Chunguang Ma
Chun-Guang Ma
Xu Chen
Chunguang Ma
Chaofan Zhao
Yong Luo
UAV Classification Based on Deep Learning Fusion of Multidimensional UAV Micro-Doppler Image Features.
1-5
2024
21
IEEE Geosci. Remote. Sens. Lett.
https://doi.org/10.1109/LGRS.2024.3371171
db/journals/lgrs/lgrs21.html#ChenMZL24
Zengpeng Li
Vishal Sharma 0001
Chunguang Ma
Chunpeng Ge
Willy Susilo
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
2021
64
Sci. China Inf. Sci.
6
https://doi.org/10.1007/s11432-019-2856-8
https://www.wikidata.org/entity/Q122733336
db/journals/chinaf/chinaf64.html#Li0MGS21
Zengpeng Li
Chunguang Ma
Ding Wang 0002
Leakage Resilient Leveled $\mathsf {FHE}$FHE on Multiple Bits Message.
845-858
2021
7
IEEE Trans. Big Data
5
https://doi.org/10.1109/TBDATA.2017.2726554
db/journals/tbd/tbd7.html#LiMW21
Lei Song
Chunguang Ma
Guoyin Zhang
Yun Zhang 0009
Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting.
143233-143240
2020
8
IEEE Access
https://doi.org/10.1109/ACCESS.2020.3014264
db/journals/access/access8.html#SongMZZ20
Juyan Li
Chunguang Ma
Zhen Gu
Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting.
551-567
2020
31
Int. J. Found. Comput. Sci.
5
https://doi.org/10.1142/s0129054120500252
https://www.wikidata.org/entity/Q114978627
db/journals/ijfcs/ijfcs31.html#LiMG20
Weiping Ouyang
Chunguang Ma
Guoyin Zhang
Keming Diao
Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection.
8862920:1-8862920:10
2020
2020
Mob. Inf. Syst.
https://doi.org/10.1155/2020/8862920
db/journals/mis/mis2020.html#OuyangMZD20
Zengpeng Li
Chunguang Ma
Ding Wang 0002
Achieving Multi-Hop PRE via Branching Program.
45-58
2020
8
IEEE Trans. Cloud Comput.
1
https://doi.org/10.1109/TCC.2017.2764082
db/journals/tcc/tcc8.html#LiMW20
Lingling Wang
Xiaodong Lin 0001
Eugene V. Zima
Chunguang Ma
Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain.
2411-2423
2020
69
IEEE Trans. Veh. Technol.
3
https://doi.org/10.1109/TVT.2020.2964526
db/journals/tvt/tvt69.html#WangLZM20
Chunguang Ma
Hongjun Bei
Chuner Wang
Guihua Chen
Accelerated Depreciation Tax Credit and Corporate Financialization Based on the PSM-DID Model.
6622900:1-6622900:10
2020
2020
Wirel. Commun. Mob. Comput.
https://doi.org/10.1155/2020/6622900
db/journals/wicomm/wicomm2020.html#MaBWC20
Lingling Wang
Xiaodong Lin 0001
Lijun Qu
Chunguang Ma
Ring Selection for Ring Signature-Based Privacy Protection in VANETs.
1-6
2020
ICC
https://doi.org/10.1109/ICC40277.2020.9149247
conf/icc/2020
db/conf/icc/icc2020.html#WangLQM20
Juyan Li
Chunguang Ma
Lei Zhang 0052
Qi Yuan
Unidirectional FHPRE Scheme from Lattice for Cloud Computing.
592-600
2019
21
Int. J. Netw. Secur.
4
http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p592-600.pdf
db/journals/ijnsec/ijnsec21.html#LiMZY19
Jiyu Guo
Jisheng Tong
Qing Zhao
Jiao Jiao
Jianjian Huo
Chunguang Ma
An Ultrawide Band Antipodal Vivaldi Antenna for Airborne GPR Application.
1560-1564
2019
16
IEEE Geosci. Remote. Sens. Lett.
10
https://doi.org/10.1109/LGRS.2019.2905013
db/journals/lgrs/lgrs16.html#GuoTZJHM19
Juyan Li
Chunguang Ma
Kejia Zhang
A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing.
