default search action
Cunqing Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma:
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. Cybersecur. 7(1): 2 (2024) - 2023
- [c27]Yifei Zhang, Neng Gao, Cunqing Ma:
Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling. AAAI 2023: 6612-6620 - [c26]Huiqing Wan, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang:
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT. ICCCN 2023: 1-10 - [c25]Huiqing Wan, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye:
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs. ISCC 2023: 1340-1343 - [c24]Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. TrustCom 2023: 730-739 - [c23]Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. TrustCom 2023: 804-813 - 2022
- [c22]Langyue He, Cunqing Ma, Chenyang Tu, Yifei Zhang:
Gait2Vec: Continuous Authentication of Smartphone Users Based on Gait Behavior. CSCWD 2022: 280-285 - [c21]Yingshuai Kou, Neng Gao, Yifei Zhang, Chenyang Tu, Cunqing Ma:
BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation. ICTAI 2022: 840-847 - [i2]Yifei Zhang, Neng Gao, Cunqing Ma:
Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling. CoRR abs/2212.03396 (2022) - 2021
- [c20]Zehua Zeng, Chenyang Tu, Neng Gao, Cong Xue, Cunqing Ma, Yiwei Shan:
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model. IJCNN 2021: 1-8 - [c19]Chuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang, Zhuoxiang Shen:
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption. SciSec 2021: 95-109 - 2020
- [j1]Chenyang Tu, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. IEEE Trans. Inf. Forensics Secur. 15: 3079-3092 (2020) - [c18]Liang Zheng, Changting Li, Zongbin Liu, Cunqing Ma:
Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method. ACM Great Lakes Symposium on VLSI 2020: 59-64 - [c17]Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. ISCC 2020: 1-6 - [c16]Ping Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. ISCC 2020: 1-7 - [c15]Churan Tang, Pengkun Liu, Cunqing Ma, Zongbin Liu, Jingquan Ge:
Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC. VTS 2020: 1-6
2010 – 2019
- 2019
- [c14]Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang:
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. ACISP 2019: 475-493 - [c13]Xueyi Yang, Na Lv, Tianyu Chen, Cunqing Ma, Limin Liu:
A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System. Inscrypt 2019: 291-308 - [c12]Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng:
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification. CSCS 2019: 296-303 - [c11]Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu:
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. ICICS 2019: 251-268 - [c10]Pengcheng Zhang, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Donglei Han:
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation. ISCC 2019: 1-6 - 2018
- [c9]Liang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma:
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices. SecureComm (2) 2018: 271-290 - 2017
- [c8]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. ICICS 2017: 105-117 - [c7]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A PUF and Software Collaborative Key Protection Scheme. ICICS 2017: 291-303 - 2016
- [c6]Zongbin Liu, Qinglong Zhang, Cunqing Ma, Changting Li, Jiwu Jing:
HPAZ: A high-throughput pipeline architecture of ZUC in hardware. DATE 2016: 269-272 - [c5]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. SecureComm 2016: 675-693 - 2015
- [c4]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of RO PUFs. ISC 2015: 421-436 - [c3]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). IWSEC 2015: 347-356 - [i1]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. IACR Cryptol. ePrint Arch. 2015: 545 (2015) - 2012
- [c2]Cunqing Ma, Jingqiang Lin, Yuewu Wang:
Efficient Missing Tag Detection in a Large RFID System. TrustCom 2012: 185-192 - [c1]Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:
Offline RFID Grouping Proofs with Trusted Timestamps. TrustCom 2012: 674-681
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint