Zuchao Ma

Orcid: 0000-0002-7439-2823

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, China


According to our database1, Zuchao Ma authored at least 18 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Uncovering NFT Domain-Specific Defects on Smart Contract Bytecode.
IEEE Trans. Dependable Secur. Comput., 2025

Automated Soundness and Completeness Vetting of Polygon zkEVM.
Proceedings of the 34th USENIX Security Symposium, 2025

Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer.
Proceedings of the 34th USENIX Security Symposium, 2025

2024
Understanding Vulnerability Inducing Commits of the Linux Kernel.
ACM Trans. Softw. Eng. Methodol., September, 2024

2023
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023

2021
Towards efficient and energy-aware query processing for industrial internet of things.
Peer-to-Peer Netw. Appl., 2021

A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network.
IEEE Internet Things J., 2021

Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing.
Trans. Emerg. Telecommun. Technol., 2021

Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks.
Digit. Commun. Networks, 2021

Detection of selective-edge packet attack based on edge reputation in IoT networks.
Comput. Networks, 2021

ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ECTSA: An Efficient Charging Time Scheduling Algorithm for Wireless Rechargeable UAV Network.
Proceedings of the IFIP Networking Conference, 2021

2020
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Comput. Secur., 2020

Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks.
Proceedings of the Information Security - 23rd International Conference, 2020

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves.
Sensors, 2019

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Future Gener. Comput. Syst., 2019


  Loading...