1262
2019
11
Symmetry
10
https://doi.org/10.3390/sym11101262
db/journals/symmetry/symmetry11.html#LiMZ19
Jianjian Huo
Qing Zhao
Binzhong Zhou
Lanbo Liu
Chunguang Ma
Jiyu Guo
Longhao Xie
Energy Flow Domain Reverse-Time Migration for Borehole Radar.
7221-7231
2019
57
IEEE Trans. Geosci. Remote. Sens.
9
https://doi.org/10.1109/TGRS.2019.2912318
db/journals/tgrs/tgrs57.html#HuoZZLMGX19
Lei Song
Chunguang Ma
Peng Wu
Yun Zhang 0009
PPD-DL: Privacy-Preserving Decentralized Deep Learning.
273-282
2019
ICAIS (1)
https://doi.org/10.1007/978-3-030-24274-9_24
conf/icccsec/2019-1
db/conf/icccsec/icccsec2019-1.html#SongMWZ19
Juyan Li
Chunguang Ma
Kejia Zhang
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
32-46
2019
SocialSec
https://doi.org/10.1007/978-981-15-0758-8_3
conf/socialsec/2019
db/conf/socialsec/socialsec2019.html#LiMZ19
Zengpeng Li
Chunguang Ma
Hong-Sheng Zhou
Multi-key FHE for multi-bit messages.
029101:1-029101:3
2018
61
Sci. China Inf. Sci.
2
https://doi.org/10.1007/s11432-017-9206-y
db/journals/chinaf/chinaf61.html#LiMZ18
Ke-Jia Zhang
Leong-Chuan Kwek
Chun-Guang Ma
Long Zhang
Hong-Wei Sun
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons.
38
2018
17
Quantum Inf. Process.
2
https://doi.org/10.1007/s11128-017-1808-3
db/journals/qip/qip17.html#ZhangKMZS18
Qi Yuan
Chunguang Ma
Haitao Yu 0004
Xuefen Bian
A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks.
1539
2018
18
Sensors
5
https://doi.org/10.3390/s18051539
https://www.wikidata.org/entity/Q55266238
db/journals/sensors/sensors18.html#YuanMYB18
Jingmei Li
Yanxia Wu
Guoyin Zhang
Chaoguang Men
Chunguang Ma
Xiang Li
Changting Shi
Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline.
47-52
2018
eLEOT
https://doi.org/10.1007/978-3-319-93719-9_7
conf/eleot/2018
db/conf/eleot/eleot2018.html#LiWZMMLS18
Zengpeng Li
Chunguang Ma
Ding Wang 0002
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
16214-16228
2017
5
IEEE Access
https://doi.org/10.1109/ACCESS.2017.2740720
https://www.wikidata.org/entity/Q121093986
db/journals/access/access5.html#LiMW17
Chunguang Ma
Juyan Li
Weiping Ouyang
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment.
645-660
2017
28
Int. J. Found. Comput. Sci.
6
https://doi.org/10.1142/S0129054117400111
https://www.wikidata.org/entity/Q122954051
db/journals/ijfcs/ijfcs28.html#MaLO17
Jiansheng Yao
Chunguang Ma
Peng Wu
Gang Du
Qi Yuan
An Opportunistic Network Coding Routing for Opportunistic Networks.
157-171
2017
45
Int. J. Parallel Program.
1
https://doi.org/10.1007/s10766-015-0392-3
db/journals/ijpp/ijpp45.html#YaoMWDY17
Zengpeng Li
Chunguang Ma
Ding Wang 0002
Gang Du
Toward single-server private information retrieval protocol via learning with errors.
280-284
2017
34
J. Inf. Secur. Appl.
https://doi.org/10.1016/j.jisa.2016.11.003
db/journals/istr/istr34.html#LiMWD17
Chunguang Ma
Lei Zhang 0052
Songtao Yang
Xiaodong Zheng
Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services.
1750119:1-1750119:25
2017
26
J. Circuits Syst. Comput.
7
https://doi.org/10.1142/S0218126617501195
https://www.wikidata.org/entity/Q114978575
db/journals/jcsc/jcsc26.html#MaZYZ17
Chunguang Ma
Juyan Li
Gang Du
A Flexible Fully Homomorphic Encryption.
761-772
2017
95
Wirel. Pers. Commun.
2
https://doi.org/10.1007/s11277-016-3796-5
https://www.wikidata.org/entity/Q123007929
db/journals/wpc/wpc95.html#MaLD17
Lei Zhang 0052
Chunguang Ma
Songtao Yang
Xiaodong Zheng
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme.
6167-6187
2017
97
Wirel. Pers. Commun.
4
https://doi.org/10.1007/s11277-017-4833-8
db/journals/wpc/wpc97.html#ZhangMYZ17
Gang Du
Chunguang Ma
Zengpeng Li
Ding Wang 0002
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
256-267
2017
ICCCS (2)
https://doi.org/10.1007/978-3-319-68542-7_21
conf/icccsec/2017-2
db/conf/icccsec/icccsec2017-2.html#DuMLW17
Lei Zhang 0052
Chunguang Ma
Songtao Yang
Zengpeng Li
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
215-218
2017
MSWiM
https://doi.org/10.1145/3127540.3127572
conf/mswim/2017
db/conf/mswim/mswim2017.html#ZhangMYL17
Zengpeng Li
Chunguang Ma
Ding Wang 0002
Minghao Zhao 0001
Qian Zhao
Lu Zhou
Toward Proxy Re-encryption From Learning with Errors in the Exponent.
683-690
2017
TrustCom/BigDataSE/ICESS
https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300
https://doi.ieeecomputersociety.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300
conf/trustcom/2017
db/conf/trustcom/trustcom2017.html#LiMWZZZ17
Yun Lin 0005
Can Wang
Chunguang Ma
Zheng Dou
Xuefei Ma
A new combination method for multisensor conflict information.
2874-2890
2016
72
J. Supercomput.
7
https://doi.org/10.1007/s11227-016-1681-3
db/journals/tjs/tjs72.html#LinWMDM16
Zengpeng Li
Chunguang Ma
Eduardo Morais
Gang Du
Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based.
221-242
2016
Inscrypt
https://doi.org/10.1007/978-3-319-54705-3_14
conf/cisc/2016
db/conf/cisc/inscrypt2016.html#LiMMD16
Haitao Zhu
Lei Zhang 0052
Weimiao Feng
Chunguang Ma
A Users Collaborative Scheme for Location and Query Privacy.
383-390
2016
ICPADS
https://doi.org/10.1109/ICPADS.2016.0059
https://doi.ieeecomputersociety.org/10.1109/ICPADS.2016.0059
conf/icpads/2016
db/conf/icpads/icpads2016.html#ZhuZFM16
Zengpeng Li
Chunguang Ma
Gang Du
Weiping Ouyang
Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching.
1169-1174
2016
ICPADS
https://doi.org/10.1109/ICPADS.2016.0154
https://doi.ieeecomputersociety.org/10.1109/ICPADS.2016.0154
conf/icpads/2016
db/conf/icpads/icpads2016.html#LiMDO16
Chunguang Ma
Juyan Li
Weiping Ouyang
A Homomorphic Proxy Re-encryption from Lattices.
353-372
2016
ProvSec
https://doi.org/10.1007/978-3-319-47422-9_21
conf/provsec/2016
db/conf/provsec/provsec2016.html#MaLO16
Zengpeng Li
Steven D. Galbraith
Chunguang Ma
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
373-383
2016
ProvSec
https://doi.org/10.1007/978-3-319-47422-9_22
conf/provsec/2016
db/conf/provsec/provsec2016.html#LiGM16
Zengpeng Li
Steven D. Galbraith
Chunguang Ma
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
1146
2016
2016
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2016/1146
db/journals/iacr/iacr2016.html#LiGM16
Chunguang Ma
Chang-li Zhou
Songtao Yang
A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS.
326953:1-326953:17
2015
11
Int. J. Distributed Sens. Networks
https://doi.org/10.1155/2015/326953
https://www.wikidata.org/entity/Q59108887
db/journals/ijdsn/ijdsn11.html#MaZY15
Qi Yuan
Chunguang Ma
Junyu Lin
Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing.
344-352
2015
ICYCSEE
https://doi.org/10.1007/978-3-662-46248-5_42
conf/icycsee/2015
db/conf/icycsee/icycsee2015.html#YuanML15
Chang-li Zhou
Chunguang Ma
Songtao Yang
An Improved Fine-Grained Encryption Method for Unstructured Big Data.
361-369
2015
ICYCSEE
https://doi.org/10.1007/978-3-662-46248-5_44
conf/icycsee/2015
db/conf/icycsee/icycsee2015.html#ZhouMY15
Chunguang Ma
Ding Wang 0002
Sendong Zhao
Security flaws in two improved remote user authentication schemes using smart cards.
