A combination method for android malware detection based on control flow graphs and machine learning algorithms Z Ma, H Ge, Y Liu, M Zhao, J Ma IEEE access 7, 21235-21245, 2019 | 212 | 2019 |
An efficient decentralized key management mechanism for VANET with blockchain Z Ma, J Zhang, Y Guo, Y Liu, X Liu, W He IEEE Transactions on Vehicular Technology 69 (6), 5836-5849, 2020 | 151 | 2020 |
Boosting privately: Federated extreme gradient boosting for mobile crowdsensing Y Liu, Z Ma, X Liu, S Ma, S Nepal, RH Deng, K Ren 2020 IEEE 40th international conference on distributed computing systems …, 2020 | 129* | 2020 |
Lightweight privacy-preserving ensemble classification for face recognition Z Ma, Y Liu, X Liu, J Ma, K Ren IEEE Internet of Things Journal 6 (3), 5778-5790, 2019 | 92 | 2019 |
Privacy-preserving object detection for medical images with faster R-CNN Y Liu, Z Ma, X Liu, S Ma, K Ren IEEE Transactions on Information Forensics and Security 17, 69-84, 2019 | 91 | 2019 |
LiPSG: Lightweight privacy-preserving Q-learning-based energy management for the IoT-enabled smart grid Z Wang, Y Liu, Z Ma, X Liu, J Ma IEEE Internet of Things Journal 7 (5), 3935-3947, 2020 | 63 | 2020 |
Learn to forget: Machine unlearning via neuron masking Z Ma, Y Liu, X Liu, J Liu, J Ma, K Ren IEEE Transactions on Dependable and Secure Computing, 2022 | 57* | 2022 |
Privacy-preserving outsourced speech recognition for smart IoT devices Z Ma, Y Liu, X Liu, J Ma, F Li IEEE Internet of Things Journal 6 (5), 8406-8420, 2019 | 56 | 2019 |
Backdoor defense with machine unlearning Y Liu, M Fan, C Chen, X Liu, Z Ma, L Wang, J Ma IEEE INFOCOM 2022-IEEE conference on computer communications, 280-289, 2022 | 49 | 2022 |
Privacy-preserving federated k-means for proactive caching in next generation cellular networks Y Liu, Z Ma, Z Yan, Z Wang, X Liu, J Ma Information Sciences 521, 14-31, 2020 | 45 | 2020 |
Droidetec: Android malware detection and malicious code localization through deep learning Z Ma, H Ge, Z Wang, Y Liu, X Liu arXiv preprint arXiv:2002.03594, 2020 | 44 | 2020 |
Revfrf: Enabling cross-domain random forest training with revocable federated learning Y Liu, Z Ma, Y Yang, X Liu, J Ma, K Ren IEEE Transactions on Dependable and Secure Computing 19 (6), 3671-3685, 2021 | 43* | 2021 |
EmIr-Auth: Eye movement and iris-based portable remote authentication for smart grid Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao IEEE Transactions on Industrial Informatics 16 (10), 6597-6606, 2019 | 34 | 2019 |
An empirical study of sms one-time password authentication in android apps S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ... Proceedings of the 35th annual computer security applications conference …, 2019 | 33 | 2019 |
Decentralized federated graph neural networks Y Pei, R Mao, Y Liu, C Chen, S Xu, F Qiang, BE Tech International Workshop on Federated and Transfer Learning for Data Sparsity …, 2021 | 29 | 2021 |
A machine learning-based scheme for the security analysis of authentication and key agreement protocols Z Ma, Y Liu, Z Wang, H Ge, M Zhao Neural Computing and Applications 32, 16819-16831, 2020 | 23 | 2020 |
Cloud-based federated boosting for mobile crowdsensing Z Wang, Y Yang, Y Liu, X Liu, BB Gupta, J Ma arXiv preprint arXiv:2005.05304, 2020 | 19 | 2020 |
Forward/backward and content private dsse for spatial keyword queries X Wang, J Ma, X Liu, Y Miao, Y Liu, RH Deng IEEE Transactions on Dependable and Secure Computing, 2022 | 10 | 2022 |
Divtheft: An ensemble model stealing attack by divide-and-conquer Z Ma, X Liu, Y Liu, X Liu, Z Qin, K Ren IEEE transactions on dependable and secure computing, 2023 | 6 | 2023 |
PE-HEALTH: Enabling fully encrypted CNN for health monitor with optimized communication Y Liu, Y Yang, Z Ma, X Liu, Z Wang, S Ma 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020 | 6 | 2020 |