default search action
Chunguang Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j31]Xu Chen, Chunguang Ma, Chaofan Zhao, Yong Luo:
UAV Classification Based on Deep Learning Fusion of Multidimensional UAV Micro-Doppler Image Features. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - 2021
- [j30]Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge, Willy Susilo:
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci. China Inf. Sci. 64(6) (2021) - [j29]Zengpeng Li, Chunguang Ma, Ding Wang:
Leakage Resilient Leveled $\mathsf {FHE}$FHE on Multiple Bits Message. IEEE Trans. Big Data 7(5): 845-858 (2021) - 2020
- [j28]Lei Song, Chunguang Ma, Guoyin Zhang, Yun Zhang:
Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting. IEEE Access 8: 143233-143240 (2020) - [j27]Juyan Li, Chunguang Ma, Zhen Gu:
Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting. Int. J. Found. Comput. Sci. 31(5): 551-567 (2020) - [j26]Weiping Ouyang, Chunguang Ma, Guoyin Zhang, Keming Diao:
Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection. Mob. Inf. Syst. 2020: 8862920:1-8862920:10 (2020) - [j25]Zengpeng Li, Chunguang Ma, Ding Wang:
Achieving Multi-Hop PRE via Branching Program. IEEE Trans. Cloud Comput. 8(1): 45-58 (2020) - [j24]Lingling Wang, Xiaodong Lin, Eugene V. Zima, Chunguang Ma:
Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain. IEEE Trans. Veh. Technol. 69(3): 2411-2423 (2020) - [j23]Chunguang Ma, Hongjun Bei, Chuner Wang, Guihua Chen:
Accelerated Depreciation Tax Credit and Corporate Financialization Based on the PSM-DID Model. Wirel. Commun. Mob. Comput. 2020: 6622900:1-6622900:10 (2020) - 2019
- [j22]Juyan Li, Chunguang Ma, Lei Zhang, Qi Yuan:
Unidirectional FHPRE Scheme from Lattice for Cloud Computing. Int. J. Netw. Secur. 21(4): 592-600 (2019) - [j21]Jiyu Guo, Jisheng Tong, Qing Zhao, Jiao Jiao, Jianjian Huo, Chunguang Ma:
An Ultrawide Band Antipodal Vivaldi Antenna for Airborne GPR Application. IEEE Geosci. Remote. Sens. Lett. 16(10): 1560-1564 (2019) - [j20]Juyan Li, Chunguang Ma, Kejia Zhang:
A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing. Symmetry 11(10): 1262 (2019) - [j19]Jianjian Huo, Qing Zhao, Binzhong Zhou, Lanbo Liu, Chunguang Ma, Jiyu Guo, Longhao Xie:
Energy Flow Domain Reverse-Time Migration for Borehole Radar. IEEE Trans. Geosci. Remote. Sens. 57(9): 7221-7231 (2019) - 2018
- [j18]Zengpeng Li, Chunguang Ma, Hong-Sheng Zhou:
Multi-key FHE for multi-bit messages. Sci. China Inf. Sci. 61(2): 029101:1-029101:3 (2018) - [j17]Ke-Jia Zhang, Leong-Chuan Kwek, Chun-Guang Ma, Long Zhang, Hong-Wei Sun:
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons. Quantum Inf. Process. 17(2): 38 (2018) - [j16]Qi Yuan, Chunguang Ma, Haitao Yu, Xuefen Bian:
A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks. Sensors 18(5): 1539 (2018) - 2017
- [j15]Zengpeng Li, Chunguang Ma, Ding Wang:
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access 5: 16214-16228 (2017) - [j14]Chunguang Ma, Juyan Li, Weiping Ouyang:
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment. Int. J. Found. Comput. Sci. 28(6): 645-660 (2017) - [j13]Jiansheng Yao, Chunguang Ma, Peng Wu, Gang Du, Qi Yuan:
An Opportunistic Network Coding Routing for Opportunistic Networks. Int. J. Parallel Program. 45(1): 157-171 (2017) - [j12]Zengpeng Li, Chunguang Ma, Ding Wang, Gang Du:
Toward single-server private information retrieval protocol via learning with errors. J. Inf. Secur. Appl. 34: 280-284 (2017) - [j11]Chunguang Ma, Lei Zhang, Songtao Yang, Xiaodong Zheng:
Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services. J. Circuits Syst. Comput. 26(7): 1750119:1-1750119:25 (2017) - [j10]Chunguang Ma, Juyan Li, Gang Du:
A Flexible Fully Homomorphic Encryption. Wirel. Pers. Commun. 95(2): 761-772 (2017) - [j9]Lei Zhang, Chunguang Ma, Songtao Yang, Xiaodong Zheng:
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme. Wirel. Pers. Commun. 97(4): 6167-6187 (2017) - 2016
- [j8]Yun Lin, Can Wang, Chunguang Ma, Zheng Dou, Xuefei Ma:
A new combination method for multisensor conflict information. J. Supercomput. 72(7): 2874-2890 (2016) - 2015
- [j7]Chunguang Ma, Chang-li Zhou, Songtao Yang:
A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS. Int. J. Distributed Sens. Networks 11: 326953:1-326953:17 (2015) - 2014
- [j6]Chunguang Ma, Ding Wang, Sendong Zhao:
Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27(10): 2215-2227 (2014) - 2013
- [j5]Ding Wang, Chunguang Ma:
Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Inf. Fusion 14(4): 498-503 (2013) - [j4]Ding Wang, Chunguang Ma, Qi-Ming Zhang, Sendong Zhao:
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach. J. Networks 8(1): 148-155 (2013) - 2012
- [j3]Chunguang Ma, Jiuru Wang, Peng Wu, Hua Zhang:
Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks. J. Comput. 7(8): 1847-1852 (2012) - 2010
- [j2]Chunguang Ma, Guining Geng, Huiqiang Wang:
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks. J. Networks 5(4): 500-507 (2010) - 2008