2215-2227
2014
27
Int. J. Commun. Syst.
10
https://doi.org/10.1002/dac.2468
db/journals/ijcomsys/ijcomsys27.html#MaWZ14
Chang-li Zhou
Chunguang Ma
Songtao Yang
Peng Wu
Linlin Liu
A Location Privacy Preserving Method Based on Sensitive Diversity for LBS.
409-422
2014
NPC
https://doi.org/10.1007/978-3-662-44917-2_34
conf/npc/2014
db/conf/npc/npc2014.html#ZhouMYWL14
Ding Wang 0002
Chunguang Ma
Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
498-503
2013
14
Inf. Fusion
4
https://doi.org/10.1016/j.inffus.2012.12.002
db/journals/inffus/inffus14.html#WangM13
Ding Wang 0002
Chunguang Ma
Qi-Ming Zhang
Sendong Zhao
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
148-155
2013
8
J. Networks
1
https://doi.org/10.4304/jnw.8.1.148-155
https://www.wikidata.org/entity/Q114572910
db/journals/jnw/jnw8.html#WangMZZ13
Chunguang Ma
Jiuru Wang
Peng Wu
Hua Zhang
Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks.
1847-1852
2012
7
J. Comput.
8
http://www.jcomputers.us/index.php?m=content&c=index&a=show&catid=120&id=2312
https://doi.org/10.4304/jcp.7.8.1847-1852
db/journals/jcp/jcp7.html#MaWWZ12
Chunguang Ma
Ding Wang 0002
Ping Zhao
Yu-Heng Wang
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy.
199-211
2012
APWeb Workshops
https://doi.org/10.1007/978-3-642-29426-6_24
conf/apweb/2012w
db/conf/apweb/apweb2012w.html#MaWZW12
Ding Wang 0002
Chunguang Ma
Peng Wu
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
114-121
2012
DBSec
https://doi.org/10.1007/978-3-642-31540-4_9
conf/dbsec/2012
db/conf/dbsec/dbsec2012.html#WangMW12
Chunguang Ma
Ding Wang 0002
Qi-Ming Zhang
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
141-152
2012
ICDCIT
https://doi.org/10.1007/978-3-642-28073-3_13
conf/icdcit/2012
db/conf/icdcit/icdcit2012.html#MaWZ12
Ding Wang 0002
Chunguang Ma
Lan Shi
Yu-Heng Wang
On the Security of an Improved Password Authentication Scheme Based on ECC.
181-188
2012
ICICA (LNCS)
https://doi.org/10.1007/978-3-642-34062-8_24
conf/icica/2012
db/conf/icica/icica2012.html#WangMSW12
Sendong Zhao
Ding Wang 0002
Sicheng Zhao
Wu Yang
Chunguang Ma
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
365-372
2012
ICICS
https://doi.org/10.1007/978-3-642-34129-8_34
conf/icics/2012
db/conf/icics/icics2012.html#ZhaoWZYM12
Ding Wang 0002
Chunguang Ma
Sendong Zhao
Chang-li Zhou
Breaking a Robust Remote User Authentication Scheme Using Smart Cards.
110-118
2012
NPC
https://doi.org/10.1007/978-3-642-35606-3_13
conf/npc/2012
db/conf/npc/npc2012.html#WangMZZ12
Ding Wang 0002
Chunguang Ma
De-li Gu
Zhen-shan Cui
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture.
462-475
2012
NSS
https://doi.org/10.1007/978-3-642-34601-9_35
conf/nss/2012
db/conf/nss/nss2012.html#WangMGC12
Ding Wang 0002
Ying Mei
Chunguang Ma
Zhen-shan Cui
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing.
246-253
2012
WISM
https://doi.org/10.1007/978-3-642-33469-6_34
conf/wism/2012
db/conf/wism/wism2012.html#WangMMC12
Ding Wang 0002
Chunguang Ma
On the Security of an Improved Password Authentication Scheme Based on ECC.
190
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/190
db/journals/iacr/iacr2012.html#WangM12
Ding Wang 0002
Chunguang Ma
Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
439
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/439
db/journals/iacr/iacr2012.html#WangM12a
Ding Wang 0002
Chunguang Ma
De-li Gu
Zhen-shan Cui
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
484
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/484
db/journals/iacr/iacr2012.html#WangMGC12
Ding Wang 0002
Chunguang Ma
On the (in)security of some smart-card-based password authentication schemes for WSN.
581
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/581
db/journals/iacr/iacr2012.html#WangM12b
Chunguang Ma
Guining Geng
Huiqiang Wang
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
500-507
2010
5
J. Networks
4
https://doi.org/10.4304/jnw.5.4.500-507
db/journals/jnw/jnw5.html#MaGW10
Hongwu Lv
Huiqiang Wang
Qian Zhao
Chunguang Ma
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
84-89
2009
DASC
https://doi.org/10.1109/DASC.2009.98
https://doi.ieeecomputersociety.org/10.1109/DASC.2009.98
conf/dasc/2009
db/conf/dasc/dasc2009.html#LvWZM09
Chunguang Ma
Xiangjun Lin
Hongwu Lv
Huiqiang Wang
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
400-404
2009
DASC
https://doi.org/10.1109/DASC.2009.97
https://doi.ieeecomputersociety.org/10.1109/DASC.2009.97
conf/dasc/2009
db/conf/dasc/dasc2009.html#MaLLW09
Lingling Wang
Guoyin Zhang
Chunguang Ma
ID-based deniable ring authentication with constant-size signature.
106-112
2008
2
Frontiers Comput. Sci. China
1
https://doi.org/10.1007/s11704-008-0003-1
db/journals/fcsc/fcsc2.html#WangZM08
Chunguang Ma
Peng Wu
Lingling Wang
Guoyin Zhang
A Novel Method to Authenticate Transitively Closed Undirected Graph.
537-542
2007
IMSCCS
https://doi.org/10.1109/IMSCCS.2007.23
https://doi.ieeecomputersociety.org/10.1109/IMSCCS.2007.23
conf/imsccs/2007
db/conf/imsccs/imsccs2007.html#MaWWZ07
Chunguang Ma
Zhiguo Shang
Huiqiang Wang
Guining Geng
An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks.
854-865
2007
conf/msn/2007
MSN
https://doi.org/10.1007/978-3-540-77024-4_77
db/conf/msn/msn2007.html#MaSWG07
Chunguang Ma
Peng Wu
Guochang Gu
A New Method for the Design of Stateless Transitive Signature Schemes.
897-904
2006
conf/apweb/2006w
APWeb Workshops
https://doi.org/10.1007/11610496_124
db/conf/apweb/apweb2006w.html#MaWG06
Hongjun Bei
Xuefen Bian
Guihua Chen
Xu Chen
Zhen-shan Cui
Keming Diao
Zheng Dou
Gang Du
Weimiao Feng
Steven D. Galbraith
Chunpeng Ge
Guining Geng
De-li Gu
Guochang Gu
Zhen Gu
Jiyu Guo
Jianjian Huo
Jiao Jiao
Leong-Chuan Kwek
Jingmei Li
Juyan Li
Xiang Li
Zengpeng Li
Junyu Lin
Xiangjun Lin
Xiaodong Lin 0001
Yun Lin 0005
Lanbo Liu
Linlin Liu
Yong Luo
Hongwu Lv
Xuefei Ma
Ying Mei
Chaoguang Men
Eduardo Morais
Weiping Ouyang
Lijun Qu
Zhiguo Shang
Vishal Sharma 0001
Changting Shi
Lan Shi
Lei Song
Hong-Wei Sun
Willy Susilo
Jisheng Tong
Can Wang
Chuner Wang
Ding Wang 0002
Huiqiang Wang
Jiuru Wang
Lingling Wang
Yu-Heng Wang
Peng Wu
Yanxia Wu
Longhao Xie
Songtao Yang
Wu Yang
Jiansheng Yao
Haitao Yu 0004
Qi Yuan
Guoyin Zhang
Hua Zhang
Kejia ZhangKe-Jia Zhang
Lei Zhang 0052
Long Zhang
Qi-Ming Zhang
Yun Zhang 0009
Chaofan Zhao
Minghao Zhao 0001
Ping Zhao
Qian Zhao
Qing Zhao
Sendong Zhao
Sicheng Zhao
Xiaodong Zheng
Binzhong Zhou
Chang-li Zhou
Hong-Sheng Zhou
Lu Zhou
Haitao Zhu
Eugene V. Zima