关注
Cunqing Ma 马存庆
Cunqing Ma 马存庆
Institute of Information Engineering, CAS
在 tsinghua.org.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Offline RFID grouping proofs with trusted timestamps
C Ma, J Lin, Y Wang, M Shang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
302012
Gait2Vec: continuous authentication of smartphone users based on gait behavior
L He, C Ma, C Tu, Y Zhang
2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022
202022
HPAZ: A high-throughput pipeline architecture of ZUC in hardware
Z Liu, Q Zhang, C Ma, C Li, J Jing
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 269-272, 2016
142016
FROPUF: how to extract more entropy from two ring oscillators in FPGA-based PUFs
Q Zhang, Z Liu, C Ma, C Li, L Zhang
International Conference on Security and Privacy in Communication Systems …, 2016
132016
Efficient missing tag detection in a large RFID system
C Ma, J Lin, Y Wang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
102012
Protecting data privacy in federated learning combining differential privacy and weak encryption
C Wang, C Ma, M Li, N Gao, Y Zhang, Z Shen
Science of Cyber Security: Third International Conference, SciSec 2021 …, 2021
92021
Android control flow obfuscation based on dynamic entry points modification
X Yang, L Zhang, C Ma, Z Liu, P Peng
2019 22nd International Conference on Control Systems and Computer Science …, 2019
82019
Trusted log storage and verification system based on blockchain
J Han, Z Ji, Y Li, CQ Ma
Comput. Eng. 45, 13-17, 2005
62005
Implementation of high throughput XTS-SM4 module for data storage devices
L Zheng, C Li, Z Liu, L Zhang, C Ma
International Conference on Security and Privacy in Communication Systems …, 2018
52018
Bignn: A bilateral-branch graph neural network to solve popularity bias in recommendation
Y Kou, N Gao, Y Zhang, C Tu, C Ma
2022 IEEE 34th International Conference on Tools with Artificial …, 2022
42022
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC
P Peng, C Ma, J Ge, N Gao, C Tu
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
42020
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
S Song, N Gao, Y Zhang, C Ma
Cybersecurity 7 (1), 2, 2024
32024
Learning to select prototypical parts for interpretable sequential data modeling
Y Zhang, N Gao, C Ma
Proceedings of the AAAI Conference on Artificial Intelligence 37 (5), 6612-6620, 2023
32023
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model
Z Zeng, C Tu, N Gao, C Xue, C Ma, Y Shan
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
32021
Flush-detector: More secure API resistant to flush-based spectre attacks on ARM cortex-A9
M He, C Ma, J Ge, N Gao, C Tu
2020 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2020
32020
Flush+ time: A high accuracy and high resolution cache attack on arm-fpga embedded soc
C Tang, P Liu, C Ma, Z Liu, J Ge
2020 IEEE 38th VLSI Test Symposium (VTS), 1-6, 2020
32020
Secflush: A hardware/software collaborative design for real-time detection and defense against flush-based cache attacks
C Tang, Z Liu, C Ma, J Ge, C Tu
International Conference on Information and Communications Security, 251-268, 2019
32019
基于区块链的可信日志存储与验证系统
韩菊茹, 纪兆轩, 李一鸣, 马存庆
计算机工程 45 (5), 13-17, 2019
32019
基于帧时隙 ALOHA 的 RFID 标签集合检测协议框架
梁雪萍, 马存庆, 梁颖升
计算机应用研究 33 (3), 730-733, 2016
32016
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT
H Wan, Q Wang, Y Teng, C Ma, J Lin, M Wang
2023 32nd International Conference on Computer Communications and Networks …, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20