A combination method for android malware detection based on control flow graphs and machine learning algorithms Z Ma, H Ge, Y Liu, M Zhao, J Ma IEEE access 7, 21235-21245, 2019 | 220 | 2019 |
An efficient decentralized key management mechanism for VANET with blockchain Z Ma, J Zhang, Y Guo, Y Liu, X Liu, W He IEEE Transactions on Vehicular Technology 69 (6), 5836-5849, 2020 | 159 | 2020 |
Boosting privately: Federated extreme gradient boosting for mobile crowdsensing Y Liu, Z Ma, X Liu, S Ma, S Nepal, RH Deng, K Ren 2020 IEEE 40th international conference on distributed computing systems …, 2020 | 132* | 2020 |
Lightweight privacy-preserving ensemble classification for face recognition Z Ma, Y Liu, X Liu, J Ma, K Ren IEEE Internet of Things Journal 6 (3), 5778-5790, 2019 | 95 | 2019 |
Privacy-preserving object detection for medical images with faster R-CNN Y Liu, Z Ma, X Liu, S Ma, K Ren IEEE Transactions on Information Forensics and Security 17, 69-84, 2019 | 93 | 2019 |
LiPSG: Lightweight privacy-preserving Q-learning-based energy management for the IoT-enabled smart grid Z Wang, Y Liu, Z Ma, X Liu, J Ma IEEE Internet of Things Journal 7 (5), 3935-3947, 2020 | 65 | 2020 |
Backdoor defense with machine unlearning Y Liu, M Fan, C Chen, X Liu, Z Ma, L Wang, J Ma IEEE INFOCOM 2022-IEEE conference on computer communications, 280-289, 2022 | 64 | 2022 |
Learn to forget: Machine unlearning via neuron masking Z Ma, Y Liu, X Liu, J Liu, J Ma, K Ren IEEE Transactions on Dependable and Secure Computing 20 (4), 3194-3207, 2022 | 63* | 2022 |
Privacy-preserving outsourced speech recognition for smart IoT devices Z Ma, Y Liu, X Liu, J Ma, F Li IEEE Internet of Things Journal 6 (5), 8406-8420, 2019 | 61 | 2019 |
Privacy-preserving federated k-means for proactive caching in next generation cellular networks Y Liu, Z Ma, Z Yan, Z Wang, X Liu, J Ma Information Sciences 521, 14-31, 2020 | 48 | 2020 |
Revfrf: Enabling cross-domain random forest training with revocable federated learning Y Liu, Z Ma, Y Yang, X Liu, J Ma, K Ren IEEE Transactions on Dependable and Secure Computing 19 (6), 3671-3685, 2021 | 45* | 2021 |
Droidetec: Android malware detection and malicious code localization through deep learning Z Ma, H Ge, Z Wang, Y Liu, X Liu arXiv preprint arXiv:2002.03594, 2020 | 43 | 2020 |
EmIr-Auth: eye movement and iris-based portable remote authentication for smart grid Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao IEEE Transactions on Industrial Informatics 16 (10), 6597-6606, 2019 | 41 | 2019 |
An empirical study of sms one-time password authentication in android apps S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ... Proceedings of the 35th annual computer security applications conference …, 2019 | 37 | 2019 |
Decentralized federated graph neural networks Y Pei, R Mao, Y Liu, C Chen, S Xu, F Qiang, BE Tech International workshop on federated and transfer learning for data sparsity …, 2021 | 31 | 2021 |
A machine learning-based scheme for the security analysis of authentication and key agreement protocols Z Ma, Y Liu, Z Wang, H Ge, M Zhao Neural Computing and Applications 32, 16819-16831, 2020 | 23 | 2020 |
Cloud-based federated boosting for mobile crowdsensing Z Wang, Y Yang, Y Liu, X Liu, BB Gupta, J Ma arXiv preprint arXiv:2005.05304, 2020 | 19 | 2020 |
Forward/backward and content private DSSE for spatial keyword queries X Wang, J Ma, X Liu, Y Miao, Y Liu, RH Deng IEEE Transactions on Dependable and Secure Computing 20 (4), 3358-3370, 2022 | 13 | 2022 |
Reveal your images: Gradient leakage attack against unbiased sampling-based secure aggregation Y Yang, Z Ma, B Xiao, Y Liu, T Li, J Zhang IEEE Transactions on Knowledge and Data Engineering 35 (12), 12958-12971, 2023 | 6 | 2023 |
Divtheft: An ensemble model stealing attack by divide-and-conquer Z Ma, X Liu, Y Liu, X Liu, Z Qin, K Ren IEEE transactions on dependable and secure computing 20 (6), 4810-4822, 2023 | 6 | 2023 |