Di Ma

Orcid: 0000-0001-7330-4716

Affiliations:
  • University of Michigan-Dearborn, Department of Computer and Information Science, Dearborn, MI, USA
  • University of Michigan, Ann Arbor, MI, USA
  • University of California, Irvine, CA, USA (PhD 2009)


According to our database1, Di Ma authored at least 88 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024

Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024

Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation.
IEEE Trans. Inf. Forensics Secur., 2024

A Novel Variability-Rich Scheme for Software Updates of Automotive Systems.
IEEE Access, 2024

Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Digital Shadows for Remote Automotive SW Verification.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

2022
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022

A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion Detection.
IEEE Access, 2022

A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks.
IEEE Access, 2022

2021
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain.
IEEE Trans. Reliab., 2021

2020
SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems.
Veh. Commun., 2020

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020

2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019

An intelligent intrusion detection system.
Appl. Intell., 2019

Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Fuzzy Based Threat Assessment Model (FTAM).
Proceedings of the International Arab Conference on Information Technology, 2019

2018
Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic.
IEEE Trans. Mob. Comput., 2018

Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

2017
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Hybrid de-anonymization across real-world heterogeneous social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Demographics inference through Wi-Fi network traffic analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Risk Assessment for Cooperative Automated Driving.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Traffic Aware Virtual Machine Packing in Cloud Data Centers.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015

Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

2014
Securing emerging short range wireless communications: the state of the art.
IEEE Wirel. Commun., 2014

A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014

Secure and efficient random functions with variable-length output.
J. Netw. Comput. Appl., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Lattice-based key exchange on small integer solution problem.
Sci. China Inf. Sci., 2014

2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013

Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
IEEE Trans. Emerg. Top. Comput., 2013

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

End-to-end aggregate authentication of time-series data.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Cryptographic Spatio-temporal Predicates for Location-Based Services.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Broadcast based on layered diffusion in wireless <i>ad hoc</i> and sensor networks.
Wirel. Commun. Mob. Comput., 2012

Self-healing in unattended wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Range-free wireless sensor networks localization based on hop-count quantization.
Telecommun. Syst., 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

A coverage-aware clustering protocol for wireless sensor networks.
Comput. Networks, 2012

Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Secure Data Retrieval of Outsourced Data with Complex Query Support.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Addressing Flaws in RFID Authentication Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Content usage tracking in superdistribution.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Building Trust for lambda-Congenial Secret Groups.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Security and privacy in emerging wireless networks.
IEEE Wirel. Commun., 2010

Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization.
IEEE Trans. Veh. Technol., 2010

The hop count shift problem and its impacts on protocol design in wireless ad hoc networks.
Telecommun. Syst., 2010

A novel approach toward source-to-sink distance estimation in wireless sensor networks.
IEEE Commun. Lett., 2010

A Coverage-Aware Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

IRRES: Intrusion-Resilient Remote Email Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

A lower bound on expected localization error in wireless sensor network.
Proceedings of the 11th International Conference on Control, 2010

A Soldier Health Monitoring System for Military Applications.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Energy Efficient Information Processing in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Adaptive Distributed Resource Allocation for Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

A new approach to secure logging.
ACM Trans. Storage, 2009

New adversary and new threats: security in unattended sensor networks.
IEEE Netw., 2009

A survey of movement strategies for improving network coverage in wireless sensor networks.
Comput. Commun., 2009

Hop-Count Based Node-to-Anchor Distance Estimation in Wireless Sensor Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
DISH: Distributed Self-Healing.
Proceedings of the Stabilization, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2008

A Middleware Services Simulation Platform for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Practical forward secure sequential aggregate signatures.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

WISDOM: Simulation Framework for Middleware Services in Wireless Sensor Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Trans. Multim., 2007

Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Secure Feedback Service in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2007

2005
Scalable trusted online dissemination of JPEG2000 images.
Multim. Syst., 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Progressive protection of jpeg2000 codestreams.
Proceedings of the 2004 International Conference on Image Processing, 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2002
Efficient Object-Based Stream Authentication.
Proceedings of the Progress in Cryptology, 2002


  Loading...