di Ma}, editor = {Onur Altintas and Jia Zhang}, title = {Secure Snaps: {A} New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services}, booktitle = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MobServ.2015.29}, doi = {10.1109/MOBSERV.2015.29}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobserv/ZhuYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcity/LiML15, author = {Lei Li and Di Ma and Guanfeng Liu}, title = {Social Community-Oriented Social Attribute Analysis: An Empirical Study on {QQ} Group Data}, booktitle = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, Chengdu, China, December 19-21, 2015}, pages = {457--464}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SmartCity.2015.113}, doi = {10.1109/SMARTCITY.2015.113}, timestamp = {Thu, 13 Apr 2023 12:52:26 +0200}, biburl = {https://dblp.org/rec/conf/smartcity/LiML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuWMG15, author = {Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo}, title = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2015}, url = {http://eprint.iacr.org/2015/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuWMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Wang0MF14, author = {Shan{-}Biao Wang and Yan Zhu and Di Ma and Rong{-}Quan Feng}, title = {Lattice-based key exchange on small integer solution problem}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {11}, pages = {1--12}, year = {2014}, url = {https://doi.org/10.1007/s11432-014-5147-z}, doi = {10.1007/S11432-014-5147-Z}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/Wang0MF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ZhangMWL14, author = {Wei Zhang and Di Ma and Jin{-}jun Wei and Hai{-}feng Liang}, title = {A parameter selection strategy for particle swarm optimization based on particle positions}, journal = {Expert Syst. Appl.}, volume = {41}, number = {7}, pages = {3576--3584}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.10.061}, doi = {10.1016/J.ESWA.2013.10.061}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ZhangMWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangZCLRWM14, author = {Bingsheng Zhang and Zhan Qin and Si Chen and Muyuan Li and Kui Ren and Cong Wang and Di Ma}, title = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones}, journal = {{IEEE} Internet Things J.}, volume = {1}, number = {1}, pages = {33--45}, year = {2014}, url = {https://doi.org/10.1109/JIOT.2014.2297998}, doi = {10.1109/JIOT.2014.2297998}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangZCLRWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/0001MHAH14, author = {Yan Zhu and Di Ma and Changjun Hu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Secure and efficient random functions with variable-length output}, journal = {J. Netw. Comput. Appl.}, volume = {45}, pages = {121--133}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.07.033}, doi = {10.1016/J.JNCA.2014.07.033}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaS14, author = {Di Ma and Nitesh Saxena}, title = {A context-aware approach to defend against unauthorized reading and relay attacks in {RFID} systems}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2684--2695}, year = {2014}, url = {https://doi.org/10.1002/sec.404}, doi = {10.1002/SEC.404}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/PanWMZL14, author = {Jun Pan and Mi Wang and Di Ma and Qinghua Zhou and Junli Li}, title = {Seamline Network Refinement Based on Area Voronoi Diagrams With Overlap}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {52}, number = {3}, pages = {1658--1666}, year = {2014}, url = {https://doi.org/10.1109/TGRS.2013.2253110}, doi = {10.1109/TGRS.2013.2253110}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/PanWMZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/RenWMJ14, author = {Kui Ren and Qian Wang and Di Ma and Xiaohua Jia}, title = {Securing emerging short range wireless communications: the state of the art}, journal = {{IEEE} Wirel. Commun.}, volume = {21}, number = {6}, pages = {153--159}, year = {2014}, url = {https://doi.org/10.1109/MWC.2014.7000983}, doi = {10.1109/MWC.2014.7000983}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/RenWMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drr/MaXA14, author = {Di Ma and Bingqing Xie and Gady Agam}, editor = {Bertrand Co{\"{u}}asnon and Eric K. Ringger}, title = {A machine learning based lecture video segmentation and indexing algorithm}, booktitle = {Document Recognition and Retrieval XXI, San Francisco, California, USA, February 5-6, 2014}, series = {{SPIE} Proceedings}, volume = {9021}, pages = {90210V--90210V--8}, publisher = {{SPIE}}, year = {2014}, url = {https://doi.org/10.1117/12.2042602}, doi = {10.1117/12.2042602}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drr/MaXA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaSXZ13, author = {Di Ma and Nitesh Saxena and Tuo Xiang and Yan Zhu}, title = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy via Location Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {57--69}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.89}, doi = {10.1109/TDSC.2012.89}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/HaleviLMSVX13, author = {Tzipora Halevi and Haoyu Li and Di Ma and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, title = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {1}, number = {2}, pages = {307--318}, year = {2013}, url = {https://doi.org/10.1109/TETC.2013.2290537}, doi = {10.1109/TETC.2013.2290537}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuAHMW13, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Di Ma and Shan{-}Biao Wang}, title = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based on Role-Key Hierarchy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2138--2153}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2287858}, doi = {10.1109/TIFS.2013.2287858}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/ZhuHML13, author = {Yan Zhu and Changjun Hu and Di Ma and Jin Li}, editor = {Fatos Xhafa and Leonard Barolli and Dritan Nace and Salvatore Venticinque and Alain Bui}, title = {Cryptographic Spatio-temporal Predicates for Location-Based Services}, booktitle = {Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30, 2013}, pages = {84--91}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/3PGCIC.2013.19}, doi = {10.1109/3PGCIC.2013.19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/ZhuHML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001MHH13, author = {Yan Zhu and Di Ma and Changjun Hu and Dijiang Huang}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {How to use attribute-based encryption to implement role-based access control in the cloud}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {33--40}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484411}, doi = {10.1145/2484402.2484411}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001MHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaZY13, author = {Di Ma and Yan Zhu and Mengyang Yu}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {End-to-end aggregate authentication of time-series data}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {51--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484400}, doi = {10.1145/2484389.2484400}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drr/MaA13, author = {Di Ma and Gady Agam}, editor = {Richard Zanibbi and Bertrand Co{\"{u}}asnon}, title = {A super resolution framework for low resolution document image {OCR}}, booktitle = {Document Recognition and Retrieval XX, part of the IS{\&}T-SPIE Electronic Imaging Symposium, Burlingame, California, USA, February 5-7, 2013, Proceedings}, series = {{SPIE} Proceedings}, volume = {8658}, pages = {86580P}, publisher = {{SPIE}}, year = {2013}, url = {https://doi.org/10.1117/12.2008354}, doi = {10.1117/12.2008354}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drr/MaA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/YangTMSM13, author = {Chao Yang and Ye Tian and Di Ma and Shuo Shen and Wei Mao}, title = {A Server Friendly File Synchronization Mechanism for Cloud Storage}, booktitle = {2013 {IEEE} International Conference on Green Computing and Communications (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013}, pages = {314--316}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.70}, doi = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.70}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/greencom/YangTMSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhuMHH13, author = {Yan Zhu and Di Ma and Dijiang Huang and Changjun Hu}, editor = {Mario Gerla and Dijiang Huang}, title = {Enabling secure location-based services in mobile cloud computing}, booktitle = {Proceedings of the second {ACM} {SIGCOMM} workshop on Mobile cloud computing, MCC@SIGCOMM 2013, Hong Kong, China, August 16, 2013}, pages = {27--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491266.2491272}, doi = {10.1145/2491266.2491272}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhuMHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/MaSL13, author = {Di Ma and Dandan Song and Lejian Liao}, editor = {Jianyong Wang and Hui Xiong and Yoshiharu Ishikawa and Jianliang Xu and Junfeng Zhou}, title = {Incorporating Social Actions into Recommender Systems}, booktitle = {Web-Age Information Management - 14th International Conference, {WAIM} 2013, Beidaihe, China, June 14-16, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7923}, pages = {698--704}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38562-9\_71}, doi = {10.1007/978-3-642-38562-9\_71}, timestamp = {Thu, 28 Jan 2021 11:41:18 +0100}, biburl = {https://dblp.org/rec/conf/waim/MaSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhuMWF13, author = {Yan Zhu and Di Ma and Shan{-}Biao Wang and Rong{-}Quan Feng}, editor = {Kui Ren and Xue Liu and Weifa Liang and Ming Xu and Xiaohua Jia and Kai Xing}, title = {Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices}, booktitle = {Wireless Algorithms, Systems, and Applications - 8th International Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7992}, pages = {42--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39701-1\_4}, doi = {10.1007/978-3-642-39701-1\_4}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/wasa/ZhuMWF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiMSSZ13, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {25--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462101}, doi = {10.1145/2462096.2462101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4010, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, title = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures}, journal = {CoRR}, volume = {abs/1302.4010}, year = {2013}, url = {http://arxiv.org/abs/1302.4010}, eprinttype = {arXiv}, eprint = {1302.4010}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZWRWM13, author = {Bingsheng Zhang and Zhan Qin and Junfei Wang and Kui Ren and Cong Wang and Di Ma}, title = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2013}, url = {http://eprint.iacr.org/2013/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZWRWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangLM12, author = {Bang Wang and Hock{-}Beng Lim and Di Ma}, title = {A coverage-aware clustering protocol for wireless sensor networks}, journal = {Comput. Networks}, volume = {56}, number = {5}, pages = {1599--1611}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.01.016}, doi = {10.1016/J.COMNET.2012.01.016}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/ZhuWHAM12, author = {Yan Zhu and Shan{-}Biao Wang and Hongxin Hu and Gail{-}Joon Ahn and Di Ma}, title = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {21}, number = {3}, pages = {165--198}, year = {2012}, url = {https://doi.org/10.1142/S0218843012410018}, doi = {10.1142/S0218843012410018}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/MaEWL12, author = {Di Ma and Meng Joo Er and Bang Wang and Hock Beng Lim}, title = {Range-free wireless sensor networks localization based on hop-count quantization}, journal = {Telecommun. Syst.}, volume = {50}, number = {3}, pages = {199--213}, year = {2012}, url = {https://doi.org/10.1007/s11235-010-9395-y}, doi = {10.1007/S11235-010-9395-Y}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/MaEWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/PietroMST12, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {Self-healing in unattended wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {9}, number = {1}, pages = {7:1--7:21}, year = {2012}, url = {https://doi.org/10.1145/2379799.2379806}, doi = {10.1145/2379799.2379806}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/PietroMST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/WangLM12, author = {Bang Wang and Hock{-}Beng Lim and Di Ma}, title = {Broadcast based on layered diffusion in wireless \emph{ad hoc} and sensor networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {12}, number = {1}, pages = {99--115}, year = {2012}, url = {https://doi.org/10.1002/wcm.892}, doi = {10.1002/WCM.892}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/WangLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drr/MaA12, author = {Di Ma and Gady Agam}, editor = {Christian Viard{-}Gaudin and Richard Zanibbi}, title = {Lecture video segmentation and indexing}, booktitle = {Document Recognition and Retrieval XIX, part of the IS{\&}T-SPIE Electronic Imaging Symposium, Burlingame, California, USA, January 25-26, 2012, Proceedings}, series = {{SPIE} Proceedings}, volume = {8297}, pages = {82970V}, publisher = {{SPIE}}, year = {2012}, url = {https://doi.org/10.1117/12.910594}, doi = {10.1117/12.910594}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drr/MaA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HaleviMSX12, author = {Tzipora Halevi and Di Ma and Nitesh Saxena and Tuo Xiang}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor Data}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {379--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_22}, doi = {10.1007/978-3-642-33167-1\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuWMHA12, author = {Yan Zhu and Shan{-}Biao Wang and Di Ma and Hongxin Hu and Gail{-}Joon Ahn}, title = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile devices}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {949--954}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503235}, doi = {10.1109/GLOCOM.2012.6503235}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MaSHMCC12, author = {Di Ma and Sumei Sun and Chin Keong Ho and Daniel Wai Meng Mok and Chee{-}Kong Chui and Stephen Kin Yong Chang}, title = {Wireless medical implant: {A} case study on artificial pancreas}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {6096--6100}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364864}, doi = {10.1109/ICC.2012.6364864}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MaSHMCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhuMW12, author = {Yan Zhu and Di Ma and Shan{-}Biao Wang}, title = {Secure Data Retrieval of Outsourced Data with Complex Query Support}, booktitle = {32nd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012}, pages = {481--490}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCSW.2012.91}, doi = {10.1109/ICDCSW.2012.91}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhuMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12, author = {Tzipora Halevi and Sein Lin and Di Ma and Anudath K. Prasad and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, editor = {Silvia Giordano and Marc Langheinrich and Albrecht Schmidt}, title = {Sensing-enabled defenses to {RFID} unauthorized reading and relay attacks without changing the usage model}, booktitle = {2012 {IEEE} International Conference on Pervasive Computing and Communications, Lugano, Switzerland, March 19-23, 2012}, pages = {227--234}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerCom.2012.6199835}, doi = {10.1109/PERCOM.2012.6199835}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaPSX12, author = {Di Ma and Anudath K. Prasad and Nitesh Saxena and Tuo Xiang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Location-aware and safer cards: enhancing {RFID} security and privacy via location sensing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {51--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185457}, doi = {10.1145/2185448.2185457}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MaPSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/MaS11, author = {Di Ma and Claudio Soriente}, title = {Building Trust for lambda-Congenial Secret Groups}, booktitle = {2011 International Conference on Broadband, Wireless Computing, Communication and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011}, pages = {222--229}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BWCCA.2011.35}, doi = {10.1109/BWCCA.2011.35}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/MaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/MaJ11, author = {Di Ma and Hongxia Jin}, title = {Content usage tracking in superdistribution}, booktitle = {2011 {IEEE} Consumer Communications and Networking Conference, {CCNC} 2011, Las Vegas, NV, 9-12 January, 2011}, pages = {912--917}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CCNC.2011.5766640}, doi = {10.1109/CCNC.2011.5766640}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/MaJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LuLTLWLM11, author = {Sifei Lu and Reuben Mingguang Li and William{-}Chandra Tjhi and Gary Kee Khoon Lee and Long Wang and Xiaorong Li and Di Ma}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {618--622}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.95}, doi = {10.1109/CLOUDCOM.2011.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/LuLTLWLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/MaP11, author = {Di Ma and Anudath K. Prasad}, editor = {Haohong Wang and Jin Li and George N. Rouskas and Xiaobo Zhou}, title = {A Context-Aware Approach for Enhanced Security and Privacy in {RFID} Electronic Toll Collection Systems}, booktitle = {Proceedings of 20th International Conference on Computer Communications and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCCN.2011.6006281}, doi = {10.1109/ICCCN.2011.6006281}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/MaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/HeTLMMFF11, author = {Yaobin He and Haoyu Tan and Wuman Luo and Huajian Mao and Di Ma and Shengzhong Feng and Jianping Fan}, title = {{MR-DBSCAN:} An Efficient Parallel Density-Based Clustering Algorithm Using MapReduce}, booktitle = {17th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2011, Tainan, Taiwan, December 7-9, 2011}, pages = {473--480}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICPADS.2011.83}, doi = {10.1109/ICPADS.2011.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/HeTLMMFF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/MaWTM11, author = {Di Ma and Liming Wang and Ye Tian and Wei Mao}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Host-identifier-based scheme for source accountability of the internet}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {539--546}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990557}, doi = {10.1109/INM.2011.5990557}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/MaWTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/HabibiAM11, author = {Mohammad Hassan Habibi and Mohammad Reza Aref and Di Ma}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Addressing Flaws in {RFID} Authentication Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {216--235}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_17}, doi = {10.1007/978-3-642-25578-6\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/HabibiAM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/MaEWL10, author = {Di Ma and Meng Joo Er and Bang Wang and Hock{-}Beng Lim}, title = {A novel approach toward source-to-sink distance estimation in wireless sensor networks}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {5}, pages = {384--386}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.05.100005}, doi = {10.1109/LCOMM.2010.05.100005}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/MaEWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangLMF10, author = {Bang Wang and Hock{-}Beng Lim and Di Ma and Cheng Fu}, title = {The hop count shift problem and its impacts on protocol design in wireless ad hoc networks}, journal = {Telecommun. Syst.}, volume = {44}, number = {1-2}, pages = {49--60}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9221-6}, doi = {10.1007/S11235-009-9221-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/WangLMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MaEW10, author = {Di Ma and Meng Joo Er and Bang Wang}, title = {Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {6}, pages = {2998--3011}, year = {2010}, url = {https://doi.org/10.1109/TVT.2010.2048346}, doi = {10.1109/TVT.2010.2048346}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/MaEW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/MaT10, author = {Di Ma and Gene Tsudik}, title = {Security and privacy in emerging wireless networks}, journal = {{IEEE} Wirel. Commun.}, volume = {17}, number = {5}, pages = {12--21}, year = {2010}, url = {https://doi.org/10.1109/MWC.2010.5601953}, doi = {10.1109/MWC.2010.5601953}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/MaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsn/LimMWKIW10, author = {Hock{-}Beng Lim and Di Ma and Bang Wang and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Kenneth L. Watkin}, title = {A Soldier Health Monitoring System for Military Applications}, booktitle = {International Conference on Body Sensor Networks, {BSN} 2010, Singapore, 7-9 June, 2010}, pages = {246--249}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BSN.2010.58}, doi = {10.1109/BSN.2010.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bsn/LimMWKIW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icarcv/MaELW10, author = {Di Ma and Meng Joo Er and Hock{-}Beng Lim and Bang Wang}, title = {A lower bound on expected localization error in wireless sensor network}, booktitle = {11th International Conference on Control, Automation, Robotics and Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings}, pages = {96--103}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICARCV.2010.5707952}, doi = {10.1109/ICARCV.2010.5707952}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icarcv/MaELW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/MaT10, author = {Di Ma and Gene Tsudik}, title = {{IRRES:} Intrusion-Resilient Remote Email Storage}, booktitle = {30th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy}, pages = {72--76}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCSW.2010.38}, doi = {10.1109/ICDCSW.2010.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/MaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/WangLMY10, author = {Bang Wang and Hock{-}Beng Lim and Di Ma and Daiqin Yang}, editor = {Sajal K. Das and Anke Xue}, title = {A Coverage-Aware Clustering Protocol for Wireless Sensor Networks}, booktitle = {Sixth International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2010, Hangzhou, China, December 20-22, 2010}, pages = {85--90}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MSN.2010.19}, doi = {10.1109/MSN.2010.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/WangLMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangLM09, author = {Bang Wang and Hock{-}Beng Lim and Di Ma}, title = {A survey of movement strategies for improving network coverage in wireless sensor networks}, journal = {Comput. Commun.}, volume = {32}, number = {13-14}, pages = {1427--1436}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2009.05.004}, doi = {10.1016/J.COMCOM.2009.05.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/MaST09, author = {Di Ma and Claudio Soriente and Gene Tsudik}, title = {New adversary and new threats: security in unattended sensor networks}, journal = {{IEEE} Netw.}, volume = {23}, number = {2}, pages = {43--48}, year = {2009}, url = {https://doi.org/10.1109/MNET.2009.4804335}, doi = {10.1109/MNET.2009.4804335}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/MaST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tos/MaT09, author = {Di Ma and Gene Tsudik}, title = {A new approach to secure logging}, journal = {{ACM} Trans. Storage}, volume = {5}, number = {1}, pages = {2:1--2:21}, year = {2009}, url = {https://doi.org/10.1145/1502777.1502779}, doi = {10.1145/1502777.1502779}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tos/MaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/MaWLE10, author = {Di Ma and Bang Wang and Hock Beng Lim and Meng Joo Er}, title = {Hop-Count Based Node-to-Anchor Distance Estimation in Wireless Sensor Networks}, booktitle = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2009, Las Vegas, NV, USA, 10-13 Jan., 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CCNC.2009.4784748}, doi = {10.1109/CCNC.2009.4784748}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/MaWLE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/MaLWM09, author = {Di Ma and Xiaodong Li and Wei Wang and Wei Mao}, editor = {Geuk Lee and Daniel Howard and Jeong Jin Kang and Dominik Slezak and Tae Nam Ahn and Chung{-}Huang Yang}, title = {An application of host identity tags to {DKIM} for identifying signers}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {321}, pages = {138--142}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644993.1645018}, doi = {10.1145/1644993.1645018}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ichit/MaLWM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/WangLLMF09, author = {Bang Wang and Minghui Li and Hock Beng Lim and Di Ma and Cheng Fu}, editor = {Subhas Chandra Misra and Isaac Woungang and Sudip Misra}, title = {Energy Efficient Information Processing in Wireless Sensor Networks}, booktitle = {Guide to Wireless Sensor Networks}, series = {Computer Communications and Networks}, pages = {1--26}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-1-84882-218-4\_1}, doi = {10.1007/978-1-84882-218-4\_1}, timestamp = {Wed, 06 Mar 2019 09:41:12 +0100}, biburl = {https://dblp.org/rec/series/ccn/WangLLMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/LimMFWE09, author = {Hock Beng Lim and Di Ma and Cheng Fu and Bang Wang and Meng Joo Er}, editor = {Subhas Chandra Misra and Isaac Woungang and Sudip Misra}, title = {Adaptive Distributed Resource Allocation for Sensor Networks}, booktitle = {Guide to Wireless Sensor Networks}, series = {Computer Communications and Networks}, pages = {347--377}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-1-84882-218-4\_14}, doi = {10.1007/978-1-84882-218-4\_14}, timestamp = {Wed, 06 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ccn/LimMFWE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/LimWFPM08, author = {Hock Beng Lim and Bang Wang and Cheng Fu and Arpan Phull and Di Ma}, title = {{WISDOM:} Simulation Framework for Middleware Services in Wireless Sensor Networks}, booktitle = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2008, Las Vegas, NV, USA, January 10-12, 2008}, pages = {1269--1270}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ccnc08.2007.303}, doi = {10.1109/CCNC08.2007.303}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/LimWFPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ma08, author = {Di Ma}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Practical forward secure sequential aggregate signatures}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {341--352}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368361}, doi = {10.1145/1368310.1368361}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ma08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MaT08, author = {Di Ma and Gene Tsudik}, editor = {Vijay Atluri}, title = {A New Approach to Secure Logging}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {48--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_4}, doi = {10.1007/978-3-540-70567-3\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/LimWFPM08, author = {Hock{-}Beng Lim and Bang Wang and Cheng Fu and Arpan Phull and Di Ma}, title = {A Middleware Services Simulation Platform for Wireless Sensor Networks}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China}, pages = {168--173}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.Workshops.2008.101}, doi = {10.1109/ICDCS.WORKSHOPS.2008.101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/LimWFPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/MaEL08, author = {Di Ma and Meng Joo Er and Hock{-}Beng Lim}, title = {A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Singapore, 12-15 October 2008}, pages = {2792--2797}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICSMC.2008.4811719}, doi = {10.1109/ICSMC.2008.4811719}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/MaEL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroMST08, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks}, booktitle = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008), Napoli, Italy, October 6-8, 2008}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SRDS.2008.23}, doi = {10.1109/SRDS.2008.23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroMST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/MaT08, author = {Di Ma and Gene Tsudik}, editor = {Sandeep S. Kulkarni and Andr{\'{e}} Schiper}, title = {{DISH:} Distributed Self-Healing}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, {SSS} 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5340}, pages = {47--62}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89335-6\_7}, doi = {10.1007/978-3-540-89335-6\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sss/MaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT08, author = {Di Ma and Gene Tsudik}, title = {{DISH:} Distributed Self-Healing in Unattended Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2008}, url = {http://eprint.iacr.org/2008/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT08a, author = {Di Ma and Gene Tsudik}, title = {A New Approach to Secure Logging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2008}, url = {http://eprint.iacr.org/2008/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/WuMD07, author = {Yongdong Wu and Di Ma and Robert H. Deng}, title = {Flexible Access Control to {JPEG} 2000 Image Code-Streams}, journal = {{IEEE} Trans. Multim.}, volume = {9}, number = {6}, pages = {1314--1324}, year = {2007}, url = {https://doi.org/10.1109/TMM.2007.902865}, doi = {10.1109/TMM.2007.902865}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/WuMD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Ma07, author = {Di Ma}, editor = {Ed Dawson and Duncan S. Wong}, title = {Secure Feedback Service in Wireless Sensor Networks}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {116--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_11}, doi = {10.1007/978-3-540-72163-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/Ma07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaT07, author = {Di Ma and Gene Tsudik}, title = {Extended Abstract: Forward-Secure Sequential Aggregate Authentication}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {86--91}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.18}, doi = {10.1109/SP.2007.18}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT07, author = {Di Ma and Gene Tsudik}, title = {Forward-Secure Sequential Aggregate Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2007}, url = {http://eprint.iacr.org/2007/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isqed/Ma06, author = {Di Ma}, title = {Successful {IP} Business Models}, booktitle = {7th International Symposium on Quality of Electronic Design {(ISQED} 2006), 27-29 March 2006, San Jose, CA, {USA}}, pages = {15--18}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISQED.2006.127}, doi = {10.1109/ISQED.2006.127}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isqed/Ma06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/DengMSW05, author = {Robert H. Deng and Di Ma and Weizhong Shao and Yongdong Wu}, title = {Scalable trusted online dissemination of {JPEG2000} images}, journal = {Multim. Syst.