- [j1]Lingling Wang, Guoyin Zhang, Chunguang Ma:
ID-based deniable ring authentication with constant-size signature. Frontiers Comput. Sci. China 2(1): 106-112 (2008)
Conference and Workshop Papers
- 2020
- [c28]Lingling Wang, Xiaodong Lin, Lijun Qu, Chunguang Ma:
Ring Selection for Ring Signature-Based Privacy Protection in VANETs. ICC 2020: 1-6 - 2019
- [c27]Lei Song, Chunguang Ma, Peng Wu, Yun Zhang:
PPD-DL: Privacy-Preserving Decentralized Deep Learning. ICAIS (1) 2019: 273-282 - [c26]Juyan Li, Chunguang Ma, Kejia Zhang:
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing. SocialSec 2019: 32-46 - 2018
- [c25]Jingmei Li, Yanxia Wu, Guoyin Zhang, Chaoguang Men, Chunguang Ma, Xiang Li, Changting Shi:
Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline. eLEOT 2018: 47-52 - 2017
- [c24]Gang Du, Chunguang Ma, Zengpeng Li, Ding Wang:
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme. ICCCS (2) 2017: 256-267 - [c23]Lei Zhang, Chunguang Ma, Songtao Yang, Zengpeng Li:
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection. MSWiM 2017: 215-218 - [c22]Zengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao, Lu Zhou:
Toward Proxy Re-encryption From Learning with Errors in the Exponent. TrustCom/BigDataSE/ICESS 2017: 683-690 - 2016
- [c21]Zengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du:
Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based. Inscrypt 2016: 221-242 - [c20]Haitao Zhu, Lei Zhang, Weimiao Feng, Chunguang Ma:
A Users Collaborative Scheme for Location and Query Privacy. ICPADS 2016: 383-390 - [c19]Zengpeng Li, Chunguang Ma, Gang Du, Weiping Ouyang:
Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching. ICPADS 2016: 1169-1174 - [c18]Chunguang Ma, Juyan Li, Weiping Ouyang:
A Homomorphic Proxy Re-encryption from Lattices. ProvSec 2016: 353-372 - [c17]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. ProvSec 2016: 373-383 - 2015
- [c16]Qi Yuan, Chunguang Ma, Junyu Lin:
Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing. ICYCSEE 2015: 344-352 - [c15]Chang-li Zhou, Chunguang Ma, Songtao Yang:
An Improved Fine-Grained Encryption Method for Unstructured Big Data. ICYCSEE 2015: 361-369 - 2014
- [c14]Chang-li Zhou, Chunguang Ma, Songtao Yang, Peng Wu, Linlin Liu:
A Location Privacy Preserving Method Based on Sensitive Diversity for LBS. NPC 2014: 409-422 - 2012
- [c13]Chunguang Ma, Ding Wang, Ping Zhao, Yu-Heng Wang:
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy. APWeb Workshops 2012: 199-211 - [c12]Ding Wang, Chunguang Ma, Peng Wu:
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. DBSec 2012: 114-121 - [c11]Chunguang Ma, Ding Wang, Qi-Ming Zhang:
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. ICDCIT 2012: 141-152 - [c10]Ding Wang, Chunguang Ma, Lan Shi, Yu-Heng Wang:
On the Security of an Improved Password Authentication Scheme Based on ECC. ICICA (LNCS) 2012: 181-188 - [c9]Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma:
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack. ICICS 2012: 365-372 - [c8]Ding Wang, Chunguang Ma, Sendong Zhao, Chang-li Zhou:
Breaking a Robust Remote User Authentication Scheme Using Smart Cards. NPC 2012: 110-118 - [c7]Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui:
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. NSS 2012: 462-475 - [c6]Ding Wang, Ying Mei, Chunguang Ma, Zhen-shan Cui:
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing. WISM 2012: 246-253 - 2009
- [c5]Hongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma:
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA. DASC 2009: 84-89 - [c4]Chunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang:
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network. DASC 2009: 400-404 - 2007
- [c3]Chunguang Ma, Peng Wu, Lingling Wang, Guoyin Zhang:
A Novel Method to Authenticate Transitively Closed Undirected Graph. IMSCCS 2007: 537-542 - [c2]Chunguang Ma, Zhiguo Shang, Huiqiang Wang, Guining Geng:
An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks. MSN 2007: 854-865 - 2006
- [c1]Chunguang Ma, Peng Wu, Guochang Gu:
A New Method for the Design of Stateless Transitive Signature Schemes. APWeb Workshops 2006: 897-904
Informal and Other Publications
- 2016
- [i5]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 1146 (2016) - 2012
- [i4]Ding Wang, Chunguang Ma:
On the Security of an Improved Password Authentication Scheme Based on ECC. IACR Cryptol. ePrint Arch. 2012: 190 (2012) - [i3]Ding Wang, Chunguang Ma:
Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem. IACR Cryptol. ePrint Arch. 2012: 439 (2012) - [i2]Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui:
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture. IACR Cryptol. ePrint Arch. 2012: 484 (2012) - [i1]Ding Wang, Chunguang Ma:
On the (in)security of some smart-card-based password authentication schemes for WSN. IACR Cryptol. ePrint Arch. 2012: 581 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint