Di Ma
Orcid: 0000-0001-7330-4716Affiliations:
- University of Michigan-Dearborn, Department of Computer and Information Science, Dearborn, MI, USA
- University of Michigan, Ann Arbor, MI, USA
- University of California, Irvine, CA, USA (PhD 2009)
According to our database1,
Di Ma
authored at least 88 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Access, 2024
Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network.
Proceedings of the IEEE INFOCOM 2024, 2024
2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
2022
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022
A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion Detection.
IEEE Access, 2022
A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks.
IEEE Access, 2022
2021
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain.
IEEE Trans. Reliab., 2021
2020
SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems.
Veh. Commun., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020
2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019
Proceedings of the International Arab Conference on Information Technology, 2019
2018
IEEE Trans. Mob. Comput., 2018
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
2014
IEEE Wirel. Commun., 2014
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014
J. Netw. Comput. Appl., 2014
IEEE Internet Things J., 2014
Sci. China Inf. Sci., 2014
2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Emerg. Top. Comput., 2013
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Telecommun. Syst., 2012
Int. J. Cooperative Inf. Syst., 2012
Comput. Networks, 2012
Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
2010
Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization.
IEEE Trans. Veh. Technol., 2010
The hop count shift problem and its impacts on protocol design in wireless ad hoc networks.
Telecommun. Syst., 2010
A novel approach toward source-to-sink distance estimation in wireless sensor networks.
IEEE Commun. Lett., 2010
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the 11th International Conference on Control, 2010
Proceedings of the International Conference on Body Sensor Networks, 2010
2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
IEEE Netw., 2009
A survey of movement strategies for improving network coverage in wireless sensor networks.
Comput. Commun., 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Information Security Practice and Experience, 2007
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2002
Proceedings of the Progress in Cryptology, 2002