Zhuo Ma

Orcid: 0000-0001-6023-2864

According to our database1, Zhuo Ma authored at least 84 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

Inferring Individual Human Mobility From Sparse Check-in Data: A Temporal-Context-Aware Approach.
IEEE Trans. Comput. Soc. Syst., February, 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation.
IEEE Trans. Knowl. Data Eng., December, 2023

Are our clone detectors good enough? An empirical study of code effects by obfuscation.
Cybersecur., December, 2023

Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database.
IEEE Trans. Big Data, October, 2023

Multidisciplinary considerations of fairness in medical AI: A scoping review.
Int. J. Medical Informatics, October, 2023

Design and Verification of Lockable Upper-Limb Exoskeleton Based on Jamming and Engagement Mechanisms.
IEEE Robotics Autom. Lett., March, 2023

LPP2KL: Online Location Privacy Protection Against Knowing-and-Learning Attacks for LBSs.
IEEE Trans. Comput. Soc. Syst., February, 2023

A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.
Symmetry, February, 2023

iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023

DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

Learn to Forget: Machine Unlearning via Neuron Masking.
IEEE Trans. Dependable Secur. Comput., 2023

Sniffer: A Novel Model Type Detection System against Machine-Learning-as-a-Service Platforms.
Proc. VLDB Endow., 2023

LadderFilter: Filtering Infrequent Items with Small Memory and Time Overhead.
Proc. ACM Manag. Data, 2023

A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains.
IEEE Internet Things J., 2023

Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems.
IEEE Access, 2023

TripleLP: Privacy-Preserving Log Parsing Based on Blockchain.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Efficiently Answering Quality Constrained Shortest Distance Queries in Large Graphs.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2022
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement.
IEEE/ACM Trans. Netw., 2022

PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Reconfigurable Self-Sensing Pneumatic Artificial Muscle With Locking Ability Based on Modular Multi-Chamber Soft Actuator.
IEEE Robotics Autom. Lett., 2022

Deep Reinforcement Learning-based UAV-assisted Mobile Edge Computing Offloading and Resource Allocation Decision.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Dynamic Resource Scheduling and Frequency Scaling in NOMA-Based Multi-access Edge Computing System.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2022

Backdoor Defense with Machine Unlearning.
Proceedings of the IEEE INFOCOM 2022, 2022

Design and Verification of an Active Lower Limb Exoskeleton for Micro-low Gravity Simulation Training.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

A Temporal-Context-Aware Approach for Individual Human Mobility Inference Based on Sparse Trajectory Data.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Sustainable Ensemble Learning Driving Intrusion Detection Model.
IEEE Trans. Dependable Secur. Comput., 2021

Deep Reinforcement Learning Based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Novel pneumatic artificial muscle based on film thermoforming and wire weaving.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

A Performance Evaluating Platform for Variable Stiffness Exoskeleton Joint.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

2020
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain.
IEEE Trans. Veh. Technol., 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Near-Infrared Tunable Laser Absorption Spectroscopic Acetylene Sensor System Using a Novel Three Mirror-Based, Dense Pattern Gas Cell.
Sensors, 2020

A Novel Fault Diagnosis Approach for Chillers Based on 1-D Convolutional Neural Network and Gated Recurrent Unit.
Sensors, 2020

A machine learning-based scheme for the security analysis of authentication and key agreement protocols.
Neural Comput. Appl., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

Follow the Sound of Children's Heart: A Deep-Learning-Based Computer-Aided Pediatric CHDs Diagnosis System.
IEEE Internet Things J., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

Towards tenant demand-aware bandwidth allocation strategy in cloud datacenter.
Future Gener. Comput. Syst., 2020

Learn to Forget: User-Level Memorization Elimination in Federated Learning.
CoRR, 2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning.
CoRR, 2020

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
Proceedings of the Security and Privacy in Digital Economy, 2020

Deep Reinforcement Learning for Pre-caching and Task Allocation in Internet of Vehicles.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

Deep Deterministic Policy Gradient Based Resource Allocation in Internet of Vehicles.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Medical Privacy-preserving Service Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Collusion-aware detection of review spammers in location based social networks.
World Wide Web, 2019

Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions.
IEEE Wirel. Commun., 2019

Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Veh. Technol., 2019

Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.
IEEE Internet Things J., 2019

Revocable Federated Learning: A Benchmark of Federated Forest.
CoRR, 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019

Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size.
IEEE Access, 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
Proceedings of the IEEE INFOCOM 2019, 2019

Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Compressive Sensing for Traffic Estimation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services.
Secur. Commun. Networks, 2018

Multi-feature based event recommendation in Event-Based Social Network.
Int. J. Comput. Intell. Syst., 2018

2016
Attribute-Based Influence Maximization in Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

A simple frequency-domain equalizer over doubly-selective channel without feedback.
Proceedings of the International Conference on Computer, 2016

Time Series Based Bandwidth Allocation Strategy in Cloud Datacenter.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2014
A 40nm/65nm process adaptive low jitter phase-locked loop.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Data Directed Estimation Based Turbo Equalization in HF Communication.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
Inf. Technol. Control., 2013

An adaptive multi-modulus frequency divider.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2011
A noise rejective VCO with build-in active LC filter.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2010
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Trans. Inf. Syst., 2010

2008
Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...