default search action
Chris Y. T. Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
ML Classifier Fusion for Three Data Streams with Quality Inversely Proportional to Time Resolution. FUSION 2024: 1-8 - 2023
- [j10]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions. IEEE Trans. Reliab. 72(2): 483-497 (2023) - [c34]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
Game-Theoretic Strategies for Quantum-Conventional Network Infrastructures. FUSION 2023: 1-8 - 2022
- [c33]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
Classification and Fusion of Two Disparate Data Streams and Nuclear Dissolutions Application. FUSION 2022: 1-8 - 2021
- [c32]Fei He, Nageswara S. V. Rao, Chris Y. T. Ma:
Game-Theoretic Approach for Grace-Period Policy in Supercomputers. FUSION 2021: 1-7 - 2020
- [c31]Hai Liu, Wai Kit Wong, Shujin Ye, Chris Yu-Tak Ma:
Joint Energy Optimization of Cooling Systems and Virtual Machine Consolidation in Data Centers. ICCCN 2020: 1-8
2010 – 2019
- 2019
- [c30]Fei He, Santhosh Chandrasekar, Nageswara S. V. Rao, Chris Y. T. Ma:
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures. FUSION 2019: 1-8 - [c29]Nageswara S. V. Rao, Neena Imam, Chris Y. T. Ma, Fei He:
Defense strategies and expected capacity of high performance computing infrastructures. ICDCN 2019: 143-147 - 2018
- [j9]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He, David K. Y. Yau, Jun Zhuang:
Cyber-Physical Correlation Effects in Defense Games for Large Discrete Infrastructures. Games 9(3): 52 (2018) - [j8]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Defense Strategies for Asymmetric Networked Systems with Discrete Components. Sensors 18(5): 1421 (2018) - [c28]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
On Defense Strategies for Recursive System of Systems Using Aggregated Correlations. FUSION 2018: 507-514 - [c27]Fei He, Chiamaka Agwuegbo, Nageswara S. V. Rao, Chris Y. T. Ma:
A Sequential Game of Defense and Attack on an Interdependent System of Systems. FUSION 2018: 2535-2541 - [c26]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He:
Defense Strategies for Multi-Site Cloud Computing Server Infrastructures. ICDCN 2018: 29:1-29:9 - 2017
- [c25]Fei He, Nageswara S. V. Rao, Chris Y. T. Ma:
Game-theoretic analysis of system of systems with inherent robustness parameters. FUSION 2017: 1-9 - [c24]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Game-theoretic strategies for asymmetric networked systems. FUSION 2017: 1-8 - [c23]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Defense strategies for asymmetric networked systems under composite utilities. MFI 2017: 384-389 - [c22]Nageswara S. V. Rao, Neena Imam, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
On defense strategies for system of systems using aggregated correlations. SysCon 2017: 1-6 - 2016
- [j7]Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao:
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach. IEEE/ACM Trans. Netw. 24(3): 1661-1674 (2016) - [c21]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
Defense strategies for infrastructures with multiple systems of components. FUSION 2016: 270-277 - [c20]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
Game-theoretic strategies for systems of components using product-form utilities. MFI 2016: 341-346 - 2015
- [c19]Chris Y. T. Ma, David K. Y. Yau:
On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data. AsiaCCS 2015: 427-438 - [c18]Nageswara S. V. Rao, Chris Y. T. Ma, Urvashi Shah, Jun Zhuang, Fei He, David K. Y. Yau:
On resilience of cyber-physical infrastructures using discrete product-form games. FUSION 2015: 1451-1458 - 2014
- [c17]Nageswara S. V. Rao, Chris Y. T. Ma, Fei He, Jun Zhuang, David K. Y. Yau:
Cyber-physical correlations for infrastructure resilience: A game-theoretic approach. FUSION 2014: 1-8 - [c16]Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao:
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. INFOCOM 2014: 2804-2812 - 2013
- [j6]Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao:
Privacy Vulnerability of Published Anonymous Mobility Traces. IEEE/ACM Trans. Netw. 21(3): 720-733 (2013) - [j5]Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao:
