Chunguang Ma

According to our database1, Chunguang Ma authored at least 63 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UAV Classification Based on Deep Learning Fusion of Multidimensional UAV Micro-Doppler Image Features.
IEEE Geosci. Remote. Sens. Lett., 2024

2021
Leakage Resilient Leveled $\mathsf {FHE}$FHE on Multiple Bits Message.
IEEE Trans. Big Data, 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

2020
Accelerated Depreciation Tax Credit and Corporate Financialization Based on the PSM-DID Model.
Wirel. Commun. Mob. Comput., 2020

Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Achieving Multi-Hop PRE via Branching Program.
IEEE Trans. Cloud Comput., 2020

Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection.
Mob. Inf. Syst., 2020

Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting.
Int. J. Found. Comput. Sci., 2020

Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting.
IEEE Access, 2020

Ring Selection for Ring Signature-Based Privacy Protection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Energy Flow Domain Reverse-Time Migration for Borehole Radar.
IEEE Trans. Geosci. Remote. Sens., 2019

A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing.
Symmetry, 2019

An Ultrawide Band Antipodal Vivaldi Antenna for Airborne GPR Application.
IEEE Geosci. Remote. Sens. Lett., 2019

Unidirectional FHPRE Scheme from Lattice for Cloud Computing.
Int. J. Netw. Secur., 2019

A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

PPD-DL: Privacy-Preserving Decentralized Deep Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
A Key Pre-Distribution Scheme Based on <i>µ</i>-PBIBD for Enhancing Resilience in Wireless Sensor Networks.
Sensors, 2018

Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons.
Quantum Inf. Process., 2018

Multi-key FHE for multi-bit messages.
Sci. China Inf. Sci., 2018

Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline.
Proceedings of the e-Learning, e-Education, and Online Training, 2018

2017
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme.
Wirel. Pers. Commun., 2017

A Flexible Fully Homomorphic Encryption.
Wirel. Pers. Commun., 2017

Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services.
J. Circuits Syst. Comput., 2017

Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017

An Opportunistic Network Coding Routing for Opportunistic Networks.
Int. J. Parallel Program., 2017

Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment.
Int. J. Found. Comput. Sci., 2017

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A new combination method for multisensor conflict information.
J. Supercomput., 2016

Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016

A Homomorphic Proxy Re-encryption from Lattices.
Proceedings of the Provable Security, 2016

Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016

A Users Collaborative Scheme for Location and Query Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS.
Int. J. Distributed Sens. Networks, 2015

An Improved Fine-Grained Encryption Method for Unstructured Big Data.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing.
Proceedings of the Intelligent Computation in Big Data Era, 2015

2014
Security flaws in two improved remote user authentication schemes using smart cards.
Int. J. Commun. Syst., 2014

A Location Privacy Preserving Method Based on Sensitive Diversity for LBS.
Proceedings of the Network and Parallel Computing, 2014

2013
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
J. Networks, 2013

Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
Inf. Fusion, 2013

2012
Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks.
J. Comput., 2012

Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
IACR Cryptol. ePrint Arch., 2012

On the (in)security of some smart-card-based password authentication schemes for WSN.
IACR Cryptol. ePrint Arch., 2012

Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
IACR Cryptol. ePrint Arch., 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
IACR Cryptol. ePrint Arch., 2012

Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Breaking a Robust Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2012

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy.
Proceedings of the Web Technologies and Applications, 2012

2010
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
J. Networks, 2010

2009
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
ID-based deniable ring authentication with constant-size signature.
Frontiers Comput. Sci. China, 2008

2007
An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Novel Method to Authenticate Transitively Closed Undirected Graph.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

2006
A New Method for the Design of Stateless Transitive Signature Schemes.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006


  Loading...