Di Ma

According to our database1, Di Ma authored at least 127 papers between 1985 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
BVI-SynTex: A Synthetic Video Texture Dataset for Video Compression and Quality Assessment.
IEEE Trans. Multim., 2021

MFRNet: A New CNN Architecture for Post-Processing and In-loop Filtering.
IEEE J. Sel. Top. Signal Process., 2021

SVM-based global vision system of sports competition and action recognition.
J. Intell. Fuzzy Syst., 2021

2020
Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties.
RFC, September, 2020

SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems.
Veh. Commun., 2020

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Practical source-independent quantum random number generation with detector efficiency mismatch.
Quantum Inf. Process., 2020

Distribution agnostic Bayesian matching pursuit based on the exponential embedded family.
Neurocomputing, 2020

Bayesian compressive principal component analysis.
Frontiers Comput. Sci., 2020

Neural Computing Enhanced Parameter Estimation for Multi-Input and Multi-Output Total Non-Linear Dynamic Models.
Entropy, 2020

CVEGAN: A Perceptually-inspired GAN for Compressed Video Enhancement.
CoRR, 2020

Video Compression with CNN-based Post Processing.
CoRR, 2020

Video compression with low complexity CNN-based spatial resolution adaptation.
CoRR, 2020

BVI-DVC: A Training Database for Deep Video Compression.
CoRR, 2020

Integrated Analysis of a Noncoding RNA-Associated Competing Endogenous RNA Network in Non-Alcoholic Fatty Liver Disease.
IEEE Access, 2020

A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020

Understanding the Political Ideology of Legislators from Social Media Images.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Gan-Based Effective Bit Depth Adaptation for Perceptual Video Compression.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019

2D compressed learning: support matrix machine with bilinear random projections.
Mach. Learn., 2019

An intelligent intrusion detection system.
Appl. Intell., 2019

A Synthetic Video Dataset for Video Compression Evaluation.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
Simplified Local Internet Number Resource Management with the RPKI (SLURM).
RFC, August, 2018

Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic.
IEEE Trans. Mob. Comput., 2018

Heterogeneous multi-output classification by structured conditional risk minimization.
Pattern Recognit. Lett., 2018

Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Perceptually-Aligned Frame Rate Selection Using Spatio-Temporal Features.
Proceedings of the 2018 Picture Coding Symposium, 2018

Layered Optical Flow Estimation Using a Deep Neural Network with a Soft Mask.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Generating Image Sequence from Description with LSTM Conditional GAN.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Multi-target Core Network-Based Networked Multi-label Classification.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018

2017
Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI).
RFC, September, 2017

Ecosystem particle swarm optimization.
Soft Comput., 2017

An Approach for Building Security Resilience in AUTOSAR Based Safety Critical Systems.
J. Cyber Secur. Mobil., 2017

A low complexity algorithm for across range unit effect correction of the moving target via range frequency polynomial-phase transform.
Digit. Signal Process., 2017

Lecture video indexing using boosted margin maximizing neural networks.
CoRR, 2017

Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Lecture Vdeo Indexing Using Boosted Margin Maximizing Neural Networks.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Hybrid de-anonymization across real-world heterogeneous social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Control strategy PSO.
Appl. Soft Comput., 2016

Demographics inference through Wi-Fi network traffic analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

CGMOS: Certainty Guided Minority OverSampling.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Risk Assessment for Cooperative Automated Driving.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015

Social Community-Oriented Social Attribute Analysis: An Empirical Study on QQ Group Data.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

2014
Securing emerging short range wireless communications: the state of the art.
IEEE Wirel. Commun., 2014

Seamline Network Refinement Based on Area Voronoi Diagrams With Overlap.
IEEE Trans. Geosci. Remote. Sens., 2014

A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014

Secure and efficient random functions with variable-length output.
J. Netw. Comput. Appl., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

A parameter selection strategy for particle swarm optimization based on particle positions.
Expert Syst. Appl., 2014

Lattice-based key exchange on small integer solution problem.
Sci. China Inf. Sci., 2014

