


default search action
Di Ma 0001
Person information
- affiliation: University of Michigan-Dearborn, Department of Computer and Information Science, Dearborn, MI, USA
- affiliation: University of Michigan, Ann Arbor, MI, USA
- affiliation (PhD 2009): University of California, Irvine, CA, USA
Other persons with the same name
- Di Ma — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[j37]Abir Bazzi
, Adnan Shaout
, Di Ma
:
A Novel Variability-Rich Scheme for Software Updates of Automotive Systems. IEEE Access 12: 79530-79548 (2024)
[j36]Hai Lu
, Yan Zhu
, Cecilia E. Chen
, Rongquan Feng, Lejun Zhang
, Di Ma
:
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing. IEEE Internet Things J. 11(2): 1893-1909 (2024)
[j35]Guanglai Guo
, Yan Zhu
, Cecilia E. Chen
, Lejun Zhang
, Rongquan Feng, Di Ma
:
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT. IEEE Internet Things J. 11(7): 11353-11367 (2024)
[j34]Hai Lu
, Yan Zhu
, Cecilia E. Chen
, Di Ma
:
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation. IEEE Trans. Inf. Forensics Secur. 19: 4301-4315 (2024)
[c49]Linxi Zhang, Xuke Yan, Di Ma
:
Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network. INFOCOM 2024: 2299-2307- 2023
[c48]Robert Kaster
, Di Ma
:
Digital Shadows for Remote Automotive SW Verification. CPS-IoT Week Workshops 2023: 25-30- 2022
[j33]Linxi Zhang
, Di Ma
:
A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks. IEEE Access 10: 10852-10866 (2022)
[j32]Linxi Zhang
, Xuke Yan
, Di Ma
:
A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion Detection. IEEE Access 10: 123505-123520 (2022)
[j31]Guanglai Guo, Yan Zhu
, E. Chen, Guizhen Zhu, Di Ma
, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. Peer-to-Peer Netw. Appl. 15(1): 304-323 (2022)- 2021
[j30]Yan Zhu
, Weijing Song, Di Wang
, Di Ma
, William Cheng-Chung Chu
:
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain. IEEE Trans. Reliab. 70(3): 1255-1270 (2021)- 2020
[j29]Guanglai Guo, Yan Zhu
, Ruyun Yu
, William Cheng-Chung Chu
, Di Ma
:
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks. IEEE Access 8: 157116-157129 (2020)
[j28]Huaxin Li
, Qingrong Chen
, Haojin Zhu
, Di Ma
, Hong Wen
, Xuemin Sherman Shen
:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 350-362 (2020)
[j27]Ahmad M. K. Nasser, Di Ma
:
SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems. Veh. Commun. 21 (2020)
2010 – 2019
- 2019
[j26]Nevrus Kaja
, Adnan Shaout
, Di Ma
:
An intelligent intrusion detection system. Appl. Intell. 49(9): 3235-3247 (2019)
[j25]Yan Zhu
, Ruyun Yu
, Di Ma
, William Cheng-Chung Chu
:
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Trans. Reliab. 68(4): 1330-1346 (2019)
[c47]Nevrus Kaja, Adnan Shaout
, Di Ma
:
Fuzzy Based Threat Assessment Model (FTAM). ACIT 2019: 144-149
[c46]Ahmad M. K. Nasser, Di Ma
:
Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks. AutoSec@CODASPY 2019: 15-18- 2018
[j24]Huaxin Li
, Haojin Zhu
, Di Ma
:
Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic. IEEE Trans. Mob. Comput. 17(5): 1033-1047 (2018)
[c45]Yan Zhu
, Ruyun Yu, Yao Qin, Di Ma
, William Cheng-Chung Chu:
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy. QRS 2018: 277-288- 2017
[c44]Huaxin Li, Qingrong Chen, Haojin Zhu
, Di Ma
:
Hybrid de-anonymization across real-world heterogeneous social networks. ACM TUR-C 2017: 33:1-33:7
[c43]Jiafa Liu, Di Ma
, André Weimerskirch, Haojin Zhu
:
A Functional Co-Design towards Safe and Secure Vehicle Platooning. CPSS@AsiaCCS 2017: 81-90
[c42]Ahmad M. K. Nasser, Di Ma
, Sam Lauzon:
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. NSS 2017: 73-86- 2016
[c41]Jun Liu, Jinhua Guo, Di Ma
:
Traffic Aware Virtual Machine Packing in Cloud Data Centers. BigDataSecurity/HPSC/IDS 2016: 256-261
[c40]Derrick Dominic, Sumeet Chhawri, Ryan M. Eustice, Di Ma
, André Weimerskirch:
Risk Assessment for Cooperative Automated Driving. CPS-SPC@CCS 2016: 47-58
[c39]Jiafa Liu, Junyi Liu, Huaxin Li, Haojin Zhu
, Na Ruan, Di Ma
:
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network. GLOBECOM 2016: 1-6
[c38]Huaxin Li, Zheyu Xu, Haojin Zhu
, Di Ma
, Shuai Li, Kai Xing:
Demographics inference through Wi-Fi network traffic analysis. INFOCOM 2016: 1-9- 2015
[j23]Babins Shrestha, Di Ma
, Yan Zhu
, Haoyu Li, Nitesh Saxena:
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 10(11): 2270-2283 (2015)
[c37]Yan Zhu
, Xin Wang, Di Ma
, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. AsiaCCS 2015: 191-202
[c36]Yan Zhu
, Liguang Yang, Di Ma
:
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services. IEEE MS 2015: 142-149
[i3]Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. IACR Cryptol. ePrint Arch. 2015: 342 (2015)- 2014
[j22]Shan-Biao Wang, Yan Zhu
, Di Ma
, Rong-Quan Feng:
Lattice-based key exchange on small integer solution problem. Sci. China Inf. Sci. 57(11): 1-12 (2014)
[j21]Bingsheng Zhang
, Zhan Qin
, Si Chen
, Muyuan Li, Kui Ren
, Cong Wang
, Di Ma
:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet Things J. 1(1): 33-45 (2014)
[j20]Yan Zhu
, Di Ma
, Changjun Hu, Gail-Joon Ahn
, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014)
[j19]Di Ma
, Nitesh Saxena:
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems. Secur. Commun. Networks 7(12): 2684-2695 (2014)
[j18]Kui Ren
, Qian Wang
, Di Ma
, Xiaohua Jia
:
Securing emerging short range wireless communications: the state of the art. IEEE Wirel. Commun. 21(6): 153-159 (2014)- 2013
[j17]Di Ma
, Nitesh Saxena, Tuo Xiang, Yan Zhu
:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Trans. Dependable Secur. Comput. 10(2): 57-69 (2013)
[j16]Tzipora Halevi, Haoyu Li, Di Ma
, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Trans. Emerg. Top. Comput. 1(2): 307-318 (2013)
[j15]Yan Zhu
, Gail-Joon Ahn
, Hongxin Hu, Di Ma
, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013)
[c35]Yan Zhu
, Changjun Hu, Di Ma
, Jin Li:
Cryptographic Spatio-temporal Predicates for Location-Based Services. 3PGCIC 2013: 84-91
[c34]Yan Zhu
, Di Ma
, Changjun Hu, Dijiang Huang
:
How to use attribute-based encryption to implement role-based access control in the cloud. SCC@ASIACCS 2013: 33-40
[c33]Di Ma
, Yan Zhu
, Mengyang Yu:
End-to-end aggregate authentication of time-series data. AsiaPKC@AsiaCCS 2013: 51-56
[c32]Yan Zhu
, Di Ma
, Dijiang Huang
, Changjun Hu:
Enabling secure location-based services in mobile cloud computing. MCC@SIGCOMM 2013: 27-32
[c31]Yan Zhu
, Di Ma
, Shan-Biao Wang, Rong-Quan Feng:
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices. WASA 2013: 42-53
[c30]Haoyu Li, Di Ma
, Nitesh Saxena, Babins Shrestha, Yan Zhu
:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. WISEC 2013: 25-30
[i2]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures. CoRR abs/1302.4010 (2013)
[i1]Bingsheng Zhang, Zhan Qin, Junfei Wang, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IACR Cryptol. ePrint Arch. 2013: 581 (2013)- 2012
[j14]Bang Wang, Hock-Beng Lim, Di Ma
:
A coverage-aware clustering protocol for wireless sensor networks. Comput. Networks 56(5): 1599-1611 (2012)
[j13]Yan Zhu
, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn
, Di Ma
:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012)
[j12]Di Ma
, Meng Joo Er, Bang Wang, Hock Beng Lim:
Range-free wireless sensor networks localization based on hop-count quantization. Telecommun. Syst. 50(3): 199-213 (2012)
[j11]Roberto Di Pietro
, Di Ma
, Claudio Soriente
, Gene Tsudik:
Self-healing in unattended wireless sensor networks. ACM Trans. Sens. Networks 9(1): 7:1-7:21 (2012)
[j10]Bang Wang, Hock-Beng Lim, Di Ma
:
Broadcast based on layered diffusion in wireless ad hoc and sensor networks. Wirel. Commun. Mob. Comput. 12(1): 99-115 (2012)
[c29]Tzipora Halevi, Di Ma
, Nitesh Saxena, Tuo Xiang:
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. ESORICS 2012: 379-396
[c28]Yan Zhu
, Shan-Biao Wang, Di Ma
, Hongxin Hu, Gail-Joon Ahn
:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. GLOBECOM 2012: 949-954
[c27]Yan Zhu
, Di Ma
, Shan-Biao Wang:
Secure Data Retrieval of Outsourced Data with Complex Query Support. ICDCS Workshops 2012: 481-490
[c26]Tzipora Halevi, Sein Lin, Di Ma
, Anudath K. Prasad, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. PerCom 2012: 227-234
[c25]Di Ma
, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang:
Location-aware and safer cards: enhancing RFID security and privacy via location sensing. WISEC 2012: 51-62- 2011
[c24]Di Ma
, Claudio Soriente
:
Building Trust for lambda-Congenial Secret Groups. BWCCA 2011: 222-229
[c23]Di Ma
, Hongxia Jin:
Content usage tracking in superdistribution. CCNC 2011: 912-917
[c22]Sifei Lu, Reuben Mingguang Li, William-Chandra Tjhi, Gary Kee Khoon Lee, Long Wang, Xiaorong Li, Di Ma
:
A Framework for Cloud-Based Large-Scale Data Analytics and Visualization: Case Study on Multiscale Climate Data. CloudCom 2011: 618-622
[c21]Di Ma
, Anudath K. Prasad:
A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems. ICCCN 2011: 1-6
[c20]Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma
:
Addressing Flaws in RFID Authentication Protocols. INDOCRYPT 2011: 216-235- 2010
[j9]Di Ma
, Meng Joo Er, Bang Wang, Hock-Beng Lim:
A novel approach toward source-to-sink distance estimation in wireless sensor networks. IEEE Commun. Lett. 14(5): 384-386 (2010)
[j8]Bang Wang, Hock-Beng Lim, Di Ma
, Cheng Fu:
The hop count shift problem and its impacts on protocol design in wireless ad hoc networks. Telecommun. Syst. 44(1-2): 49-60 (2010)
[j7]Di Ma
, Meng Joo Er, Bang Wang:
Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization. IEEE Trans. Veh. Technol. 59(6): 2998-3011 (2010)
[j6]Di Ma
, Gene Tsudik:
Security and privacy in emerging wireless networks. IEEE Wirel. Commun. 17(5): 12-21 (2010)
[c19]Hock-Beng Lim, Di Ma
, Bang Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Kenneth L. Watkin:
A Soldier Health Monitoring System for Military Applications. BSN 2010: 246-249
[c18]Di Ma
, Meng Joo Er, Hock-Beng Lim, Bang Wang:
A lower bound on expected localization error in wireless sensor network. ICARCV 2010: 96-103
[c17]Di Ma
, Gene Tsudik:
IRRES: Intrusion-Resilient Remote Email Storage. ICDCS Workshops 2010: 72-76
[c16]Bang Wang, Hock-Beng Lim, Di Ma
, Daiqin Yang:
A Coverage-Aware Clustering Protocol for Wireless Sensor Networks. MSN 2010: 85-90
2000 – 2009
- 2009
[j5]Bang Wang, Hock-Beng Lim, Di Ma
:
A survey of movement strategies for improving network coverage in wireless sensor networks. Comput. Commun. 32(13-14): 1427-1436 (2009)
[j4]Di Ma
, Claudio Soriente
, Gene Tsudik:
New adversary and new threats: security in unattended sensor networks. IEEE Netw. 23(2): 43-48 (2009)
[j3]Di Ma
, Gene Tsudik:
A new approach to secure logging. ACM Trans. Storage 5(1): 2:1-2:21 (2009)
[c15]Di Ma
, Bang Wang, Hock Beng Lim, Meng Joo Er:
Hop-Count Based Node-to-Anchor Distance Estimation in Wireless Sensor Networks. CCNC 2009: 1-5
[p2]Bang Wang, Minghui Li, Hock Beng Lim, Di Ma, Cheng Fu:
Energy Efficient Information Processing in Wireless Sensor Networks. Guide to Wireless Sensor Networks 2009: 1-26
[p1]Hock Beng Lim, Di Ma, Cheng Fu, Bang Wang, Meng Joo Er:
Adaptive Distributed Resource Allocation for Sensor Networks. Guide to Wireless Sensor Networks 2009: 347-377- 2008
[c14]Hock Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma
:
WISDOM: Simulation Framework for Middleware Services in Wireless Sensor Networks. CCNC 2008: 1269-1270
[c13]Di Ma
:
Practical forward secure sequential aggregate signatures. AsiaCCS 2008: 341-352
[c12]Di Ma
, Gene Tsudik:
A New Approach to Secure Logging. DBSec 2008: 48-63
[c11]Hock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma
:
A Middleware Services Simulation Platform for Wireless Sensor Networks. ICDCS Workshops 2008: 168-173
[c10]Di Ma
, Meng Joo Er, Hock-Beng Lim:
A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks. SMC 2008: 2792-2797
[c9]Roberto Di Pietro
, Di Ma
, Claudio Soriente
, Gene Tsudik:
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194
[c8]Di Ma
, Gene Tsudik:
DISH: Distributed Self-Healing. SSS 2008: 47-62- 2007
[j2]Yongdong Wu
, Di Ma
, Robert H. Deng
:
Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Trans. Multim. 9(6): 1314-1324 (2007)
[c7]Di Ma
:
Secure Feedback Service in Wireless Sensor Networks. ISPEC 2007: 116-128
[c6]Di Ma
, Gene Tsudik:
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. S&P 2007: 86-91- 2005
[j1]Robert H. Deng
, Di Ma
, Weizhong Shao, Yongdong Wu
:
Scalable trusted online dissemination of JPEG2000 images. Multim. Syst. 11(1): 60-67 (2005)
[c5]Di Ma
, Robert H. Deng
, HweeHwa Pang
, Jianying Zhou:
Authenticating Query Results in Data Publishing. ICICS 2005: 376-388- 2004
[c4]Tieyan Li, Yongdong Wu, Di Ma
, Huafei Zhu, Robert H. Deng
:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91
[c3]Di Ma
, Robert H. Deng
, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519
[c2]Yongdong Wu, Di Ma, Robert H. Deng
:
Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450- 2002
[c1]Yongdong Wu, Di Ma
, Changsheng Xu:
Efficient Object-Based Stream Authentication. INDOCRYPT 2002: 354-367
Coauthor Index
aka: Hock Beng Lim

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-07 00:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







