Offline RFID grouping proofs with trusted timestamps C Ma, J Lin, Y Wang, M Shang 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 30 | 2012 |
Gait2Vec: continuous authentication of smartphone users based on gait behavior L He, C Ma, C Tu, Y Zhang 2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022 | 20 | 2022 |
HPAZ: A high-throughput pipeline architecture of ZUC in hardware Z Liu, Q Zhang, C Ma, C Li, J Jing 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 269-272, 2016 | 14 | 2016 |
FROPUF: how to extract more entropy from two ring oscillators in FPGA-based PUFs Q Zhang, Z Liu, C Ma, C Li, L Zhang International Conference on Security and Privacy in Communication Systems …, 2016 | 13 | 2016 |
Efficient missing tag detection in a large RFID system C Ma, J Lin, Y Wang 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 10 | 2012 |
Protecting data privacy in federated learning combining differential privacy and weak encryption C Wang, C Ma, M Li, N Gao, Y Zhang, Z Shen Science of Cyber Security: Third International Conference, SciSec 2021 …, 2021 | 9 | 2021 |
Android control flow obfuscation based on dynamic entry points modification X Yang, L Zhang, C Ma, Z Liu, P Peng 2019 22nd International Conference on Control Systems and Computer Science …, 2019 | 8 | 2019 |
Trusted log storage and verification system based on blockchain J Han, Z Ji, Y Li, CQ Ma Comput. Eng. 45, 13-17, 2005 | 6 | 2005 |
Implementation of high throughput XTS-SM4 module for data storage devices L Zheng, C Li, Z Liu, L Zhang, C Ma International Conference on Security and Privacy in Communication Systems …, 2018 | 5 | 2018 |
Bignn: A bilateral-branch graph neural network to solve popularity bias in recommendation Y Kou, N Gao, Y Zhang, C Tu, C Ma 2022 IEEE 34th International Conference on Tools with Artificial …, 2022 | 4 | 2022 |
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC P Peng, C Ma, J Ge, N Gao, C Tu 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 4 | 2020 |
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation S Song, N Gao, Y Zhang, C Ma Cybersecurity 7 (1), 2, 2024 | 3 | 2024 |
Learning to select prototypical parts for interpretable sequential data modeling Y Zhang, N Gao, C Ma Proceedings of the AAAI Conference on Artificial Intelligence 37 (5), 6612-6620, 2023 | 3 | 2023 |
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model Z Zeng, C Tu, N Gao, C Xue, C Ma, Y Shan 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 3 | 2021 |
Flush-detector: More secure API resistant to flush-based spectre attacks on ARM cortex-A9 M He, C Ma, J Ge, N Gao, C Tu 2020 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2020 | 3 | 2020 |
Flush+ time: A high accuracy and high resolution cache attack on arm-fpga embedded soc C Tang, P Liu, C Ma, Z Liu, J Ge 2020 IEEE 38th VLSI Test Symposium (VTS), 1-6, 2020 | 3 | 2020 |
Secflush: A hardware/software collaborative design for real-time detection and defense against flush-based cache attacks C Tang, Z Liu, C Ma, J Ge, C Tu International Conference on Information and Communications Security, 251-268, 2019 | 3 | 2019 |
基于区块链的可信日志存储与验证系统 韩菊茹, 纪兆轩, 李一鸣, 马存庆 计算机工程 45 (5), 13-17, 2019 | 3 | 2019 |
基于帧时隙 ALOHA 的 RFID 标签集合检测协议框架 梁雪萍, 马存庆, 梁颖升 计算机应用研究 33 (3), 730-733, 2016 | 3 | 2016 |
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT H Wan, Q Wang, Y Teng, C Ma, J Lin, M Wang 2023 32nd International Conference on Computer Communications and Networks …, 2023 | 2 | 2023 |