Rong Ma

According to our database1, Rong Ma authored at least 20 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wireless Communications and Mobile Computing, 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

A Novel Data Secure Deletion Scheme for Mobile Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Research on Reentry Vehicle Control Method Based on Robust Enhancement Strategy.
Proceedings of the 15th International Conference on Control, 2018

Scale Up Event Extraction Learning via Automatic Training Data Generation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking.
Security and Communication Networks, 2017

Serial number based encryption and its application for mobile social networks.
Peer-to-Peer Networking and Applications, 2017

Individual Factors Influencing Citation Competence in L2 Academic Writing.
Journal of Quantitative Linguistics, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Efficient Asymmetric Index Encapsulation Scheme for Named Data.
Proceedings of the Provable Security, 2016

Exploring User Mobile Shopping Activities Based on Characteristic of Eye-Tracking.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Frequency Domain and Time Domain Study of a Novel Compact CPW Fed Monopole UWB Antenna with L Shaped Slots for Band Notched Characteristics.
Proceedings of the Human Centered Computing - Second International Conference, 2016

A self-adapting method for RBC count from different blood smears based on PCNN and image quality.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
Serial Number Based Encryption and Its Application for Mobile Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Prevent CSI Spoofing in Uplink MU-MIMO Transmission.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

Device-free Human Activity Recognition using CSI.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

2011
A Robust Method for Vanishing Point Estimation in Road Image.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2009
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge.
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009

Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Proceedings of the Advances in Cryptology, 2009


  Loading...