}, volume = {11}, number = {1}, pages = {60--67}, year = {2005}, url = {https://doi.org/10.1007/s00530-005-0190-7}, doi = {10.1007/S00530-005-0190-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/DengMSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaDPZ05, author = {Di Ma and Robert H. Deng and HweeHwa Pang and Jianying Zhou}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Authenticating Query Results in Data Publishing}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {376--388}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_32}, doi = {10.1007/11602897\_32}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaDPZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Ma04, author = {Di Ma}, title = {Bounding the stack size of interrupt-driven programs}, school = {Purdue University, {USA}}, year = {2004}, url = {https://docs.lib.purdue.edu/dissertations/AAI3154689}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Ma04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChatterjeeMMZHP04, author = {Krishnendu Chatterjee and Di Ma and Rupak Majumdar and Tian Zhao and Thomas A. Henzinger and Jens Palsberg}, title = {Stack size analysis for interrupt-driven programs}, journal = {Inf. Comput.}, volume = {194}, number = {2}, pages = {144--174}, year = {2004}, url = {https://doi.org/10.1016/j.ic.2004.06.001}, doi = {10.1016/J.IC.2004.06.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ChatterjeeMMZHP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WuM04, author = {Hongjun Wu and Di Ma}, title = {Efficient and secure encryption schemes for {JPEG2000}}, booktitle = {2004 {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2004, Montreal, Quebec, Canada, May 17-21, 2004}, pages = {869--872}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICASSP.2004.1327249}, doi = {10.1109/ICASSP.2004.1327249}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/WuM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWMZD04, author = {Tieyan Li and Yongdong Wu and Di Ma and Huafei Zhu and Robert H. Deng}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Flexible Verification of {MPEG-4} Stream in Peer-to-Peer {CDN}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {79--91}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_7}, doi = {10.1007/978-3-540-30191-2\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiWMZD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaDWL04, author = {Di Ma and Robert H. Deng and Yongdong Wu and Tieyan Li}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Dynamic Access Control for Multi-privileged Group Communications}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {508--519}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_39}, doi = {10.1007/978-3-540-30191-2\_39}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaDWL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WuMD04, author = {Yongdong Wu and Di Ma and Robert H. Deng}, title = {Progressive protection of jpeg2000 codestreams}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {3447--3450}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1421856}, doi = {10.1109/ICIP.2004.1421856}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/WuMD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/ChatterjeeMMZHP03, author = {Krishnendu Chatterjee and Di Ma and Rupak Majumdar and Tian Zhao and Thomas A. Henzinger and Jens Palsberg}, editor = {Radhia Cousot}, title = {Stack Size Analysis for Interrupt-Driven Programs}, booktitle = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego, CA, USA, June 11-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2694}, pages = {109--126}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44898-5\_7}, doi = {10.1007/3-540-44898-5\_7}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sas/ChatterjeeMMZHP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftrtft/PalsbergM02, author = {Jens Palsberg and Di Ma}, editor = {Werner Damm and Ernst{-}R{\"{u}}diger Olderog}, title = {A Typed Interrupt Calculus}, booktitle = {Formal Techniques in Real-Time and Fault-Tolerant Systems, 7th International Symposium, {FTRTFT} 2002, Co-sponsored by {IFIP} {WG} 2.2, Oldenburg, Germany, September 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2469}, pages = {291--310}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45739-9\_18}, doi = {10.1007/3-540-45739-9\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ftrtft/PalsbergM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WuMX02, author = {Yongdong Wu and Di Ma and Changsheng Xu}, editor = {Alfred Menezes and Palash Sarkar}, title = {Efficient Object-Based Stream Authentication}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {354--367}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_28}, doi = {10.1007/3-540-36231-2\_28}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/WuMX02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PalsbergKKMSZ00, author = {Jens Palsberg and S. Krishnaswamy and Minseok Kwon and Di Ma and Qiuyun Shao and Y. Zhang}, title = {Experience with Software Watermarking}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {308--316}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898885}, doi = {10.1109/ACSAC.2000.898885}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PalsbergKKMSZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/Ma85, author = {Di Ma}, title = {A Physical and SPICE-Compatible Model for the {MOS} Depletion Device}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {4}, number = {3}, pages = {349--356}, year = {1985}, url = {https://doi.org/10.1109/TCAD.1985.1270131}, doi = {10.1109/TCAD.1985.1270131}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/Ma85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.