default search action
Liran Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Tianhui Zhang, Yan Huo, Liran Ma, Ela Guo:
Distributed Physical Layer Authentication: Overview and Opportunities. IEEE Commun. Mag. 62(1): 134-140 (2024) - [j34]Jian Mao, Qixiao Lin, Shishi Zhu, Liran Ma, Jianwei Liu:
SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems. IEEE Internet Things J. 11(4): 5731-5744 (2024) - 2023
- [j33]Jian Mao, Xiaohe Xu, Qixiao Lin, Liran Ma, Jianwei Liu:
EScope: Effective Event Validation for IoT Systems Based on State Correlation. Big Data Min. Anal. 6(2): 218-233 (2023) - [j32]Tianhui Zhang, Yan Huo, Qinghe Gao, Liran Ma, Yue Wu, Rayna Li:
Cooperative Physical Layer Authentication With Reputation-Inspired Collaborator Selection. IEEE Internet Things J. 10(24): 22165-22181 (2023) - [j31]Jialing He, Zijian Zhang, Liran Ma, Zhouyu Zhang, Meng Li, Bakh Khoussainov, Jiamou Liu, Liehuang Zhu:
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms. IEEE Trans. Smart Grid 14(5): 3828-3840 (2023) - [c40]Yudi Zhou, Tao Jing, Yue Wu, Qinghe Gao, Yan Huo, Liran Ma:
Enhanced Collaborative Physical Layer Authentication Through An Impression-Weighted Decision Aggregation Scheme. GLOBECOM 2023: 6219-6224 - 2022
- [j30]Yuan Gao, Yi Li, Yunchuan Sun, Zhipeng Cai, Liran Ma, Matevz Pustisek, Su Hu:
IEEE Access Special Section: Privacy Preservation for Large-Scale User Data in Social Networks. IEEE Access 10: 4374-4379 (2022) - [j29]Yingkun Wen, Yan Huo, Liran Ma, Tao Jing, Qinghe Gao:
Quantitative models for friendly jammer trustworthiness evaluation in IoT networks. Ad Hoc Networks 137: 102994 (2022) - [j28]Hao Yin, Zijian Zhang, Jialing He, Liran Ma, Liehuang Zhu, Meng Li, Bakh Khoussainov:
Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain. IEEE Internet Things J. 9(10): 7866-7875 (2022) - [j27]Jialing He, Zijian Zhang, Jian Mao, Liran Ma, Bakh Khoussainov, Rui Jin, Liehuang Zhu:
Video Aficionado: We Know What You Are Watching. IEEE Trans. Mob. Comput. 21(8): 3041-3052 (2022) - 2021
- [c39]Curby Alexander, Liran Ma, Zhipeng Cai, Wei Cheng:
Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 552-557 - [i1]Qinghe Gao, Yan Huo, Tao Jing, Liran Ma, Jin Qian:
Cross-layer based intermittent jamming schemes for securing energy-constraint networks. CoRR abs/2103.13217 (2021) - 2020
- [j26]Qin Hu, Shengling Wang, Xiuzhen Cheng, Liran Ma, Rongfang Bie:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. IEEE Trans. Inf. Forensics Secur. 15: 1778-1789 (2020) - [j25]Shengling Wang, Weiman Sun, Liran Ma, Weifeng Lv, Xiuzhen Cheng:
Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services. IEEE Trans. Parallel Distributed Syst. 31(1): 159-170 (2020) - [c38]Ze-Li Dou, Liran Ma, Khiem Nguyen, Kien X. Nguyen:
Paradox of AlphaZero: Strategic vs. Optimal Plays. IPCCC 2020: 1-9
2010 – 2019
- 2019
- [j24]Yue Wu, Fan Li, Liran Ma, Yadong Xie, Ting Li, Yu Wang:
A Context-Aware Multiarmed Bandit Incentive Mechanism for Mobile Crowd Sensing Systems. IEEE Internet Things J. 6(5): 7648-7658 (2019) - [j23]Liran Ma, Yan Huo, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. Secur. Commun. Networks 2019: 7045862:1-7045862:2 (2019) - [j22]Qinghe Gao, Yan Huo, Tao Jing, Liran Ma, Yingkun Wen, Xiaoshuang Xing:
An Intermittent Cooperative Jamming Strategy for Securing Energy-Constrained Networks. IEEE Trans. Commun. 67(11): 7715-7726 (2019) - [j21]Yingkun Wen, Yan Huo, Liran Ma, Tao Jing, Qinghe Gao:
A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks. IEEE Trans. Veh. Technol. 68(4): 3500-3512 (2019) - [j20]Yan Huo, Xin Fan, Liran Ma, Xiuzhen Cheng, Zhi Tian, Dechang Chen:
Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming. IEEE Trans. Wirel. Commun. 18(6): 3265-3280 (2019) - [c37]Linyan Xu, Zhangjie Fu, Liran Ma:
An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring. WASA 2019: 395-406 - 2018
- [j19]Yanfei Lu, Zihan Zhao, Bowu Zhang, Liran Ma, Yan Huo, Guanlin Jing:
A Context-Aware Budget-Constrained Targeted Advertising System for Vehicular Networks. IEEE Access 6: 8704-8713 (2018) - [j18]Shengling Wang, Chenyu Wang, Shenling Wang, Liran Ma:
Big data analysis for evaluating bioinvasion risk. BMC Bioinform. 19-S(9): 151-159 (2018) - [j17]Yan Huo, Yuqi Tian, Liran Ma, Xiuzhen Cheng, Tao Jing:
Jamming Strategies for Physical Layer Security. IEEE Wirel. Commun. 25(1): 148-153 (2018) - [j16]Chunqiang Hu, Hang Liu, Liran Ma, Yan Huo, Arwa Alrawais, Xiuhua Li, Hong Li, Qingyu Xiong:
A Secure and Scalable Data Communication Scheme in Smart Grids. Wirel. Commun. Mob. Comput. 2018 (2018) - [c36]Blake Lucas, Liran Ma:
Spark: A Smart Parking Lot Monitoring System. WASA 2018: 321-332 - 2017
- [j15]Qinghe Gao, Yan Huo, Liran Ma, Xiaoshuang Xing, Xiuzhen Cheng, Tao Jing, Hang Liu:
Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks. IET Commun. 11(8): 1264-1274 (2017) - [j14]Yan Huo, Lingling Liu, Liran Ma, Wei Zhou, Xiuzhen Cheng, Tao Jing, Xiaobing Jiang:
A coalition formation game based relay selection scheme for cooperative cognitive radio networks. Wirel. Networks 23(8): 2533-2544 (2017) - [c35]Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng:
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy. ICDCS 2017: 1137-1146 - [c34]Fan Zhang, Tao Jing, Yan Huo, Liran Ma:
Optimal Spectrum Sensing-Access Policy in Energy Harvesting Cognitive Radio Sensor Networks. IIKI 2017: 194-200 - [c33]Chun-Chi Liu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu:
Mechanism design games for thwarting malicious behavior in crowdsourcing applications. INFOCOM 2017: 1-9 - [c32]Shengling Wang, Jian-Hui Huang, Luyun Li, Liran Ma, Xiuzhen Cheng:
Quantum Game Analysis of Privacy-Leakage for Application Ecosystems. MobiHoc 2017: 13:1-13:10 - [c31]Wei Li, Tianyi Song, Yingshu Li, Liran Ma, Jiguo Yu, Xiuzhen Cheng:
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications. PAC 2017: 176-177 - [c30]Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng:
An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. WASA 2017: 469-482 - [e1]Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan:
Wireless Algorithms, Systems, and Applications - 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10251, Springer 2017, ISBN 978-3-319-60032-1 [contents] - 2016
- [j13]Yan Huo, Yuejia Liu, Liran Ma, Xiuzhen Cheng, Tao Jing:
An enhanced low overhead and stable clustering scheme for crossroads in VANETs. EURASIP J. Wirel. Commun. Netw. 2016: 74 (2016) - [j12]Jiguo Yu, Ying Chen, Liran Ma, Baogui Huang, Xiuzhen Cheng:
On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks. Sensors 16(1): 104 (2016) - [j11]Zhen Li, Tao Jing, Liran Ma, Yan Huo, Jin Qian:
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors 16(3): 339 (2016) - [j10]Tao Jing, Xing Wei, Wei Cheng, Mingyang Guan, Liran Ma, Yan Huo, Xiuzhen Cheng:
An Efficient Scheme for Tag Information Update in RFID Systems on Roads. IEEE Trans. Veh. Technol. 65(4): 2435-2444 (2016) - [c29]Yan Huo, Xiangqian Li, Jin Qian, Liran Ma, Xu Zheng:
A Fuzzy Adaptive Data Fusion Strategy for Intelligent Vehicle Systems. BDCloud-SocialCom-SustainCom 2016: 216-222 - [c28]Qinghe Gao, Yan Huo, Liran Ma, Xiaoshuang Xing, Xiuzhen Cheng, Tao Jing, Hang Liu:
Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks. GLOBECOM 2016: 1-6 - [c27]Quang Nguyen, Cuiling Gong, Liran Ma:
An IoT-based Real Time Low Cost Low Power Monitoring and Notification System for Aged Care. IIKI 2016: 261-268 - [c26]Xiang Tian, Jiguo Yu, Liran Ma, Guangshun Li, Xiuzhen Cheng:
Distributed deterministic broadcasting algorithms under the SINR model. INFOCOM 2016: 1-9 - [c25]Qin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie:
Solving the crowdsourcing dilemma using the zero-determinant strategy: poster. MobiHoc 2016: 373-374 - [c24]Blake Lucas, Liran Ma, Dechang Chen:
iBeaconing: A Low-Cost, Wireless Student Protection System. WASA 2016: 197-206 - [c23]Jin Qian, Tao Jing, Yan Huo, Hui Li, Liran Ma, Yanfei Lu:
An Adaptive Beaconing Scheme Based on Traffic Environment Parameters Prediction in VANETs. WASA 2016: 524-535 - 2015
- [j9]Tao Jing, Fan Zhang, Liran Ma, Wei Li, Xuhao Chen, Yan Huo:
TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks. Ad Hoc Sens. Wirel. Networks 28(3-4): 347-362 (2015) - [j8]Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen:
A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks. IEEE Trans. Computers 64(1): 19-31 (2015) - [c22]Bowu Zhang, Jinho Hwang, Liran Ma, Timothy Wood:
Towards Security-Aware Virtual Server Migration Optimization to the Cloud. ICAC 2015: 71-80 - [c21]Kathryn Grebel, Duy Dang, Liran Ma, Donnell Payne, Brent Cooper:
iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired. WASA 2015: 155-164 - [c20]Yan Huo, Yuejia Liu, Xiaoshuang Xing, Xiuzhen Cheng, Liran Ma, Tao Jing:
A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs. WASA 2015: 232-242 - 2014
- [c19]Rashid Mehmood, Maqbool Uddin Shaikh, Liran Ma, Rongfang Bie:
Enhanced Web Warehouse Model: A Secure Approach. IIKI 2014: 88-91 - [c18]Nicholas Capurso, Eric Elsken, Donnell Payne, Liran Ma:
Poster: A robust vehicular accident detection system using inexpensive portable devices. MobiSys 2014: 367 - [c17]Nicholas Capurso, Liran Ma, Tianyi Song, Xiuzhen Cheng:
A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems. WASA 2014: 648-659 - 2013
- [c16]Tao Jing, Fan Zhang, Liran Ma, Wei Li, Xuhao Chen, Yan Huo:
Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks. WASA 2013: 512-523 - 2012
- [c15]Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen:
Maximizing throughput when achieving time fairness in multi-rate wireless LANs. INFOCOM 2012: 2911-2915 - [c14]Tao Jing, Yunqing Yang, Yuan Le, Liran Ma, Wei Zhou, Yan Huo:
A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement. WASA 2012: 346-357 - 2011
- [c13]Liran Ma:
A Novel Free-Rider Detection Scheme for IEEE 802.11 Wireless Networks. GLOBECOM 2011: 1-5 - [c12]Tao Jing, Hongbin Shi, Yan Huo, Liran Ma, Zhipeng Cai:
A Novel Channel Assignment Scheme for Multi-radio Multi-channel Wireless Mesh Networks. WASA 2011: 261-270 - [c11]Yuan Le, Liran Ma, Hongjun Yu, Xiuzhen Cheng, Yong Cui, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks. WASA 2011: 271-279
2000 – 2009
- 2009
- [j7]Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, Xicheng Lu, Zexin Lu:
3D Underwater Sensor Network Localization. IEEE Trans. Mob. Comput. 8(12): 1610-1621 (2009) - [j6]Yanxia Rong, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Hyeong-Ah Choi:
A novel rate adaptation scheme for 802.11 networks. IEEE Trans. Wirel. Commun. 8(2): 862-870 (2009) - 2008
- [j5]Liran Ma, Amin Y. Teymorian, Kai Xing, Ding-Zhu Du:
An one-way function based framework for pairwise key establishment in sensor networks. Int. J. Secur. Networks 3(4): 217-225 (2008) - [j4]Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing:
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. IEEE Trans. Mob. Comput. 7(7): 858-868 (2008) - [j3]Liran Ma, Qian Zhang, Xiuzhen Cheng:
A power controlled interference aware routing protocol for dense multi-hop wireless networks. Wirel. Networks 14(2): 247-257 (2008) - [c10]Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, Zexin Lu:
Underwater Localization in Sparse 3D Acoustic Sensor Networks. INFOCOM 2008: 236-240 - [c9]Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng:
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks. INFOCOM 2008: 1220-1228 - 2007
- [j2]Liran Ma, Xiuzhen Cheng, Fang Liu, Fengguang An, Jose Rivera:
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(8): 1174-1184 (2007) - [c8]Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng:
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks. GLOBECOM 2007: 327-331 - [c7]Kai Xing, Xiuzhen Cheng, Liran Ma, Qilian Liang:
Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks. MobiCom 2007: 15-26 - [c6]Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng, Min Song:
RAP: protecting commodity wi-fi networks from rogue access points. QSHINE 2007: 21 - 2006
- [c5]Liran Ma, Weidong Jiang, Kai Xing, E. K. Park:
The Effective Radius Model for Multi-hop Wireless Networks. WASA 2006: 643-651 - 2005
- [j1]Shaojian Fu, Mohammed Atiquzzaman, Liran Ma, Yong-Jin Lee:
Signaling cost and performance of SIGMA: A seamless handover scheme for data networks. Wirel. Commun. Mob. Comput. 5: 825-845 (2005) - [c4]Liran Ma, Qian Zhang, Yongqiang Xiong, Wenwu Zhu:
Interference aware metric for dense multi-hop wireless networks. ICC 2005: 1261-1265 - [c3]Shaojian Fu, Liran Ma, Mohammed Atiquzzaman, Yong-Jin Lee:
Architecture and performance of SIGMA: a seamless mobility architecture for data networks. ICC 2005: 3249-3253 - [c2]Fengguang An, Xiuzhen Cheng, Qing Xia, Fang Liu, Liran Ma:
SeGrid: A Secure Grid Infrastructure for Sensor Networks. MSN 2005: 422-432 - [c1]Liran Ma, Qian Zhang, Fengguang An, Xiuzhen Cheng:
DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks. MSN 2005: 508-517
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint