Zhuo Ma

Orcid: 0000-0001-6023-2864

Affiliations:
  • Xidian University, Xi'an, China


According to our database1, Zhuo Ma authored at least 78 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ProvX: Generating Counterfactual-Driven Attack Explanations for Provenance-Based Detection.
CoRR, August, 2025

RUPT-FL: Robust Two-Layered Privacy-Preserving Federated Learning Framework With Unlinkability for IoV.
IEEE Trans. Veh. Technol., April, 2025

FedWiper: Federated Unlearning via Universal Adapter.
IEEE Trans. Inf. Forensics Secur., 2025

S-Teapot: Swift and Efficient Defense Against Patch-Based Backdoor Attack.
IEEE Trans. Dependable Secur. Comput., 2025

Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles.
IEEE Trans. Dependable Secur. Comput., 2025

Hotpatching on the Fly - Mitigating Drone Incidents Arising From Incorrect Configuration.
IEEE Trans. Dependable Secur. Comput., 2025

L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

SafeLead: Detecting and Excluding Random STS Attack in UWB Ranging System.
Proceedings of the IEEE INFOCOM 2025, 2025

Power of Diversity: Enhancing Data-Free Black-Box Attack with Domain-Augmented Learning.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Multi-Party Private Edge Computing for Collaborative Quantitative Exposure Detection of Endemic Diseases.
IEEE Trans. Mob. Comput., December, 2024

Location-Aware and Privacy-Preserving Data Cleaning for Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., December, 2024

Model Stealing Detection for IoT Services Based on Multidimensional Features.
IEEE Internet Things J., December, 2024

Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

A Privacy-Preserving Computation Framework for Multisource Label Propagation Services.
IEEE Trans. Serv. Comput., 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay.
J. Syst. Archit., 2024

Efficient 2PC for Constant Round Secure Equality Testing and Comparison.
IACR Cryptol. ePrint Arch., 2024

Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
CoRR, 2024

Mitigate noisy data for smart IoT via GAN based machine unlearning.
Sci. China Inf. Sci., 2024

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm.
Sci. China Inf. Sci., 2024

Need for Speed: Taming Backdoor Attacks with Speed and Precision.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Updates Leakage Attack Against Private Graph Split Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

An Efficient Key Agreement and Update Scheme in Cloud-Network-End Collaborative Security for Wireless Networks.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

Heuristic-based Parsing System for Big Data Log.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

2023
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation.
IEEE Trans. Knowl. Data Eng., December, 2023

Are our clone detectors good enough? An empirical study of code effects by obfuscation.
Cybersecur., December, 2023

Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database.
IEEE Trans. Big Data, October, 2023

A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.
Symmetry, February, 2023

iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023

DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

Learn to Forget: Machine Unlearning via Neuron Masking.
IEEE Trans. Dependable Secur. Comput., 2023

Sniffer: A Novel Model Type Detection System against Machine-Learning-as-a-Service Platforms.
Proc. VLDB Endow., 2023

LadderFilter: Filtering Infrequent Items with Small Memory and Time Overhead.
Proc. ACM Manag. Data, 2023

A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains.
IEEE Internet Things J., 2023

Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems.
IEEE Access, 2023

TripleLP: Privacy-Preserving Log Parsing Based on Blockchain.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement.
IEEE/ACM Trans. Netw., 2022

PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Defense with Machine Unlearning.
Proceedings of the IEEE INFOCOM 2022, 2022

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Sustainable Ensemble Learning Driving Intrusion Detection Model.
IEEE Trans. Dependable Secur. Comput., 2021

2020
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain.
IEEE Trans. Veh. Technol., 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

A machine learning-based scheme for the security analysis of authentication and key agreement protocols.
Neural Comput. Appl., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

Follow the Sound of Children's Heart: A Deep-Learning-Based Computer-Aided Pediatric CHDs Diagnosis System.
IEEE Internet Things J., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

Learn to Forget: User-Level Memorization Elimination in Federated Learning.
CoRR, 2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning.
CoRR, 2020

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
Proceedings of the Security and Privacy in Digital Economy, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Medical Privacy-preserving Service Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Veh. Technol., 2019

Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.
IEEE Internet Things J., 2019

Revocable Federated Learning: A Benchmark of Federated Forest.
CoRR, 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019

Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size.
IEEE Access, 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
Proceedings of the IEEE INFOCOM 2019, 2019

Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Compressive Sensing for Traffic Estimation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

2013
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
Inf. Technol. Control., 2013

2010
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Trans. Inf. Syst., 2010

2008
Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...