学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 马昊玉的留言板
论文发表情况

[1] Ma H, Tian J, Gao D et al. On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping[J]. IEEE Trans. on Dependable and Secure Computing (TDSC), accepted. (CCF-RANK-A,SCI一区)

[2] Ma H, Li S, Gao D et al. Secure Repackage-Proofing Framework for Android Apps using Collatz Conjecture[J]. IEEE Trans. on Dependable and Secure Computing (TDSC), accepted. (CCF-RANK-A,SCI一区)

[3] Ma H, Tian J, Qiu K et al. Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems[J]. IEEE Trans. on Industrial Informatics (TII), 2021, 17(8): 5840-5850. (SCI一区)

[4] Ma H, Tian J. Gao D et al. Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel[C]//Proc. of the 23rd Information Security Conference (ISC 2020), Bali, Indonesia, Dec. 2020: 178-195. (CCF-RANK-C)

[5] Ma H, Jia C, Li S et al. Xmark: Dynamic Software Watermarking using Collatz Conjecture[J]. IEEE Trans. on Information Forensics and Security (TIFS), 2019, 14(11): 2859-2874. (CCF-RANK-A,SCI一区)

[6] Ma H, Li R, Yu X, et al. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation[J]. IEEE Trans. on Information Forensics and Security (TIFS), 2016, 11(10): 2322-2337. (CCF-RANK-A,SCI一区)

[7] Ma H, Lu K, Ma X, et al. Software Watermarking using Return-Oriented Programming[C]//Proc. of the 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'15), Singapore, Singapore, Apr. 2015: 369-380. (CCF-RANK-C)

[8] Ma H, Ma X, Liu W, et al. Control Flow Obfuscation using Neural Network to Fight Concolic Testing[C]//Proc. of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm'14), Beijing, China, Sep. 2014: 287-304. (CCF-RANK-C)

[9] Liu Z, Ma H, Li J, et al. Secure Storage and Fuzzy Query over Encrypted Databases[C]//Proc. of the 7th International Conference on Network and System Security (NSS'13), Madrid, Spain, Jun. 2013: 439-450.