Duohe Ma

According to our database1, Duohe Ma authored at least 18 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Deepfake Detection Using Multiple Facial Features.
Proceedings of the Advances in Digital Forensics XIX, 2023

2022
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding).
计算机科学, 2019

A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018

Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun., 2018

2017
Optimal Strategy Selection for Moving Target Defense Based on Markov Game.
IEEE Access, 2017

Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2014
Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2006
Research on Applying Java Card to Database Encryption Systems.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006


  Loading...