A machine learning based lecture video segmentation and indexing algorithm.
Proceedings of the Document Recognition and Retrieval XXI, 2014

2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013

Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
IEEE Trans. Emerg. Top. Comput., 2013

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Incorporating Social Actions into Recommender Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

A Server Friendly File Synchronization Mechanism for Cloud Storage.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

A super resolution framework for low resolution document image OCR.
Proceedings of the Document Recognition and Retrieval XX, 2013

End-to-end aggregate authentication of time-series data.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Cryptographic Spatio-temporal Predicates for Location-Based Services.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Broadcast based on layered diffusion in wireless <i>ad hoc</i> and sensor networks.
Wirel. Commun. Mob. Comput., 2012

Self-healing in unattended wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Range-free wireless sensor networks localization based on hop-count quantization.
Telecommun. Syst., 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

A coverage-aware clustering protocol for wireless sensor networks.
Comput. Networks, 2012

Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Secure Data Retrieval of Outsourced Data with Complex Query Support.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Wireless medical implant: A case study on artificial pancreas.
Proceedings of IEEE International Conference on Communications, 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
Proceedings of the Computer Security - ESORICS 2012, 2012

Lecture video segmentation and indexing.
Proceedings of the Document Recognition and Retrieval XIX, 2012

2011
Addressing Flaws in RFID Authentication Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Host-identifier-based scheme for source accountability of the internet.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

MR-DBSCAN: An Efficient Parallel Density-Based Clustering Algorithm Using MapReduce.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Content usage tracking in superdistribution.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Building Trust for lambda-Congenial Secret Groups.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Security and privacy in emerging wireless networks.
IEEE Wirel. Commun., 2010

Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization.
IEEE Trans. Veh. Technol., 2010

The hop count shift problem and its impacts on protocol design in wireless ad hoc networks.
Telecommun. Syst., 2010

A novel approach toward source-to-sink distance estimation in wireless sensor networks.
IEEE Commun. Lett., 2010

A Coverage-Aware Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

IRRES: Intrusion-Resilient Remote Email Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

A lower bound on expected localization error in wireless sensor network.
Proceedings of the 11th International Conference on Control, 2010

A Soldier Health Monitoring System for Military Applications.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Energy Efficient Information Processing in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Adaptive Distributed Resource Allocation for Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

A new approach to secure logging.
ACM Trans. Storage, 2009

New adversary and new threats: security in unattended sensor networks.
IEEE Netw., 2009

A survey of movement strategies for improving network coverage in wireless sensor networks.
Comput. Commun., 2009

An application of host identity tags to DKIM for identifying signers.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

Hop-Count Based Node-to-Anchor Distance Estimation in Wireless Sensor Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
DISH: Distributed Self-Healing in Unattended Sensor Networks.
IACR Cryptol. ePrint Arch., 2008

DISH: Distributed Self-Healing.
Proceedings of the Stabilization, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2008

A Middleware Services Simulation Platform for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Practical forward secure sequential aggregate signatures.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

WISDOM: Simulation Framework for Middleware Services in Wireless Sensor Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Trans. Multim., 2007

Forward-Secure Sequential Aggregate Authentication.
IACR Cryptol. ePrint Arch., 2007

Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Secure Feedback Service in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2007

2006
Successful IP Business Models.
Proceedings of the 7th International Symposium on Quality of Electronic Design (ISQED 2006), 2006

2005
Scalable trusted online dissemination of JPEG2000 images.
Multim. Syst., 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Stack size analysis for interrupt-driven programs.
Inf. Comput., 2004

Progressive protection of jpeg2000 codestreams.
Proceedings of the 2004 International Conference on Image Processing, 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Efficient and secure encryption schemes for JPEG2000.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2002
Efficient Object-Based Stream Authentication.
Proceedings of the Progress in Cryptology, 2002

A Typed Interrupt Calculus.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002

2000
Experience with Software Watermarking.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1985
A Physical and SPICE-Compatible Model for the MOS Depletion Device.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1985


  Loading...