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection. IEEE Trans. Smart Grid 4(1): 47-55 (2013) - [c15]Fei He, Jun Zhuang, Nageswara S. V. Rao, Chris Y. T. Ma, David K. Y. Yau:
Game-theoretic resilience analysis of Cyber-Physical Systems. CPSNA 2013: 90-95 - 2012
- [j4]Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen:
Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage. IEEE Trans. Veh. Technol. 61(4): 1810-1822 (2012) - [c14]Nageswara S. V. Rao, Chris Y. T. Ma, David K. Y. Yau:
On performance of individual, collective and network detection of propagative sources. FUSION 2012: 247-254 - [c13]Nageswara S. V. Rao, Stephen W. Poole, Fei He, Jun Zhuang, Chris Y. T. Ma, David K. Y. Yau:
Cloud computing infrastructure robustness: A game theory approach. ICNC 2012: 34-38 - 2011
- [c12]Nageswara S. V. Rao, Chris Y. T. Ma, David K. Y. Yau:
On robustness of a class of Cyber-Physical Network Infrastructures. IWCMC 2011: 808-813 - 2010
- [j3]Jren-Chit Chin, Yu Dong, Wing-Kai Hon, Chris Yu-Tak Ma, David K. Y. Yau:
Detection of intelligent mobile target in a mobile sensor network. IEEE/ACM Trans. Netw. 18(1): 41-52 (2010) - [j2]David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao, Mallikarjun Shankar:
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage. ACM Trans. Sens. Networks 7(2): 18:1-18:49 (2010) - [c11]Nageswara S. V. Rao, Jren-Chit Chin, David K. Y. Yau, Chris Y. T. Ma:
Localization leads to improved distributed detection under non-smooth distributions. FUSION 2010: 1-8 - [c10]Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen:
Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage. ICDCS 2010: 96-105 - [c9]Nageswara S. V. Rao, Jren-Chit Chin, David K. Y. Yau, Chris Y. T. Ma, Rabinder N. Madan:
Cyber-physical trade-offs in distributed detection networks. MFI 2010: 88-95 - [c8]Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao:
Privacy vulnerability of published anonymous mobility traces. MobiCom 2010: 185-196
2000 – 2009
- 2009
- [j1]Chris Y. T. Ma, David K. Y. Yau, Jren-Chit Chin, Nageswara S. V. Rao, Mallikarjun Shankar:
Matching and Fairness in Threat-Based Mobile Sensor Coverage. IEEE Trans. Mob. Comput. 8(12): 1649-1662 (2009) - [c7]Nageswara S. V. Rao, Charles W. Glover, Mallikarjun Shankar, Jren-Chit Chin, David K. Y. Yau, Chris Y. T. Ma, Yong Yang, Sartaj Sahni:
Improved SPRT detection using localization with application to radiation sources. FUSION 2009: 633-640 - [c6]Chris Yu-Tak Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen:
Performance Analysis of Stochastic Network Coverage with Limited Mobility. MASS 2009: 496-505 - [p1]Jennifer C. Hou, David K. Y. Yau, Chris Y. T. Ma, Yong Yang, Honghai Zhang, I-Hong Hou, Nageswara S. V. Rao, Mallikarjun Shankar:
Coverage in Wireless Sensor Networks. Guide to Wireless Sensor Networks 2009: 47-79 - 2008
- [c5]David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao, Mallikarjun Shankar:
Quality of monitoring of stochastic events by periodic & proportional-share scheduling of sensor coverage. CoNEXT 2008: 26 - [c4]Nageswara S. V. Rao, Mallikarjun Shankar, Jren-Chit Chin, David K. Y. Yau, Chris Y. T. Ma, Yong Yang, Jennifer C. Hou, Xiaochun Xu, Sartaj Sahni:
Localization under random measurements with application to radiation sources. FUSION 2008: 1-8 - [c3]Jren-Chit Chin, Jeffrey M. Rautenberg, Chris Yu-Tak Ma, Santiago Pujol, David K. Y. Yau:
A low-cost, low-data-rate rapid structural assessment network: Design, implementation, and experimentation. MASS 2008: 173-182 - [c2]Jren-Chit Chin, David K. Y. Yau, Nageswara S. V. Rao, Yong Yang, Chris Y. T. Ma, Mallikarjun Shankar:
Accurate localization of low-level radioactive source under noise and measurement errors. SenSys 2008: 183-196 - 2007
- [c1]Jren-Chit Chin, I-Hong Hou, Jennifer C. Hou, Chris Y. T. Ma, Nageswara S. V. Rao, Mohit Saxena, Mallikarjun Shankar, Yong Yang, David K. Y. Yau:
A sensor-cyber network testbed for plume detection, identification, and tracking. IPSN 2007: 541-542
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint