Di Ma
Cited by
Cited by
A new approach to secure logging
D Ma, G Tsudik
ACM Transactions on Storage (TOS) 5 (1), 1-21, 2009
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Forward-secure sequential aggregate authentication
D Ma, G Tsudik
2007 IEEE Symposium on Security and Privacy (SP'07), 86-91, 2007
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, AK Prasad, N Saxena, T Xiang
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma
IEEE internet of things journal 1 (1), 33-45, 2014
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
Risk assessment for cooperative automated driving
D Dominic, S Chhawri, RM Eustice, D Ma, A Weimerskirch
Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016
Rapid prototyping applications in medicine. Part 1: NURBS-based volume modelling
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18, 103-117, 2001
Security and privacy in emerging wireless networks
D Ma, G Tsudik
IEEE Wireless Communications 17 (5), 12-21, 2010
Privacy leakage via de-anonymization and aggregation in heterogeneous social networks
H Li, Q Chen, H Zhu, D Ma, H Wen, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (2), 350-362, 2017
An intelligent intrusion detection system
N Kaja, A Shaout, D Ma
Applied Intelligence 49, 3235-3247, 2019
Practical forward secure sequential aggregate signatures
D Ma
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
Rapid prototyping applications in medicine. Part 2: STL file generation and case studies
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18, 118-127, 2001
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
DISH: Distributed Self-Healing: (In Unattended Sensor Networks)
D Ma, G Tsudik
Symposium on Self-Stabilizing Systems, 47-62, 2008
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
Lattice-based key exchange on small integer solution problem
SB Wang, Y Zhu, D Ma, RQ Feng
Science China Information Sciences 57, 1-12, 2014
A two-stage deep learning approach for can intrusion detection
L Zhang, L Shi, N Kaja, D Ma
Proc. Ground Vehicle Syst. Eng. Technol. Symp.(GVSETS), 1-11, 2018
Demographic information inference through meta-data analysis of Wi-Fi traffic
H Li, H Zhu, D Ma
IEEE Transactions on Mobile Computing 17 (5), 1033-1047, 2017
The system can't perform the operation now. Try again later.
Articles 1–20