Follow
haoyu ma
haoyu ma
Zhejiang Lab
Verified email at zhejianglab.com
Title
Cited by
Cited by
Year
Xmark: dynamic software watermarking using Collatz conjecture
H Ma, C Jia, S Li, W Zheng, D Wu
IEEE Transactions on Information Forensics and Security 14 (11), 2859-2874, 2019
442019
Software watermarking using return-oriented programming
H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
332015
Control flow obfuscation using neural network to fight concolic testing
H Ma, X Ma, W Liu, Z Huang, D Gao, C Jia
International Conference on Security and Privacy in Communication Systems …, 2014
202014
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
162020
Integrated software fingerprinting via neural-network-based control flow obfuscation
H Ma, R Li, X Yu, C Jia, D Gao
IEEE Transactions on Information Forensics and Security 11 (10), 2322-2337, 2016
92016
Secure storage and fuzzy query over encrypted databases
Z Liu, H Ma, J Li, C Jia, J Li, K Yuan
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
72013
Active warden attack: On the (in) effectiveness of Android app repackage-proofing
H Ma, S Li, D Gao, D Wu, Q Jia, C Jia
IEEE Transactions on Dependable and Secure Computing 19 (5), 3508-3520, 2021
62021
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
H Ma, J Tian, D Gao, C Jia
IEEE Transactions on Dependable and Secure Computing 19 (5), 3257-3270, 2021
62021
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel
H Ma, J Tian, D Gao, C Jia
Information Security: 23rd International Conference, ISC 2020, Bali …, 2020
42020
Secure repackage-proofing framework for Android apps using collatz conjecture
H Ma, S Li, D Gao, C Jia
IEEE Transactions on Dependable and Secure Computing 19 (5), 3271-3285, 2021
22021
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis
Z Lin, J Li, B Li, H Ma, D Gao, J Ma
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Secure Deduplication Against Frequency Analysis Attacks
H Chen, G Ha, Y Chen, H Ma, C Jia
2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022
2022
An enhanced MinHash encryption scheme for encrypted deduplication
Q Jia, G Ha, H Wang, H Ma, H Chen
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
2022
Generalized Format-Preserving Encryption for Character Data
Y Huang, B Li, S Liang, H Ma, Z Liu
Cloud Computing, Security, Privacy in New Computing Environments: 7th …, 2018
2018
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search
Z Zhang, H Ma, D Wu, D Gao, X Yi, Y Chen, Y Wu, L Jiang
Secure repackage-proofing framework for Android apps using Collatz conjecture.(2021)
H MA, S LI, D GAO, C JIA
IEEE Transactions on Dependable and Secure Computing, 1-15, 0
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping.(2021)
H MA, J TIAN, D GAO, C JIA
IEEE Transactions on Dependable and Secure Computing, 1-14, 0
Software Watermarking using Return-Oriented Programming.(2015)
H Ma, K Lu, X Ma, H Zhang, C Jia, D GAO
ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer …, 0
Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems.(2020)
H MA, J TIAN, K QIU, D LO, D GAO, D WU, C JIA, T BAKER
IEEE Transactions on Industrial Informatics, 1-10, 0
The system can't perform the operation now. Try again later.
Articles 1–19