Select Publications

Journal articles

Luo B; Li X; Liu X; Guo J; Ren Y; Ma S; Ma J, 2024, 'D2MTS: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 927 - 942, http://dx.doi.org/10.1109/TKDE.2023.3294503

Zhang M; Li X; Miao Y; Luo B; Ma S; Choo KKR; Deng RH, 2024, 'Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS', IEEE Transactions on Services Computing, 17, pp. 589 - 603, http://dx.doi.org/10.1109/TSC.2024.3354240

Han R; Ma S; Li J; Nepal S; Lo D; Ma Z; Ma J, 2024, 'Range Specification Bug Detection in Flight Control System Through Fuzzing', IEEE Transactions on Software Engineering, 50, pp. 461 - 473, http://dx.doi.org/10.1109/TSE.2024.3354739

Zhang M; Li X; Miao Y; Luo B; Ren Y; Ma S, 2024, 'PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 781 - 794, http://dx.doi.org/10.1109/TKDE.2023.3295451

Xi N; Zhang Y; Feng P; Ma S; Ma J; Shen Y; Yang Y, 2024, '<sc>GNNDroid</sc>: Graph-Learning based Malware Detection for Android Apps with Native Code', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3444913

Jia J; Ma S; Liu Y; Wang L; Deng RH, 2024, 'A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 59 - 73, http://dx.doi.org/10.1109/TIFS.2023.3318936

Han R; Gong H; Ma S; Li J; Xu C; Bertino E; Nepal S; Ma Z; Ma J, 2024, 'A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects', IEEE Transactions on Information Forensics and Security, 19, pp. 722 - 734, http://dx.doi.org/10.1109/TIFS.2023.3326985

Jia J; Ma S; Wang L; Liu Y; Deng RH, 2024, 'A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services', IEEE Transactions on Computers, 73, pp. 58 - 72, http://dx.doi.org/10.1109/TC.2023.3318403

Huang J; Du C; Zhu X; Ma S; Nepal S; Xu C, 2024, 'Anti-Compression Contrastive Facial Forgery Detection', IEEE Transactions on Multimedia, 26, pp. 6166 - 6177, http://dx.doi.org/10.1109/TMM.2023.3347103

Zhang Y; Ma S; Chen T; Li J; Deng RH; Bertino E, 2024, 'EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry', IEEE Transactions on Dependable and Secure Computing, 21, pp. 1544 - 1556, http://dx.doi.org/10.1109/TDSC.2023.3286182

Chen Z; Zhang H; Li X; Miao Y; Zhang X; Zhang M; Ma S; Deng RH, 2024, 'FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 8140 - 8154, http://dx.doi.org/10.1109/TIFS.2024.3433537

Liu J; Li X; Liu X; Tang J; Ma S; Weng J, 2023, 'A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network', IEEE Transactions on Cloud Computing, 11, pp. 3381 - 3395, http://dx.doi.org/10.1109/TCC.2023.3287552

Qiao H; Dong X; Jiang Q; Ma S; Liu C; Xi N; Shen Y, 2023, 'Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System', IEEE Internet of Things Journal, 10, pp. 16715 - 16726, http://dx.doi.org/10.1109/JIOT.2023.3270300

Hu Y; Zhang F; Xia Y; Yao Z; Zeng L; Ding H; Wei Z; Zhang X; Zhai J; Du X; Ma S, 2023, 'Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms', IEEE Transactions on Parallel and Distributed Systems, 34, pp. 2699 - 2717, http://dx.doi.org/10.1109/TPDS.2023.3294341

Sun C; Xu X; Wu Y; Zeng D; Tan G; Ma S; Wang P, 2023, 'CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis', IET Information Security, 17, pp. 582 - 597, http://dx.doi.org/10.1049/ise2.12117

Jia J; Luo M; Ma S; Wang L; Liu Y, 2023, 'Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis', IEEE Transactions on Knowledge and Data Engineering, 35, pp. 5665 - 5679, http://dx.doi.org/10.1109/TKDE.2022.3155924

Ren Y; Li X; Miao Y; Deng RH; Weng J; Ma S; Ma J, 2023, 'DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services', IEEE Transactions on Mobile Computing, 22, pp. 3287 - 3302, http://dx.doi.org/10.1109/TMC.2022.3141398

Sun C; Ma Y; Zeng D; Tan G; Ma S; Wu Y, 2023, 'μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1461 - 1475, http://dx.doi.org/10.1109/TDSC.2022.3155693

Li X; Bai L; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2023, 'Privacy-Preserving Top- κ Spatial Keyword Queries in Fog-Based Cloud Computing', IEEE Transactions on Services Computing, 16, pp. 504 - 514, http://dx.doi.org/10.1109/TSC.2021.3130633

Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, 'Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization', IEEE Transactions on Multimedia, 26, pp. 5014 - 5025, http://dx.doi.org/10.1109/TMM.2023.3330089

Li X; Tong Q; Zhao J; Miao Y; Ma S; Weng J; Ma J; Choo KKR, 2023, 'VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data', IEEE Transactions on Services Computing, 16, pp. 698 - 710, http://dx.doi.org/10.1109/TSC.2021.3140092

Jia J; Luo M; Ma S; Wang L, 2022, 'Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning', IEEE Transactions on Industrial Informatics, 18, pp. 7463 - 7474, http://dx.doi.org/10.1109/TII.2022.3168029

Zhang X; Li X; Miao Y; Luo X; Wang Y; Ma S; Weng J, 2022, 'A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT', IEEE Transactions on Industrial Informatics, 18, pp. 4456 - 4465, http://dx.doi.org/10.1109/TII.2021.3123312

Li H; Cheng Q; Li X; Ma S; Ma J, 2022, 'Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing', IEEE Systems Journal, 16, pp. 1832 - 1841, http://dx.doi.org/10.1109/JSYST.2021.3112581

Cheng Q; Chen T; Ma S; Li X, 2022, 'Improvement on a batch authenticated key agreement scheme', Frontiers of Computer Science, 16, http://dx.doi.org/10.1007/s11704-020-0194-7

Li X; Zhang H; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2022, 'CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles', IEEE Internet of Things Journal, 9, pp. 3359 - 3371, http://dx.doi.org/10.1109/JIOT.2021.3098221

Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188

Liu Y; Ma Z; Liu X; Ma S; Ren K, 2022, 'Privacy-Preserving Object Detection for Medical Images with Faster R-CNN', IEEE Transactions on Information Forensics and Security, 17, pp. 69 - 84, http://dx.doi.org/10.1109/TIFS.2019.2946476

Jia J; Wu Y; Li A; Ma S; Liu Y, 2022, 'Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3194704

Sun R; Yang B; Ma S; Shen Y; Jiang X, 2021, 'Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control', IEEE Transactions on Communications, 69, pp. 6198 - 6212, http://dx.doi.org/10.1109/TCOMM.2021.3089694

Li X; Chen T; Cheng Q; Ma S; Ma J, 2021, 'Smart Applications in Edge Computing: Overview on Authentication and Data Security', IEEE Internet of Things Journal, 8, pp. 4063 - 4080, http://dx.doi.org/10.1109/JIOT.2020.3019297

Li X; Zhang H; Ren Y; Ma S; Luo B; Weng J; Ma J; Huang X, 2020, 'PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs', IEEE Internet of Things Journal, 7, pp. 11789 - 11802, http://dx.doi.org/10.1109/JIOT.2020.3001381

Ma Z; Yang Y; Liu X; Liu Y; Ma S; Ren K; Yao C, 2020, 'EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid', IEEE Transactions on Industrial Informatics, 16, pp. 6597 - 6606, http://dx.doi.org/10.1109/TII.2019.2946047

Ma S; Liu Y; Nepal S, 2020, 'Are android apps being protected well against attacks?', IEEE Wireless Communications, 27, pp. 66 - 71, http://dx.doi.org/10.1109/MWC.001.1900432

Ma S; Lai J; Deng RH; Ding X, 2017, 'Adaptable key-policy attribute-based encryption with time interval', Soft Computing, 21, pp. 6191 - 6200, http://dx.doi.org/10.1007/s00500-016-2177-z

Ma S; Lo D; Xi N, 2016, 'Collaborative 'many to many' DDoS detection in cloud', International Journal of Ad Hoc and Ubiquitous Computing, 23, pp. 192 - 202, http://dx.doi.org/10.1504/IJAHUC.2016.10000397

Qin B; Deng RH; Liu S; Ma S, 2015, 'Attribute-based encryption with efficient verifiable outsourced decryption', IEEE Transactions on Information Forensics and Security, 10, pp. 1384 - 1393, http://dx.doi.org/10.1109/TIFS.2015.2410137


Back to profile page