Xmark: dynamic software watermarking using Collatz conjecture H Ma, C Jia, S Li, W Zheng, D Wu IEEE Transactions on Information Forensics and Security 14 (11), 2859-2874, 2019 | 44 | 2019 |
Software watermarking using return-oriented programming H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 33 | 2015 |
Control flow obfuscation using neural network to fight concolic testing H Ma, X Ma, W Liu, Z Huang, D Gao, C Jia International Conference on Security and Privacy in Communication Systems …, 2014 | 21 | 2014 |
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020 | 16 | 2020 |
Integrated software fingerprinting via neural-network-based control flow obfuscation H Ma, R Li, X Yu, C Jia, D Gao IEEE Transactions on Information Forensics and Security 11 (10), 2322-2337, 2016 | 9 | 2016 |
Secure storage and fuzzy query over encrypted databases Z Liu, H Ma, J Li, C Jia, J Li, K Yuan Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 7 | 2013 |
Active warden attack: On the (in) effectiveness of Android app repackage-proofing H Ma, S Li, D Gao, D Wu, Q Jia, C Jia IEEE Transactions on Dependable and Secure Computing 19 (5), 3508-3520, 2021 | 6 | 2021 |
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping H Ma, J Tian, D Gao, C Jia IEEE Transactions on Dependable and Secure Computing 19 (5), 3257-3270, 2021 | 6 | 2021 |
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel H Ma, J Tian, D Gao, C Jia Information Security: 23rd International Conference, ISC 2020, Bali …, 2020 | 4 | 2020 |
Secure repackage-proofing framework for Android apps using collatz conjecture H Ma, S Li, D Gao, C Jia IEEE Transactions on Dependable and Secure Computing 19 (5), 3271-3285, 2021 | 2 | 2021 |
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis Z Lin, J Li, B Li, H Ma, D Gao, J Ma Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Secure Deduplication Against Frequency Analysis Attacks H Chen, G Ha, Y Chen, H Ma, C Jia 2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022 | | 2022 |
An enhanced MinHash encryption scheme for encrypted deduplication Q Jia, G Ha, H Wang, H Ma, H Chen 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | | 2022 |
Generalized Format-Preserving Encryption for Character Data Y Huang, B Li, S Liang, H Ma, Z Liu Cloud Computing, Security, Privacy in New Computing Environments: 7th …, 2018 | | 2018 |
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search Z Zhang, H Ma, D Wu, D Gao, X Yi, Y Chen, Y Wu, L Jiang | | |
Secure repackage-proofing framework for Android apps using Collatz conjecture.(2021) H MA, S LI, D GAO, C JIA IEEE Transactions on Dependable and Secure Computing, 1-15, 0 | | |
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping.(2021) H MA, J TIAN, D GAO, C JIA IEEE Transactions on Dependable and Secure Computing, 1-14, 0 | | |
Software Watermarking using Return-Oriented Programming.(2015) H Ma, K Lu, X Ma, H Zhang, C Jia, D GAO ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer …, 0 | | |
Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems.(2020) H MA, J TIAN, K QIU, D LO, D GAO, D WU, C JIA, T BAKER IEEE Transactions on Industrial Informatics, 1-10, 0 | | |