Zuchao Ma

Orcid: 0000-0002-7439-2823

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, China


According to our database1, Zuchao Ma authored at least 14 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023

2021
Towards efficient and energy-aware query processing for industrial internet of things.
Peer-to-Peer Netw. Appl., 2021

A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network.
IEEE Internet Things J., 2021

Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing.
Trans. Emerg. Telecommun. Technol., 2021

Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks.
Digit. Commun. Networks, 2021

Detection of selective-edge packet attack based on edge reputation in IoT networks.
Comput. Networks, 2021

ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ECTSA: An Efficient Charging Time Scheduling Algorithm for Wireless Rechargeable UAV Network.
Proceedings of the IFIP Networking Conference, 2021

2020
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Comput. Secur., 2020

Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks.
Proceedings of the Information Security - 23rd International Conference, 2020

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves.
Sensors, 2019

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Future Gener. Comput. Syst., 2019


  Loading...