BibTeX records: Di Ma

download as .bib file

@article{DBLP:journals/access/BazziSM24,
  author       = {Abir Bazzi and
                  Adnan Shaout and
                  Di Ma},
  title        = {A Novel Variability-Rich Scheme for Software Updates of Automotive
                  Systems},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {79530--79548},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3409629},
  doi          = {10.1109/ACCESS.2024.3409629},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BazziSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/YaoWMCM24,
  author       = {Xianshuang Yao and
                  Yao Wang and
                  Di Ma and
                  Shengxian Cao and
                  Qingchuan Ma},
  title        = {Fractional-integer-order echo state network for time series prediction},
  journal      = {Appl. Soft Comput.},
  volume       = {153},
  pages        = {111289},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.111289},
  doi          = {10.1016/J.ASOC.2024.111289},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/YaoWMCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LuZCFZM24,
  author       = {Hai Lu and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Rongquan Feng and
                  Lejun Zhang and
                  Di Ma},
  title        = {Efficient Key Generation on Lattice Cryptography for Privacy Protection
                  in Mobile IoT Crowdsourcing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1893--1909},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3328719},
  doi          = {10.1109/JIOT.2023.3328719},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LuZCFZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoZCZFM24,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Lejun Zhang and
                  Rongquan Feng and
                  Di Ma},
  title        = {Privacy-Preserving Queries Using Multisource Private Data Counting
                  on Real Numbers in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11353--11367},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3329660},
  doi          = {10.1109/JIOT.2023.3329660},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoZCZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ChoeHM24,
  author       = {Kwang{-}Il Choe and
                  Xiaoxia Huang and
                  Di Ma},
  title        = {Uncertain multi-period project adjustment and selection under the
                  carbon tax and carbon quota policies},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {1},
  pages        = {619--637},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-231970},
  doi          = {10.3233/JIFS-231970},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/ChoeHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/ChoeHM24,
  author       = {Kwang{-}Il Choe and
                  Xiaoxia Huang and
                  Di Ma},
  title        = {Uncertain mean-risk index portfolio selection considering inflation:
                  Chaos adaptive genetic algorithm},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {15},
  number       = {4},
  pages        = {1261--1275},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13042-023-01966-8},
  doi          = {10.1007/S13042-023-01966-8},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/ChoeHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/MaZB24,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {{CVEGAN:} {A} perceptually-inspired {GAN} for Compressed Video Enhancement},
  journal      = {Signal Process. Image Commun.},
  volume       = {127},
  pages        = {117127},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.image.2024.117127},
  doi          = {10.1016/J.IMAGE.2024.117127},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/MaZB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuZCM24,
  author       = {Hai Lu and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Di Ma},
  title        = {Toward Efficient Key Extraction of {LBC} Over Ring: Fast Non-Spherical
                  G-Lattice Sampler and Optimized Perturbation Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4301--4315},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376206},
  doi          = {10.1109/TIFS.2024.3376206},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuZCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangYM24,
  author       = {Linxi Zhang and
                  Xuke Yan and
                  Di Ma},
  title        = {Efficient and Effective In-Vehicle Intrusion Detection System using
                  Binarized Convolutional Neural Network},
  booktitle    = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications,
                  Vancouver, BC, Canada, May 20-23, 2024},
  pages        = {2299--2307},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/INFOCOM52122.2024.10621400},
  doi          = {10.1109/INFOCOM52122.2024.10621400},
  timestamp    = {Tue, 20 Aug 2024 13:54:36 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaMLL23,
  author       = {Zhoujun Ma and
                  Di Ma and
                  Mengjie Lv and
                  Yutong Liu},
  title        = {Virtual Machine Migration Techniques for Optimizing Energy Consumption
                  in Cloud Data Centers},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {86739--86753},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3305268},
  doi          = {10.1109/ACCESS.2023.3305268},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaMLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eeel/PengLPM23,
  author       = {Weiping Peng and
                  Jiabao Liu and
                  Yuan Ping and
                  Di Ma},
  title        = {Model Protection Scheme Against Distillation Attack in Internet of
                  Vehicles},
  journal      = {{EAI} Endorsed Trans. e Learn.},
  volume       = {8},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.4108/eetel.v8i3.3318},
  doi          = {10.4108/EETEL.V8I3.3318},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eeel/PengLPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eeel/PengMSCL23,
  author       = {Weiping Peng and
                  Di Ma and
                  Cheng Song and
                  Daochen Cheng and
                  Jiabao Liu},
  title        = {A K-Anonymous Location Privacy-Preserving Scheme for Mobile Terminals},
  journal      = {{EAI} Endorsed Trans. e Learn.},
  volume       = {9},
  year         = {2023},
  url          = {https://doi.org/10.4108/eetel.4468},
  doi          = {10.4108/EETEL.4468},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eeel/PengMSCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YaoWCMS23,
  author       = {Ruizhe Yao and
                  Ning Wang and
                  Peng Chen and
                  Di Ma and
                  Xianjun Sheng},
  title        = {A CNN-transformer hybrid approach for an intrusion detection system
                  in advanced metering infrastructure},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {13},
  pages        = {19463--19486},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14121-2},
  doi          = {10.1007/S11042-022-14121-2},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YaoWCMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/KasterM23,
  author       = {Robert Kaster and
                  Di Ma},
  title        = {Digital Shadows for Remote Automotive {SW} Verification},
  booktitle    = {Proceedings of Cyber-Physical Systems and Internet of Things Week
                  2023, CPS-IoT Week 2023 Workshops, San Antonio, TX, USA, May 9-12,
                  2023},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576914.3587488},
  doi          = {10.1145/3576914.3587488},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpsweek/KasterM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imw2/FengJQZKKCSLYHZ23,
  author       = {Daohuan Feng and
                  Yi Jiang and
                  Yunsong Qiu and
                  Yuhong Zheng and
                  Harry Kim and
                  Jaewoo Kim and
                  Jian Chu and
                  Guangsu Shao and
                  Yucheng Liao and
                  Chen Yang and
                  Minrui Hu and
                  Wenli Zhao and
                  Linjiang Xia and
                  Jianfeng Xiao and
                  Di Ma and
                  Yuan Cheng and
                  Xiangbo Kong and
                  Chao Lin and
                  Tianming Li and
                  Yongjie Li and
                  Jingheng Meng and
                  Kai Shao and
                  Yan Wang and
                  Xiaoan Yang and
                  Xiang Liu and
                  Qinghua Han and
                  Huiming Li and
                  Yanzhe Tang and
                  Mingde Liu and
                  Eric Wu and
                  Xiaoping Li and
                  Renrui Huang and
                  Mingtang Zhang and
                  Long Hou and
                  Xuan Pan and
                  Xinwen Jin and
                  Shuiping Zhao and
                  Dh Han and
                  Ted Park and
                  Deyuan Xiao and
                  Chao Zhao and
                  Abraham Yoo},
  title        = {Vertical Channel Transistor {(VCT)} as Access Transistor for Future
                  4F\({}^{\mbox{2}}\) {DRAM} Architecture},
  booktitle    = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA,
                  May 21-24, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IMW56887.2023.10145977},
  doi          = {10.1109/IMW56887.2023.10145977},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imw2/FengJQZKKCSLYHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangM22,
  author       = {Linxi Zhang and
                  Di Ma},
  title        = {A Hybrid Approach Toward Efficient and Accurate Intrusion Detection
                  for In-Vehicle Networks},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {10852--10866},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3145007},
  doi          = {10.1109/ACCESS.2022.3145007},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangYM22,
  author       = {Linxi Zhang and
                  Xuke Yan and
                  Di Ma},
  title        = {A Binarized Neural Network Approach to Accelerate in-Vehicle Network
                  Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {123505--123520},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3208091},
  doi          = {10.1109/ACCESS.2022.3208091},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/GuoZCZMC22,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  E. Chen and
                  Guizhen Zhu and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Continuous improvement of script-driven verifiable random functions
                  for reducing computing power in blockchain consensus protocols},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {15},
  number       = {1},
  pages        = {304--323},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12083-021-01243-x},
  doi          = {10.1007/S12083-021-01243-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/GuoZCZMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/MaZB22,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {{BVI-DVC:} {A} Training Database for Deep Video Compression},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {24},
  pages        = {3847--3858},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMM.2021.3108943},
  doi          = {10.1109/TMM.2021.3108943},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/MaZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiZCXMMHX22,
  author       = {Yanbiao Li and
                  Hui Zou and
                  Yuxuan Chen and
                  Yinbo Xu and
                  Zhuoran Ma and
                  Di Ma and
                  Ying Hu and
                  Gaogang Xie},
  title        = {The Hanging {ROA:} {A} Secure and Scalable Encoding Scheme for Route
                  Origin Authorization},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications,
                  London, United Kingdom, May 2-5, 2022},
  pages        = {21--30},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOM48880.2022.9796844},
  doi          = {10.1109/INFOCOM48880.2022.9796844},
  timestamp    = {Tue, 28 Jun 2022 08:49:13 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiZCXMMHX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/MaC21,
  author       = {Di Ma and
                  Songcan Chen},
  title        = {Semi-blind compressed sensing via adaptive dictionary learning and
                  one-pass online extension},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {9},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-019-9945-2},
  doi          = {10.1007/S11432-019-9945-2},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/MaC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/ZhangMFB21,
  author       = {Fan Zhang and
                  Di Ma and
                  Chen Feng and
                  David R. Bull},
  title        = {Video Compression With CNN-Based Postprocessing},
  journal      = {{IEEE} Multim.},
  volume       = {28},
  number       = {4},
  pages        = {74--83},
  year         = {2021},
  url          = {https://doi.org/10.1109/MMUL.2021.3052437},
  doi          = {10.1109/MMUL.2021.3052437},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeemm/ZhangMFB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/SunM21,
  author       = {Changxin Sun and
                  Di Ma},
  title        = {SVM-based global vision system of sports competition and action recognition},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {40},
  number       = {2},
  pages        = {2265--2276},
  year         = {2021},
  url          = {https://doi.org/10.3233/JIFS-189224},
  doi          = {10.3233/JIFS-189224},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/SunM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/MaZB21,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {MFRNet: {A} New {CNN} Architecture for Post-Processing and In-loop
                  Filtering},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {15},
  number       = {2},
  pages        = {378--387},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSTSP.2020.3043064},
  doi          = {10.1109/JSTSP.2020.3043064},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jstsp/MaZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/KatsenouDMB21,
  author       = {Angeliki V. Katsenou and
                  Goce Dimitrov and
                  Di Ma and
                  David R. Bull},
  title        = {BVI-SynTex: {A} Synthetic Video Texture Dataset for Video Compression
                  and Quality Assessment},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {23},
  pages        = {26--38},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMM.2020.2976591},
  doi          = {10.1109/TMM.2020.2976591},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/KatsenouDMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/0010SWMC21,
  author       = {Yan Zhu and
                  Weijing Song and
                  Di Wang and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {{TA-SPESC:} Toward Asset-Driven Smart Contract Language Supporting
                  Ownership Transaction and Rule-Based Generation on Blockchain},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {70},
  number       = {3},
  pages        = {1255--1270},
  year         = {2021},
  url          = {https://doi.org/10.1109/TR.2021.3054617},
  doi          = {10.1109/TR.2021.3054617},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/0010SWMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitee/MaL21,
  author       = {Di Ma and
                  Wenlong Li},
  title        = {Influence of Negative Stimulation on Gap Junction-mediated Communication
                  under Electrical Coupling},
  booktitle    = {{ICITEE} 2021: The 4th International Conference on Information Technologies
                  and Electrical Engineering, Changde, Hunan, China, October 29 - 31,
                  2021},
  pages        = {7:1--7:5},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3513142.3513149},
  doi          = {10.1145/3513142.3513149},
  timestamp    = {Wed, 20 Apr 2022 15:53:57 +0200},
  biburl       = {https://dblp.org/rec/conf/icitee/MaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ZouMSM21,
  author       = {Hui Zou and
                  Di Ma and
                  Qing Shao and
                  Wei Mao},
  editor       = {Toufik Ahmed and
                  Olivier Festor and
                  Yacine Ghamri{-}Doudane and
                  Joon{-}Myung Kang and
                  Alberto E. Schaeffer Filho and
                  Abdelkader Lahmadi and
                  Edmundo R. M. Madeira},
  title        = {The Horizontal {INR} Conflict-Detection Algorithm: Revealing {INR}
                  Reallocation and Reauthorization in {RPKI}},
  booktitle    = {17th {IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2021, Bordeaux, France, May 17-21, 2021},
  pages        = {459--465},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://ieeexplore.ieee.org/document/9463976},
  timestamp    = {Mon, 05 Jul 2021 08:04:03 +0200},
  biburl       = {https://dblp.org/rec/conf/im/ZouMSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/MackinM0B21,
  author       = {Alex Mackin and
                  Di Ma and
                  Fan Zhang and
                  David Bull},
  title        = {A Subjective Study on Videos at Various Bit Depths},
  booktitle    = {Picture Coding Symposium, {PCS} 2021, Bristol, United Kingdom, June
                  29 - July 2, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PCS50896.2021.9477460},
  doi          = {10.1109/PCS50896.2021.9477460},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pcs/MackinM0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08147,
  author       = {Di Ma and
                  Mariana Afonso and
                  Fan Zhang and
                  David R. Bull},
  title        = {Perceptually-inspired super-resolution of compressed videos},
  journal      = {CoRR},
  volume       = {abs/2106.08147},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08147},
  eprinttype    = {arXiv},
  eprint       = {2106.08147},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08147.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HaoSCGM20,
  author       = {Fengjie Hao and
                  Junfeng Shi and
                  Yongjun Chen and
                  Xuefeng Gu and
                  Di Ma},
  title        = {Integrated Analysis of a Noncoding RNA-Associated Competing Endogenous
                  {RNA} Network in Non-Alcoholic Fatty Liver Disease},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {88977--88989},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2992109},
  doi          = {10.1109/ACCESS.2020.2992109},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HaoSCGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoZYCM20,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  Ruyun Yu and
                  William Cheng{-}Chung Chu and
                  Di Ma},
  title        = {A Privacy-Preserving Framework With Self-Governance and Permission
                  Delegation in Online Social Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {157116--157129},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3016041},
  doi          = {10.1109/ACCESS.2020.3016041},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoZYCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiuMAZ20,
  author       = {Longlong Liu and
                  Di Ma and
                  Ahmad Taher Azar and
                  Quanmin Zhu},
  title        = {Neural Computing Enhanced Parameter Estimation for Multi-Input and
                  Multi-Output Total Non-Linear Dynamic Models},
  journal      = {Entropy},
  volume       = {22},
  number       = {5},
  pages        = {510},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22050510},
  doi          = {10.3390/E22050510},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/LiuMAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/MaC20,
  author       = {Di Ma and
                  Songcan Chen},
  title        = {Bayesian compressive principal component analysis},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {4},
  pages        = {144303},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-019-8308-9},
  doi          = {10.1007/S11704-019-8308-9},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/MaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/MaC20,
  author       = {Di Ma and
                  Songcan Chen},
  title        = {Distribution agnostic Bayesian matching pursuit based on the exponential
                  embedded family},
  journal      = {Neurocomputing},
  volume       = {410},
  pages        = {401--409},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neucom.2020.06.007},
  doi          = {10.1016/J.NEUCOM.2020.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/MaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/MaWW20,
  author       = {Di Ma and
                  Yangpeng Wang and
                  Kejin Wei},
  title        = {Practical source-independent quantum random number generation with
                  detector efficiency mismatch},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {10},
  pages        = {384},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02865-5},
  doi          = {10.1007/S11128-020-02865-5},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/MaWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCZMWS20,
  author       = {Huaxin Li and
                  Qingrong Chen and
                  Haojin Zhu and
                  Di Ma and
                  Hong Wen and
                  Xuemin Sherman Shen},
  title        = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous
                  Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {350--362},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2754249},
  doi          = {10.1109/TDSC.2017.2754249},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/NasserM20,
  author       = {Ahmad M. K. Nasser and
                  Di Ma},
  title        = {SecMonQ: An {HSM} based security monitoring approach for protecting
                  {AUTOSAR} safety-critical systems},
  journal      = {Veh. Commun.},
  volume       = {21},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100201},
  doi          = {10.1016/J.VEHCOM.2019.100201},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/NasserM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccv/YanDWWMZ20,
  author       = {Hong Yan and
                  Jin Deng and
                  Yiru Wan and
                  Qiang Wang and
                  Di Ma and
                  Zhousheng Zhang},
  title        = {An Efficient Object Detection Network for Ammeter Inspection Task
                  on Mobile Devices},
  booktitle    = {ICCCV'20: The 3rd International Conference on Control and Computer
                  Vision, Macau, SAR, China, August, 2020},
  pages        = {104--108},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3425577.3425596},
  doi          = {10.1145/3425577.3425596},
  timestamp    = {Thu, 22 Feb 2024 13:36:47 +0100},
  biburl       = {https://dblp.org/rec/conf/icccv/YanDWWMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/MaZB20,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {Gan-Based Effective Bit Depth Adaptation for Perceptual Video Compression},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2020,
                  London, UK, July 6-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICME46284.2020.9102865},
  doi          = {10.1109/ICME46284.2020.9102865},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/MaZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/XiMLSAJ20,
  author       = {Nan Xi and
                  Di Ma and
                  Marcus Liou and
                  Zachary C. Steinert{-}Threlkeld and
                  Jason Anastasopoulos and
                  Jungseock Joo},
  editor       = {Munmun De Choudhury and
                  Rumi Chunara and
                  Aron Culotta and
                  Brooke Foucault Welles},
  title        = {Understanding the Political Ideology of Legislators from Social Media
                  Images},
  booktitle    = {Proceedings of the Fourteenth International {AAAI} Conference on Web
                  and Social Media, {ICWSM} 2020, Held Virtually, Original Venue: Atlanta,
                  Georgia, USA, June 8-11, 2020},
  pages        = {726--737},
  publisher    = {{AAAI} Press},
  year         = {2020},
  url          = {https://ojs.aaai.org/index.php/ICWSM/article/view/7338},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/XiMLSAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13552,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {{BVI-DVC:} {A} Training Database for Deep Video Compression},
  journal      = {CoRR},
  volume       = {abs/2003.13552},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13552},
  eprinttype    = {arXiv},
  eprint       = {2003.13552},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13552.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-07099,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {MFRNet: {A} New {CNN} Architecture for Post-Processing and In-loop
                  Filtering},
  journal      = {CoRR},
  volume       = {abs/2007.07099},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.07099},
  eprinttype    = {arXiv},
  eprint       = {2007.07099},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-07099.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-14726,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {Video compression with low complexity CNN-based spatial resolution
                  adaptation},
  journal      = {CoRR},
  volume       = {abs/2007.14726},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14726},
  eprinttype    = {arXiv},
  eprint       = {2007.14726},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-07583,
  author       = {Fan Zhang and
                  Di Ma and
                  Chen Feng and
                  David R. Bull},
  title        = {Video Compression with CNN-based Post Processing},
  journal      = {CoRR},
  volume       = {abs/2009.07583},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.07583},
  eprinttype    = {arXiv},
  eprint       = {2009.07583},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-07583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09190,
  author       = {Di Ma and
                  Fan Zhang and
                  David R. Bull},
  title        = {{CVEGAN:} {A} Perceptually-inspired {GAN} for Compressed Video Enhancement},
  journal      = {CoRR},
  volume       = {abs/2011.09190},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09190},
  eprinttype    = {arXiv},
  eprint       = {2011.09190},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8897,
  author       = {Di Ma and
                  Stephen T. Kent},
  title        = {Requirements for Resource Public Key Infrastructure {(RPKI)} Relying
                  Parties},
  journal      = {{RFC}},
  volume       = {8897},
  pages        = {1--11},
  year         = {2020},
  url          = {https://doi.org/10.17487/RFC8897},
  doi          = {10.17487/RFC8897},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8897.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KajaSM19,
  author       = {Nevrus Kaja and
                  Adnan Shaout and
                  Di Ma},
  title        = {An intelligent intrusion detection system},
  journal      = {Appl. Intell.},
  volume       = {49},
  number       = {9},
  pages        = {3235--3247},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10489-019-01436-1},
  doi          = {10.1007/S10489-019-01436-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/KajaSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/MaC19,
  author       = {Di Ma and
                  Songcan Chen},
  title        = {2D compressed learning: support matrix machine with bilinear random
                  projections},
  journal      = {Mach. Learn.},
  volume       = {108},
  number       = {12},
  pages        = {2035--2060},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10994-019-05804-3},
  doi          = {10.1007/S10994-019-05804-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ml/MaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ZhuYMC19,
  author       = {Yan Zhu and
                  Ruyun Yu and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Cryptographic Attribute-Based Access Control {(ABAC)} for Secure Decision
                  Making of Dynamic Policy With Multiauthority Attribute Tokens},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {68},
  number       = {4},
  pages        = {1330--1346},
  year         = {2019},
  url          = {https://doi.org/10.1109/TR.2019.2948713},
  doi          = {10.1109/TR.2019.2948713},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ZhuYMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acit3/KajaSM19,
  author       = {Nevrus Kaja and
                  Adnan Shaout and
                  Di Ma},
  title        = {Fuzzy Based Threat Assessment Model {(FTAM)}},
  booktitle    = {International Arab Conference on Information Technology, {ACIT} 2019,
                  Al Ain, United Arab Emirates, December 3-5, 2019},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACIT47987.2019.8991129},
  doi          = {10.1109/ACIT47987.2019.8991129},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acit3/KajaSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/NasserM19,
  author       = {Ahmad M. K. Nasser and
                  Di Ma},
  editor       = {Ziming Zhao and
                  Qi Alfred Chen and
                  Gail{-}Joon Ahn},
  title        = {Defending {AUTOSAR} Safety Critical Systems Against Code Reuse Attacks},
  booktitle    = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY
                  2019, Richardson, TX, USA, March 27, 2019},
  pages        = {15--18},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309171.3309172},
  doi          = {10.1145/3309171.3309172},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/NasserM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/MaKB19,
  author       = {Di Ma and
                  Angeliki V. Katsenou and
                  David R. Bull},
  title        = {A Synthetic Video Dataset for Video Compression Evaluation},
  booktitle    = {2019 {IEEE} International Conference on Image Processing, {ICIP} 2019,
                  Taipei, Taiwan, September 22-25, 2019},
  pages        = {1094--1098},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICIP.2019.8803798},
  doi          = {10.1109/ICIP.2019.8803798},
  timestamp    = {Wed, 11 Dec 2019 16:30:23 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/MaKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-09594,
  author       = {Nan Xi and
                  Di Ma and
                  Marcus Liou and
                  Zachary C. Steinert{-}Threlkeld and
                  Jason Anastasopoulos and
                  Jungseock Joo},
  title        = {Understanding the Political Ideology of Legislators from Social Media
                  Images},
  journal      = {CoRR},
  volume       = {abs/1907.09594},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.09594},
  eprinttype    = {arXiv},
  eprint       = {1907.09594},
  timestamp    = {Tue, 30 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-09594.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/MaCM18,
  author       = {Zhongchen Ma and
                  Songcan Chen and
                  Di Ma},
  title        = {Heterogeneous multi-output classification by structured conditional
                  risk minimization},
  journal      = {Pattern Recognit. Lett.},
  volume       = {116},
  pages        = {50--57},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.patrec.2018.09.011},
  doi          = {10.1016/J.PATREC.2018.09.011},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/MaCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiZM18,
  author       = {Huaxin Li and
                  Haojin Zhu and
                  Di Ma},
  title        = {Demographic Information Inference through Meta-Data Analysis of Wi-Fi
                  Traffic},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1033--1047},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2017.2753244},
  doi          = {10.1109/TMC.2017.2753244},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/LiZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbk/LiZMZH18,
  author       = {Lei Li and
                  Fang Zhang and
                  Di Ma and
                  Chuan Zhou and
                  Xuegang Hu},
  editor       = {Xindong Wu and
                  Yew{-}Soon Ong and
                  Charu C. Aggarwal and
                  Huanhuan Chen},
  title        = {Multi-target Core Network-Based Networked Multi-label Classification},
  booktitle    = {2018 {IEEE} International Conference on Big Knowledge, {ICBK} 2018,
                  Singapore, November 17-18, 2018},
  pages        = {274--281},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICBK.2018.00044},
  doi          = {10.1109/ICBK.2018.00044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbk/LiZMZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/OuyangZMA18,
  author       = {Xu Ouyang and
                  Xi Zhang and
                  Di Ma and
                  Gady Agam},
  title        = {Generating Image Sequence from Description with {LSTM} Conditional
                  {GAN}},
  booktitle    = {24th International Conference on Pattern Recognition, {ICPR} 2018,
                  Beijing, China, August 20-24, 2018},
  pages        = {2456--2461},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICPR.2018.8545419},
  doi          = {10.1109/ICPR.2018.8545419},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/OuyangZMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ZhangMOJGA18,
  author       = {Xi Zhang and
                  Di Ma and
                  Xu Ouyang and
                  Shanshan Jiang and
                  Lin Gan and
                  Gady Agam},
  editor       = {J{\'{e}}r{\^{o}}me Lang},
  title        = {Layered Optical Flow Estimation Using a Deep Neural Network with a
                  Soft Mask},
  booktitle    = {Proceedings of the Twenty-Seventh International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm,
                  Sweden},
  pages        = {1170--1176},
  publisher    = {ijcai.org},
  year         = {2018},
  url          = {https://doi.org/10.24963/ijcai.2018/163},
  doi          = {10.24963/IJCAI.2018/163},
  timestamp    = {Tue, 20 Aug 2019 16:19:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/ZhangMOJGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/KatsenouMB18,
  author       = {Angeliki V. Katsenou and
                  Di Ma and
                  David R. Bull},
  title        = {Perceptually-Aligned Frame Rate Selection Using Spatio-Temporal Features},
  booktitle    = {2018 Picture Coding Symposium, {PCS} 2018, San Francisco, CA, USA,
                  June 24-27, 2018},
  pages        = {288--292},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PCS.2018.8456274},
  doi          = {10.1109/PCS.2018.8456274},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pcs/KatsenouMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/0010YQMC18,
  author       = {Yan Zhu and
                  Ruyun Yu and
                  Yao Qin and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Provably Secure Cryptographic {ABAC} System to Enhance Reliability
                  and Privacy Using Real-Time Token and Dynamic Policy},
  booktitle    = {2018 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018},
  pages        = {277--288},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/QRS.2018.00041},
  doi          = {10.1109/QRS.2018.00041},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/0010YQMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-03596,
  author       = {Xi Zhang and
                  Di Ma and
                  Xu Ouyang and
                  Shanshan Jiang and
                  Lin Gan and
                  Gady Agam},
  title        = {Layered Optical Flow Estimation Using a Deep Neural Network with a
                  Soft Mask},
  journal      = {CoRR},
  volume       = {abs/1805.03596},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.03596},
  eprinttype    = {arXiv},
  eprint       = {1805.03596},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-03596.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-03027,
  author       = {Xu Ouyang and
                  Xi Zhang and
                  Di Ma and
                  Gady Agam},
  title        = {Generating Image Sequence from Description with {LSTM} Conditional
                  {GAN}},
  journal      = {CoRR},
  volume       = {abs/1806.03027},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.03027},
  eprinttype    = {arXiv},
  eprint       = {1806.03027},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-03027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8416,
  author       = {Di Ma and
                  David Mandelberg and
                  Tim Bruijnzeels},
  title        = {Simplified Local Internet Number Resource Management with the {RPKI}
                  {(SLURM)}},
  journal      = {{RFC}},
  volume       = {8416},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.17487/RFC8416},
  doi          = {10.17487/RFC8416},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LiMW17,
  author       = {Hai Li and
                  Di Ma and
                  Renbiao Wu},
  title        = {A low complexity algorithm for across range unit effect correction
                  of the moving target via range frequency polynomial-phase transform},
  journal      = {Digit. Signal Process.},
  volume       = {62},
  pages        = {176--186},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.dsp.2016.12.001},
  doi          = {10.1016/J.DSP.2016.12.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/LiMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NasserMM17,
  author       = {Ahmad M. K. Nasser and
                  Di Ma and
                  Priya Muralidharan},
  title        = {An Approach for Building Security Resilience in {AUTOSAR} Based Safety
                  Critical Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {271--304},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.633},
  doi          = {10.13052/JCSM2245-1439.633},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/NasserMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiuMMZ17,
  author       = {Jiao Liu and
                  Di Ma and
                  Teng{-}bo Ma and
                  Wei Zhang},
  title        = {Ecosystem particle swarm optimization},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {7},
  pages        = {1667--1691},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2111-4},
  doi          = {10.1007/S00500-016-2111-4},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiuMMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acm/LiCZM17,
  author       = {Huaxin Li and
                  Qingrong Chen and
                  Haojin Zhu and
                  Di Ma},
  editor       = {John C. S. Lui and
                  Xinbing Wang and
                  Alexander Wolf and
                  Yunhao Liu and
                  Chuanping Hu},
  title        = {Hybrid de-anonymization across real-world heterogeneous social networks},
  booktitle    = {Proceedings of the {ACM} Turing 50th Celebration Conference - China,
                  {TUR-C} 2017, Shanghai, China, May 12-14, 2017},
  pages        = {33:1--33:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3063955.3063988},
  doi          = {10.1145/3063955.3063988},
  timestamp    = {Tue, 20 Dec 2022 21:20:01 +0100},
  biburl       = {https://dblp.org/rec/conf/acm/LiCZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuMWZ17,
  author       = {Jiafa Liu and
                  Di Ma and
                  Andr{\'{e}} Weimerskirch and
                  Haojin Zhu},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {A Functional Co-Design towards Safe and Secure Vehicle Platooning},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055193},
  doi          = {10.1145/3055186.3055193},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuMWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/MaZOA17,
  author       = {Di Ma and
                  Xi Zhang and
                  Xu Ouyang and
                  Gady Agam},
  editor       = {Xuewen Chen and
                  Bo Luo and
                  Feng Luo and
                  Vasile Palade and
                  M. Arif Wani},
  title        = {Lecture Vdeo Indexing Using Boosted Margin Maximizing Neural Networks},
  booktitle    = {16th {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2017, Cancun, Mexico, December 18-21, 2017},
  pages        = {221--227},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICMLA.2017.0-155},
  doi          = {10.1109/ICMLA.2017.0-155},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/MaZOA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NasserML17,
  author       = {Ahmad M. K. Nasser and
                  Di Ma and
                  Sam Lauzon},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Exploiting {AUTOSAR} Safety Mechanisms to Launch Security Attacks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_6},
  doi          = {10.1007/978-3-319-64701-2\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/NasserML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-00575,
  author       = {Di Ma and
                  Xi Zhang and
                  Xu Ouyang and
                  Gady Agam},
  title        = {Lecture video indexing using boosted margin maximizing neural networks},
  journal      = {CoRR},
  volume       = {abs/1712.00575},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.00575},
  eprinttype    = {arXiv},
  eprint       = {1712.00575},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-00575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8211,
  author       = {Stephen T. Kent and
                  Di Ma},
  title        = {Adverse Actions by a Certification Authority {(CA)} or Repository
                  Manager in the Resource Public Key Infrastructure {(RPKI)}},
  journal      = {{RFC}},
  volume       = {8211},
  pages        = {1--26},
  year         = {2017},
  url          = {https://doi.org/10.17487/RFC8211},
  doi          = {10.17487/RFC8211},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ZhangLFLM16,
  author       = {Wei Zhang and
                  Jiao Liu and
                  Lv{-}bin Fan and
                  Yahong Liu and
                  Di Ma},
  title        = {Control strategy {PSO}},
  journal      = {Appl. Soft Comput.},
  volume       = {38},
  pages        = {75--86},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.asoc.2015.09.030},
  doi          = {10.1016/J.ASOC.2015.09.030},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/ZhangLFLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/LiuGM16,
  author       = {Jun Liu and
                  Jinhua Guo and
                  Di Ma},
  title        = {Traffic Aware Virtual Machine Packing in Cloud Data Centers},
  booktitle    = {2nd {IEEE} International Conference on Big Data Security on Cloud,
                  BigDataSecurity 2016, {IEEE} International Conference on High Performance
                  and Smart Computing, {HPSC} 2016, and {IEEE} International Conference
                  on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April
                  9-10, 2016},
  pages        = {256--261},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.37},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.37},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/LiuGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DominicCEMW16,
  author       = {Derrick Dominic and
                  Sumeet Chhawri and
                  Ryan M. Eustice and
                  Di Ma and
                  Andr{\'{e}} Weimerskirch},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {Risk Assessment for Cooperative Automated Driving},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487.2994499},
  doi          = {10.1145/2994487.2994499},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DominicCEMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ZhangMGJA16,
  author       = {Xi Zhang and
                  Di Ma and
                  Lin Gan and
                  Shanshan Jiang and
                  Gady Agam},
  editor       = {Snehasis Mukhopadhyay and
                  ChengXiang Zhai and
                  Elisa Bertino and
                  Fabio Crestani and
                  Javed Mostafa and
                  Jie Tang and
                  Luo Si and
                  Xiaofang Zhou and
                  Yi Chang and
                  Yunyao Li and
                  Parikshit Sondhi},
  title        = {{CGMOS:} Certainty Guided Minority OverSampling},
  booktitle    = {Proceedings of the 25th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2016, Indianapolis, IN, USA, October
                  24-28, 2016},
  pages        = {1623--1631},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2983323.2983789},
  doi          = {10.1145/2983323.2983789},
  timestamp    = {Thu, 13 Aug 2020 18:13:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/ZhangMGJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuLLZRM16,
  author       = {Jiafa Liu and
                  Junyi Liu and
                  Huaxin Li and
                  Haojin Zhu and
                  Na Ruan and
                  Di Ma},
  title        = {Who Moved My Cheese: Towards Automatic and Fine-Grained Classification
                  and Modeling Ad Network},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842384},
  doi          = {10.1109/GLOCOM.2016.7842384},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuLLZRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiXZMLX16,
  author       = {Huaxin Li and
                  Zheyu Xu and
                  Haojin Zhu and
                  Di Ma and
                  Shuai Li and
                  Kai Xing},
  title        = {Demographics inference through Wi-Fi network traffic analysis},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524528},
  doi          = {10.1109/INFOCOM.2016.7524528},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiXZMLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangMGJA16,
  author       = {Xi Zhang and
                  Di Ma and
                  Lin Gan and
                  Shanshan Jiang and
                  Gady Agam},
  title        = {{CGMOS:} Certainty Guided Minority OverSampling},
  journal      = {CoRR},
  volume       = {abs/1607.06525},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06525},
  eprinttype    = {arXiv},
  eprint       = {1607.06525},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangMGJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShresthaM0LS15,
  author       = {Babins Shrestha and
                  Di Ma and
                  Yan Zhu and
                  Haoyu Li and
                  Nitesh Saxena},
  title        = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging
                  Smartphone Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2270--2283},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2436364},
  doi          = {10.1109/TIFS.2015.2436364},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuWMG15,
  author       = {Yan Zhu and
                  Xin Wang and
                  Di Ma and
                  Ruiqi Guo},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select"
                  with Short Ciphertext},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {191--202},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714602},
  doi          = {10.1145/2714576.2714602},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuWMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ei-imawm/MaA15,
  author       = {Di Ma and
                  Gady Agam},
  editor       = {Qian Lin and
                  Jan P. Allebach and
                  Zhigang Fan},
  title        = {Enhanced features for supervised lecture video segmentation and indexing},
  booktitle    = {Imaging and Multimedia Analytics in a Web and Mobile World 2015, San
                  Francisco, California, USA, February 8-12, 2015},
  series       = {{SPIE} Proceedings},
  volume       = {9408},
  pages        = {940809},
  publisher    = {{SPIE}},
  year         = {2015},
  url          = {https://doi.org/10.1117/12.2083475},
  doi          = {10.1117/12.2083475},
  timestamp    = {Tue, 01 Aug 2023 13:43:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ei-imawm/MaA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobserv/ZhuYM15,
  author       = {Yan Zhu and
                  Liguang Yang and
                  Di Ma},
  editor       = {Onur Altintas and
                  Jia Zhang},
  title        = {Secure Snaps: {A} New Forward Secrecy Cryptosystem for Self-Destructing
                  Messages in Mobile Services},
  booktitle    = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobServ.2015.29},
  doi          = {10.1109/MOBSERV.2015.29},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobserv/ZhuYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcity/LiML15,
  author       = {Lei Li and
                  Di Ma and
                  Guanfeng Liu},
  title        = {Social Community-Oriented Social Attribute Analysis: An Empirical
                  Study on {QQ} Group Data},
  booktitle    = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2
                  2015, Chengdu, China, December 19-21, 2015},
  pages        = {457--464},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartCity.2015.113},
  doi          = {10.1109/SMARTCITY.2015.113},
  timestamp    = {Thu, 13 Apr 2023 12:52:26 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcity/LiML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuWMG15,
  author       = {Yan Zhu and
                  Xin Wang and
                  Di Ma and
                  Ruiqi Guo},
  title        = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select"
                  with Short Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuWMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Wang0MF14,
  author       = {Shan{-}Biao Wang and
                  Yan Zhu and
                  Di Ma and
                  Rong{-}Quan Feng},
  title        = {Lattice-based key exchange on small integer solution problem},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {11},
  pages        = {1--12},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-014-5147-z},
  doi          = {10.1007/S11432-014-5147-Z},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/Wang0MF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ZhangMWL14,
  author       = {Wei Zhang and
                  Di Ma and
                  Jin{-}jun Wei and
                  Hai{-}feng Liang},
  title        = {A parameter selection strategy for particle swarm optimization based
                  on particle positions},
  journal      = {Expert Syst. Appl.},
  volume       = {41},
  number       = {7},
  pages        = {3576--3584},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.eswa.2013.10.061},
  doi          = {10.1016/J.ESWA.2013.10.061},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ZhangMWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangZCLRWM14,
  author       = {Bingsheng Zhang and
                  Zhan Qin and
                  Si Chen and
                  Muyuan Li and
                  Kui Ren and
                  Cong Wang and
                  Di Ma},
  title        = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones},
  journal      = {{IEEE} Internet Things J.},
  volume       = {1},
  number       = {1},
  pages        = {33--45},
  year         = {2014},
  url          = {https://doi.org/10.1109/JIOT.2014.2297998},
  doi          = {10.1109/JIOT.2014.2297998},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangZCLRWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/0001MHAH14,
  author       = {Yan Zhu and
                  Di Ma and
                  Changjun Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Secure and efficient random functions with variable-length output},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {45},
  pages        = {121--133},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.07.033},
  doi          = {10.1016/J.JNCA.2014.07.033},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaS14,
  author       = {Di Ma and
                  Nitesh Saxena},
  title        = {A context-aware approach to defend against unauthorized reading and
                  relay attacks in {RFID} systems},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2684--2695},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.404},
  doi          = {10.1002/SEC.404},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/PanWMZL14,
  author       = {Jun Pan and
                  Mi Wang and
                  Di Ma and
                  Qinghua Zhou and
                  Junli Li},
  title        = {Seamline Network Refinement Based on Area Voronoi Diagrams With Overlap},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {52},
  number       = {3},
  pages        = {1658--1666},
  year         = {2014},
  url          = {https://doi.org/10.1109/TGRS.2013.2253110},
  doi          = {10.1109/TGRS.2013.2253110},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/PanWMZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/RenWMJ14,
  author       = {Kui Ren and
                  Qian Wang and
                  Di Ma and
                  Xiaohua Jia},
  title        = {Securing emerging short range wireless communications: the state of
                  the art},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {21},
  number       = {6},
  pages        = {153--159},
  year         = {2014},
  url          = {https://doi.org/10.1109/MWC.2014.7000983},
  doi          = {10.1109/MWC.2014.7000983},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/RenWMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/MaXA14,
  author       = {Di Ma and
                  Bingqing Xie and
                  Gady Agam},
  editor       = {Bertrand Co{\"{u}}asnon and
                  Eric K. Ringger},
  title        = {A machine learning based lecture video segmentation and indexing algorithm},
  booktitle    = {Document Recognition and Retrieval XXI, San Francisco, California,
                  USA, February 5-6, 2014},
  series       = {{SPIE} Proceedings},
  volume       = {9021},
  pages        = {90210V--90210V--8},
  publisher    = {{SPIE}},
  year         = {2014},
  url          = {https://doi.org/10.1117/12.2042602},
  doi          = {10.1117/12.2042602},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/MaXA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaSXZ13,
  author       = {Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang and
                  Yan Zhu},
  title        = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy
                  via Location Sensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {57--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.89},
  doi          = {10.1109/TDSC.2012.89},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/HaleviLMSVX13,
  author       = {Tzipora Halevi and
                  Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  title        = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {307--318},
  year         = {2013},
  url          = {https://doi.org/10.1109/TETC.2013.2290537},
  doi          = {10.1109/TETC.2013.2290537},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuAHMW13,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Di Ma and
                  Shan{-}Biao Wang},
  title        = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based
                  on Role-Key Hierarchy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2138--2153},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2287858},
  doi          = {10.1109/TIFS.2013.2287858},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/ZhuHML13,
  author       = {Yan Zhu and
                  Changjun Hu and
                  Di Ma and
                  Jin Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Dritan Nace and
                  Salvatore Venticinque and
                  Alain Bui},
  title        = {Cryptographic Spatio-temporal Predicates for Location-Based Services},
  booktitle    = {Eighth International Conference on P2P, Parallel, Grid, Cloud and
                  Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30,
                  2013},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/3PGCIC.2013.19},
  doi          = {10.1109/3PGCIC.2013.19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/ZhuHML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001MHH13,
  author       = {Yan Zhu and
                  Di Ma and
                  Changjun Hu and
                  Dijiang Huang},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {How to use attribute-based encryption to implement role-based access
                  control in the cloud},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484411},
  doi          = {10.1145/2484402.2484411},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001MHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaZY13,
  author       = {Di Ma and
                  Yan Zhu and
                  Mengyang Yu},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {End-to-end aggregate authentication of time-series data},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484400},
  doi          = {10.1145/2484389.2484400},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/MaA13,
  author       = {Di Ma and
                  Gady Agam},
  editor       = {Richard Zanibbi and
                  Bertrand Co{\"{u}}asnon},
  title        = {A super resolution framework for low resolution document image {OCR}},
  booktitle    = {Document Recognition and Retrieval XX, part of the IS{\&}T-SPIE
                  Electronic Imaging Symposium, Burlingame, California, USA, February
                  5-7, 2013, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {8658},
  pages        = {86580P},
  publisher    = {{SPIE}},
  year         = {2013},
  url          = {https://doi.org/10.1117/12.2008354},
  doi          = {10.1117/12.2008354},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/MaA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/YangTMSM13,
  author       = {Chao Yang and
                  Ye Tian and
                  Di Ma and
                  Shuo Shen and
                  Wei Mao},
  title        = {A Server Friendly File Synchronization Mechanism for Cloud Storage},
  booktitle    = {2013 {IEEE} International Conference on Green Computing and Communications
                  (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom), Beijing, China, August 20-23,
                  2013},
  pages        = {314--316},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.70},
  doi          = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.70},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/greencom/YangTMSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ZhuMHH13,
  author       = {Yan Zhu and
                  Di Ma and
                  Dijiang Huang and
                  Changjun Hu},
  editor       = {Mario Gerla and
                  Dijiang Huang},
  title        = {Enabling secure location-based services in mobile cloud computing},
  booktitle    = {Proceedings of the second {ACM} {SIGCOMM} workshop on Mobile cloud
                  computing, MCC@SIGCOMM 2013, Hong Kong, China, August 16, 2013},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491266.2491272},
  doi          = {10.1145/2491266.2491272},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ZhuMHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/MaSL13,
  author       = {Di Ma and
                  Dandan Song and
                  Lejian Liao},
  editor       = {Jianyong Wang and
                  Hui Xiong and
                  Yoshiharu Ishikawa and
                  Jianliang Xu and
                  Junfeng Zhou},
  title        = {Incorporating Social Actions into Recommender Systems},
  booktitle    = {Web-Age Information Management - 14th International Conference, {WAIM}
                  2013, Beidaihe, China, June 14-16, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7923},
  pages        = {698--704},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38562-9\_71},
  doi          = {10.1007/978-3-642-38562-9\_71},
  timestamp    = {Thu, 28 Jan 2021 11:41:18 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/MaSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ZhuMWF13,
  author       = {Yan Zhu and
                  Di Ma and
                  Shan{-}Biao Wang and
                  Rong{-}Quan Feng},
  editor       = {Kui Ren and
                  Xue Liu and
                  Weifa Liang and
                  Ming Xu and
                  Xiaohua Jia and
                  Kai Xing},
  title        = {Efficient Identity-Based Encryption without Pairings and Key Escrow
                  for Mobile Devices},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 8th International
                  Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7992},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39701-1\_4},
  doi          = {10.1007/978-3-642-39701-1\_4},
  timestamp    = {Tue, 20 Aug 2024 07:54:45 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/ZhuMWF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiMSSZ13,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Tap-Wave-Rub: lightweight malware prevention for smartphones using
                  intuitive human gestures},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462101},
  doi          = {10.1145/2462096.2462101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4010,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  title        = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using
                  Intuitive Human Gestures},
  journal      = {CoRR},
  volume       = {abs/1302.4010},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4010},
  eprinttype    = {arXiv},
  eprint       = {1302.4010},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZWRWM13,
  author       = {Bingsheng Zhang and
                  Zhan Qin and
                  Junfei Wang and
                  Kui Ren and
                  Cong Wang and
                  Di Ma},
  title        = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZWRWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangLM12,
  author       = {Bang Wang and
                  Hock{-}Beng Lim and
                  Di Ma},
  title        = {A coverage-aware clustering protocol for wireless sensor networks},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {5},
  pages        = {1599--1611},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.01.016},
  doi          = {10.1016/J.COMNET.2012.01.016},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/ZhuWHAM12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Di Ma},
  title        = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {165--198},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218843012410018},
  doi          = {10.1142/S0218843012410018},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/MaEWL12,
  author       = {Di Ma and
                  Meng Joo Er and
                  Bang Wang and
                  Hock Beng Lim},
  title        = {Range-free wireless sensor networks localization based on hop-count
                  quantization},
  journal      = {Telecommun. Syst.},
  volume       = {50},
  number       = {3},
  pages        = {199--213},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11235-010-9395-y},
  doi          = {10.1007/S11235-010-9395-Y},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/MaEWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/PietroMST12,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Self-healing in unattended wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {9},
  number       = {1},
  pages        = {7:1--7:21},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379799.2379806},
  doi          = {10.1145/2379799.2379806},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/PietroMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangLM12,
  author       = {Bang Wang and
                  Hock{-}Beng Lim and
                  Di Ma},
  title        = {Broadcast based on layered diffusion in wireless \emph{ad hoc} and
                  sensor networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {99--115},
  year         = {2012},
  url          = {https://doi.org/10.1002/wcm.892},
  doi          = {10.1002/WCM.892},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/WangLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/MaA12,
  author       = {Di Ma and
                  Gady Agam},
  editor       = {Christian Viard{-}Gaudin and
                  Richard Zanibbi},
  title        = {Lecture video segmentation and indexing},
  booktitle    = {Document Recognition and Retrieval XIX, part of the IS{\&}T-SPIE
                  Electronic Imaging Symposium, Burlingame, California, USA, January
                  25-26, 2012, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {8297},
  pages        = {82970V},
  publisher    = {{SPIE}},
  year         = {2012},
  url          = {https://doi.org/10.1117/12.910594},
  doi          = {10.1117/12.910594},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/MaA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HaleviMSX12,
  author       = {Tzipora Halevi and
                  Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor
                  Data},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_22},
  doi          = {10.1007/978-3-642-33167-1\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuWMHA12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Di Ma and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile
                  devices},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {949--954},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503235},
  doi          = {10.1109/GLOCOM.2012.6503235},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MaSHMCC12,
  author       = {Di Ma and
                  Sumei Sun and
                  Chin Keong Ho and
                  Daniel Wai Meng Mok and
                  Chee{-}Kong Chui and
                  Stephen Kin Yong Chang},
  title        = {Wireless medical implant: {A} case study on artificial pancreas},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {6096--6100},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364864},
  doi          = {10.1109/ICC.2012.6364864},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MaSHMCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhuMW12,
  author       = {Yan Zhu and
                  Di Ma and
                  Shan{-}Biao Wang},
  title        = {Secure Data Retrieval of Outsourced Data with Complex Query Support},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {481--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.91},
  doi          = {10.1109/ICDCSW.2012.91},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhuMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12,
  author       = {Tzipora Halevi and
                  Sein Lin and
                  Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  editor       = {Silvia Giordano and
                  Marc Langheinrich and
                  Albrecht Schmidt},
  title        = {Sensing-enabled defenses to {RFID} unauthorized reading and relay
                  attacks without changing the usage model},
  booktitle    = {2012 {IEEE} International Conference on Pervasive Computing and Communications,
                  Lugano, Switzerland, March 19-23, 2012},
  pages        = {227--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerCom.2012.6199835},
  doi          = {10.1109/PERCOM.2012.6199835},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaPSX12,
  author       = {Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Location-aware and safer cards: enhancing {RFID} security and privacy
                  via location sensing},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185457},
  doi          = {10.1145/2185448.2185457},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MaPSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/MaS11,
  author       = {Di Ma and
                  Claudio Soriente},
  title        = {Building Trust for lambda-Congenial Secret Groups},
  booktitle    = {2011 International Conference on Broadband, Wireless Computing, Communication
                  and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011},
  pages        = {222--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/BWCCA.2011.35},
  doi          = {10.1109/BWCCA.2011.35},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/MaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/MaJ11,
  author       = {Di Ma and
                  Hongxia Jin},
  title        = {Content usage tracking in superdistribution},
  booktitle    = {2011 {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2011, Las Vegas, NV, 9-12 January, 2011},
  pages        = {912--917},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CCNC.2011.5766640},
  doi          = {10.1109/CCNC.2011.5766640},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/MaJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LuLTLWLM11,
  author       = {Sifei Lu and
                  Reuben Mingguang Li and
                  William{-}Chandra Tjhi and
                  Gary Kee Khoon Lee and
                  Long Wang and
                  Xiaorong Li and
                  Di Ma},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {A Framework for Cloud-Based Large-Scale Data Analytics and Visualization:
                  Case Study on Multiscale Climate Data},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {618--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.95},
  doi          = {10.1109/CLOUDCOM.2011.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LuLTLWLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/MaP11,
  author       = {Di Ma and
                  Anudath K. Prasad},
  editor       = {Haohong Wang and
                  Jin Li and
                  George N. Rouskas and
                  Xiaobo Zhou},
  title        = {A Context-Aware Approach for Enhanced Security and Privacy in {RFID}
                  Electronic Toll Collection Systems},
  booktitle    = {Proceedings of 20th International Conference on Computer Communications
                  and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICCCN.2011.6006281},
  doi          = {10.1109/ICCCN.2011.6006281},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/MaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/HeTLMMFF11,
  author       = {Yaobin He and
                  Haoyu Tan and
                  Wuman Luo and
                  Huajian Mao and
                  Di Ma and
                  Shengzhong Feng and
                  Jianping Fan},
  title        = {{MR-DBSCAN:} An Efficient Parallel Density-Based Clustering Algorithm
                  Using MapReduce},
  booktitle    = {17th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2011, Tainan, Taiwan, December 7-9, 2011},
  pages        = {473--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICPADS.2011.83},
  doi          = {10.1109/ICPADS.2011.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/HeTLMMFF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/MaWTM11,
  author       = {Di Ma and
                  Liming Wang and
                  Ye Tian and
                  Wei Mao},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Host-identifier-based scheme for source accountability of the internet},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {539--546},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990557},
  doi          = {10.1109/INM.2011.5990557},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/MaWTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/HabibiAM11,
  author       = {Mohammad Hassan Habibi and
                  Mohammad Reza Aref and
                  Di Ma},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Addressing Flaws in {RFID} Authentication Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {216--235},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_17},
  doi          = {10.1007/978-3-642-25578-6\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/HabibiAM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/MaEWL10,
  author       = {Di Ma and
                  Meng Joo Er and
                  Bang Wang and
                  Hock{-}Beng Lim},
  title        = {A novel approach toward source-to-sink distance estimation in wireless
                  sensor networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {14},
  number       = {5},
  pages        = {384--386},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCOMM.2010.05.100005},
  doi          = {10.1109/LCOMM.2010.05.100005},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/MaEWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangLMF10,
  author       = {Bang Wang and
                  Hock{-}Beng Lim and
                  Di Ma and
                  Cheng Fu},
  title        = {The hop count shift problem and its impacts on protocol design in
                  wireless ad hoc networks},
  journal      = {Telecommun. Syst.},
  volume       = {44},
  number       = {1-2},
  pages        = {49--60},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9221-6},
  doi          = {10.1007/S11235-009-9221-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/WangLMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MaEW10,
  author       = {Di Ma and
                  Meng Joo Er and
                  Bang Wang},
  title        = {Analysis of Hop-Count-Based Source-to-Destination Distance Estimation
                  in Wireless Sensor Networks With Applications in Localization},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {6},
  pages        = {2998--3011},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2010.2048346},
  doi          = {10.1109/TVT.2010.2048346},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/MaEW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/MaT10,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {Security and privacy in emerging wireless networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {17},
  number       = {5},
  pages        = {12--21},
  year         = {2010},
  url          = {https://doi.org/10.1109/MWC.2010.5601953},
  doi          = {10.1109/MWC.2010.5601953},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/MaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsn/LimMWKIW10,
  author       = {Hock{-}Beng Lim and
                  Di Ma and
                  Bang Wang and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer and
                  Kenneth L. Watkin},
  title        = {A Soldier Health Monitoring System for Military Applications},
  booktitle    = {International Conference on Body Sensor Networks, {BSN} 2010, Singapore,
                  7-9 June, 2010},
  pages        = {246--249},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/BSN.2010.58},
  doi          = {10.1109/BSN.2010.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bsn/LimMWKIW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icarcv/MaELW10,
  author       = {Di Ma and
                  Meng Joo Er and
                  Hock{-}Beng Lim and
                  Bang Wang},
  title        = {A lower bound on expected localization error in wireless sensor network},
  booktitle    = {11th International Conference on Control, Automation, Robotics and
                  Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings},
  pages        = {96--103},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICARCV.2010.5707952},
  doi          = {10.1109/ICARCV.2010.5707952},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icarcv/MaELW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/MaT10,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {{IRRES:} Intrusion-Resilient Remote Email Storage},
  booktitle    = {30th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy},
  pages        = {72--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCSW.2010.38},
  doi          = {10.1109/ICDCSW.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/MaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/WangLMY10,
  author       = {Bang Wang and
                  Hock{-}Beng Lim and
                  Di Ma and
                  Daiqin Yang},
  editor       = {Sajal K. Das and
                  Anke Xue},
  title        = {A Coverage-Aware Clustering Protocol for Wireless Sensor Networks},
  booktitle    = {Sixth International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2010, Hangzhou, China, December 20-22, 2010},
  pages        = {85--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSN.2010.19},
  doi          = {10.1109/MSN.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/WangLMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangLM09,
  author       = {Bang Wang and
                  Hock{-}Beng Lim and
                  Di Ma},
  title        = {A survey of movement strategies for improving network coverage in
                  wireless sensor networks},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {13-14},
  pages        = {1427--1436},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2009.05.004},
  doi          = {10.1016/J.COMCOM.2009.05.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/MaST09,
  author       = {Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {New adversary and new threats: security in unattended sensor networks},
  journal      = {{IEEE} Netw.},
  volume       = {23},
  number       = {2},
  pages        = {43--48},
  year         = {2009},
  url          = {https://doi.org/10.1109/MNET.2009.4804335},
  doi          = {10.1109/MNET.2009.4804335},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/MaST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tos/MaT09,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {A new approach to secure logging},
  journal      = {{ACM} Trans. Storage},
  volume       = {5},
  number       = {1},
  pages        = {2:1--2:21},
  year         = {2009},
  url          = {https://doi.org/10.1145/1502777.1502779},
  doi          = {10.1145/1502777.1502779},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tos/MaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/MaWLE10,
  author       = {Di Ma and
                  Bang Wang and
                  Hock Beng Lim and
                  Meng Joo Er},
  title        = {Hop-Count Based Node-to-Anchor Distance Estimation in Wireless Sensor
                  Networks},
  booktitle    = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2009, Las Vegas, NV, USA, 10-13 Jan., 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCNC.2009.4784748},
  doi          = {10.1109/CCNC.2009.4784748},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/MaWLE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/MaLWM09,
  author       = {Di Ma and
                  Xiaodong Li and
                  Wei Wang and
                  Wei Mao},
  editor       = {Geuk Lee and
                  Daniel Howard and
                  Jeong Jin Kang and
                  Dominik Slezak and
                  Tae Nam Ahn and
                  Chung{-}Huang Yang},
  title        = {An application of host identity tags to {DKIM} for identifying signers},
  booktitle    = {Proceedings of the 2009 International Conference on Hybrid Information
                  Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {321},
  pages        = {138--142},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644993.1645018},
  doi          = {10.1145/1644993.1645018},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ichit/MaLWM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/WangLLMF09,
  author       = {Bang Wang and
                  Minghui Li and
                  Hock Beng Lim and
                  Di Ma and
                  Cheng Fu},
  editor       = {Subhas Chandra Misra and
                  Isaac Woungang and
                  Sudip Misra},
  title        = {Energy Efficient Information Processing in Wireless Sensor Networks},
  booktitle    = {Guide to Wireless Sensor Networks},
  series       = {Computer Communications and Networks},
  pages        = {1--26},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-1-84882-218-4\_1},
  doi          = {10.1007/978-1-84882-218-4\_1},
  timestamp    = {Wed, 06 Mar 2019 09:41:12 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/WangLLMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/LimMFWE09,
  author       = {Hock Beng Lim and
                  Di Ma and
                  Cheng Fu and
                  Bang Wang and
                  Meng Joo Er},
  editor       = {Subhas Chandra Misra and
                  Isaac Woungang and
                  Sudip Misra},
  title        = {Adaptive Distributed Resource Allocation for Sensor Networks},
  booktitle    = {Guide to Wireless Sensor Networks},
  series       = {Computer Communications and Networks},
  pages        = {347--377},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-1-84882-218-4\_14},
  doi          = {10.1007/978-1-84882-218-4\_14},
  timestamp    = {Wed, 06 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/LimMFWE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/LimWFPM08,
  author       = {Hock Beng Lim and
                  Bang Wang and
                  Cheng Fu and
                  Arpan Phull and
                  Di Ma},
  title        = {{WISDOM:} Simulation Framework for Middleware Services in Wireless
                  Sensor Networks},
  booktitle    = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2008, Las Vegas, NV, USA, January 10-12, 2008},
  pages        = {1269--1270},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ccnc08.2007.303},
  doi          = {10.1109/CCNC08.2007.303},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/LimWFPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ma08,
  author       = {Di Ma},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Practical forward secure sequential aggregate signatures},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368361},
  doi          = {10.1145/1368310.1368361},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ma08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MaT08,
  author       = {Di Ma and
                  Gene Tsudik},
  editor       = {Vijay Atluri},
  title        = {A New Approach to Secure Logging},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_4},
  doi          = {10.1007/978-3-540-70567-3\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LimWFPM08,
  author       = {Hock{-}Beng Lim and
                  Bang Wang and
                  Cheng Fu and
                  Arpan Phull and
                  Di Ma},
  title        = {A Middleware Services Simulation Platform for Wireless Sensor Networks},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  pages        = {168--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.Workshops.2008.101},
  doi          = {10.1109/ICDCS.WORKSHOPS.2008.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/LimWFPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/MaEL08,
  author       = {Di Ma and
                  Meng Joo Er and
                  Hock{-}Beng Lim},
  title        = {A comprehensive study of Kalman filter and extended Kalman filter
                  for target tracking in Wireless Sensor Networks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Singapore, 12-15 October 2008},
  pages        = {2792--2797},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICSMC.2008.4811719},
  doi          = {10.1109/ICSMC.2008.4811719},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/MaEL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroMST08,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless
                  Sensor Networks},
  booktitle    = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008),
                  Napoli, Italy, October 6-8, 2008},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SRDS.2008.23},
  doi          = {10.1109/SRDS.2008.23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroMST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/MaT08,
  author       = {Di Ma and
                  Gene Tsudik},
  editor       = {Sandeep S. Kulkarni and
                  Andr{\'{e}} Schiper},
  title        = {{DISH:} Distributed Self-Healing},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 10th International
                  Symposium, {SSS} 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5340},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89335-6\_7},
  doi          = {10.1007/978-3-540-89335-6\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/MaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT08,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {{DISH:} Distributed Self-Healing in Unattended Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT08a,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {A New Approach to Secure Logging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/WuMD07,
  author       = {Yongdong Wu and
                  Di Ma and
                  Robert H. Deng},
  title        = {Flexible Access Control to {JPEG} 2000 Image Code-Streams},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {9},
  number       = {6},
  pages        = {1314--1324},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMM.2007.902865},
  doi          = {10.1109/TMM.2007.902865},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/WuMD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Ma07,
  author       = {Di Ma},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Secure Feedback Service in Wireless Sensor Networks},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {116--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_11},
  doi          = {10.1007/978-3-540-72163-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/Ma07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaT07,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {Extended Abstract: Forward-Secure Sequential Aggregate Authentication},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {86--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.18},
  doi          = {10.1109/SP.2007.18},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT07,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {Forward-Secure Sequential Aggregate Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isqed/Ma06,
  author       = {Di Ma},
  title        = {Successful {IP} Business Models},
  booktitle    = {7th International Symposium on Quality of Electronic Design {(ISQED}
                  2006), 27-29 March 2006, San Jose, CA, {USA}},
  pages        = {15--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISQED.2006.127},
  doi          = {10.1109/ISQED.2006.127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isqed/Ma06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/DengMSW05,
  author       = {Robert H. Deng and
                  Di Ma and
                  Weizhong Shao and
                  Yongdong Wu},
  title        = {Scalable trusted online dissemination of {JPEG2000} images},
  journal      = {Multim. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {60--67},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00530-005-0190-7},
  doi          = {10.1007/S00530-005-0190-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/DengMSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaDPZ05,
  author       = {Di Ma and
                  Robert H. Deng and
                  HweeHwa Pang and
                  Jianying Zhou},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Authenticating Query Results in Data Publishing},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {376--388},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_32},
  doi          = {10.1007/11602897\_32},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaDPZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Ma04,
  author       = {Di Ma},
  title        = {Bounding the stack size of interrupt-driven programs},
  school       = {Purdue University, {USA}},
  year         = {2004},
  url          = {https://docs.lib.purdue.edu/dissertations/AAI3154689},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Ma04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChatterjeeMMZHP04,
  author       = {Krishnendu Chatterjee and
                  Di Ma and
                  Rupak Majumdar and
                  Tian Zhao and
                  Thomas A. Henzinger and
                  Jens Palsberg},
  title        = {Stack size analysis for interrupt-driven programs},
  journal      = {Inf. Comput.},
  volume       = {194},
  number       = {2},
  pages        = {144--174},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ic.2004.06.001},
  doi          = {10.1016/J.IC.2004.06.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ChatterjeeMMZHP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WuM04,
  author       = {Hongjun Wu and
                  Di Ma},
  title        = {Efficient and secure encryption schemes for {JPEG2000}},
  booktitle    = {2004 {IEEE} International Conference on Acoustics, Speech, and Signal
                  Processing, {ICASSP} 2004, Montreal, Quebec, Canada, May 17-21, 2004},
  pages        = {869--872},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICASSP.2004.1327249},
  doi          = {10.1109/ICASSP.2004.1327249},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/WuM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiWMZD04,
  author       = {Tieyan Li and
                  Yongdong Wu and
                  Di Ma and
                  Huafei Zhu and
                  Robert H. Deng},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Flexible Verification of {MPEG-4} Stream in Peer-to-Peer {CDN}},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_7},
  doi          = {10.1007/978-3-540-30191-2\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiWMZD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaDWL04,
  author       = {Di Ma and
                  Robert H. Deng and
                  Yongdong Wu and
                  Tieyan Li},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Dynamic Access Control for Multi-privileged Group Communications},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {508--519},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_39},
  doi          = {10.1007/978-3-540-30191-2\_39},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaDWL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WuMD04,
  author       = {Yongdong Wu and
                  Di Ma and
                  Robert H. Deng},
  title        = {Progressive protection of jpeg2000 codestreams},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {3447--3450},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1421856},
  doi          = {10.1109/ICIP.2004.1421856},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/WuMD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/ChatterjeeMMZHP03,
  author       = {Krishnendu Chatterjee and
                  Di Ma and
                  Rupak Majumdar and
                  Tian Zhao and
                  Thomas A. Henzinger and
                  Jens Palsberg},
  editor       = {Radhia Cousot},
  title        = {Stack Size Analysis for Interrupt-Driven Programs},
  booktitle    = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego,
                  CA, USA, June 11-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2694},
  pages        = {109--126},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44898-5\_7},
  doi          = {10.1007/3-540-44898-5\_7},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/ChatterjeeMMZHP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftrtft/PalsbergM02,
  author       = {Jens Palsberg and
                  Di Ma},
  editor       = {Werner Damm and
                  Ernst{-}R{\"{u}}diger Olderog},
  title        = {A Typed Interrupt Calculus},
  booktitle    = {Formal Techniques in Real-Time and Fault-Tolerant Systems, 7th International
                  Symposium, {FTRTFT} 2002, Co-sponsored by {IFIP} {WG} 2.2, Oldenburg,
                  Germany, September 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2469},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45739-9\_18},
  doi          = {10.1007/3-540-45739-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ftrtft/PalsbergM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WuMX02,
  author       = {Yongdong Wu and
                  Di Ma and
                  Changsheng Xu},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Efficient Object-Based Stream Authentication},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {354--367},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_28},
  doi          = {10.1007/3-540-36231-2\_28},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WuMX02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PalsbergKKMSZ00,
  author       = {Jens Palsberg and
                  S. Krishnaswamy and
                  Minseok Kwon and
                  Di Ma and
                  Qiuyun Shao and
                  Y. Zhang},
  title        = {Experience with Software Watermarking},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {308--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898885},
  doi          = {10.1109/ACSAC.2000.898885},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PalsbergKKMSZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/Ma85,
  author       = {Di Ma},
  title        = {A Physical and SPICE-Compatible Model for the {MOS} Depletion Device},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {4},
  number       = {3},
  pages        = {349--356},
  year         = {1985},
  url          = {https://doi.org/10.1109/TCAD.1985.1270131},
  doi          = {10.1109/TCAD.1985.1270131},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/Ma85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}