Follow
Duohe Ma
Title
Cited by
Cited by
Year
Optimal strategy selection for moving target defense based on Markov game
C Lei, DH Ma, HQ Zhang
IEEE Access 5, 156-169, 2017
1052017
Incomplete information Markov game theoretic approach to strategy generation for moving target defense
C Lei, HQ Zhang, LM Wan, L Liu, D Ma
Computer Communications 116, 184-199, 2018
562018
Defending blind DDoS attack on SDN based on moving target defense
D Ma, Z Xu, D Lin
International Conference on Security and Privacy in Communication Networks …, 2015
452015
Moving target network defense effectiveness evaluation based on change-point detection
C Lei, D Ma, H Zhang, L Wang
Mathematical Problems in Engineering 2016, 2016
302016
Research of webshell detection based on decision tree
J Hu, Z Xu, D Ma, J Yang
Journal of network new media 6 (005), 2012
282012
A secure container deployment strategy by genetic algorithm to defend against co-resident attacks in cloud computing
T Kong, L Wang, D Ma, Z Xu, Q Yang, K Chen
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
252019
A self-adaptive hopping approach of moving target defense to thwart scanning attacks
D Ma, C Lei, L Wang, H Zhang, Z Xu, M Li
Information and Communications Security: 18th International Conference …, 2016
242016
Quantitative security assessment method based on entropy for moving target defense
D Ma, L Wang, C Lei, Z Xu, H Zhang, M Li
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
132017
Image secret sharing construction for general access structure with meaningful share
X Yan, Y Lu, L Liu, D Ma
International Journal of Digital Crime and Forensics (IJDCF) 10 (3), 66-77, 2018
112018
Network moving target defense technique based on self-adaptive end-point hopping
C Lei, H Zhang, D Ma, Y Yang
Arabian Journal for Science and Engineering 42 (8), 3249-3262, 2017
112017
Automated honeynet deployment strategy for active defense in container-based cloud
T Kong, L Wang, D Ma, Z Xu, Q Yang, Z Lu, Y Lu
2020 IEEE 22nd International Conference on High Performance Computing and …, 2020
92020
Thwart eavesdropping attacks on network communication based on moving target defense
D Ma, L Wang, C Lei, Z Xu, H Zhang, M Li
2016 IEEE 35th international performance computing and communications …, 2016
92016
Game theory approaches for evaluating the deception-based moving target defense
D Ma, Z Tang, X Sun, L Guo, L Wang, K Chen
Proceedings of the 9th ACM workshop on moving target defense, 67-77, 2022
52022
WGT: Thwarting web attacks through web gene tree-based moving target defense
Y Zhang, D Ma, X Sun, K Chen, F Liu
2020 IEEE International Conference on Web Services (ICWS), 364-371, 2020
42020
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud
T Kong, L Wang, D Ma, K Chen, Z Xu, Y Lu
2020 IEEE 22nd International Conference on High Performance Computing and …, 2020
32020
Disappeared face: a physical adversarial attack method on black-box face detection models
C Zhou, H Jing, X He, L Wang, K Chen, D Ma
Information and Communications Security: 23rd International Conference …, 2021
22021
What you see is not what you get: Towards deception-based data moving target defense
Y Zhang, D Ma, X Sun, K Chen, F Liu
2020 IEEE 39th International Performance Computing and Communications …, 2020
22020
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense
Z Tang, D Ma, X Sun, K Chen, L Wang, J Jiang
2023 IEEE Symposium on Computers and Communications (ISCC), 568-574, 2023
2023
Deepfake Detection Using Multiple Facial Features
X Wang, D Ma, L Wang, Z Lu, Z Zhang, J Jiang
IFIP International Conference on Digital Forensics, 161-175, 2023
2023
Thwart Physical and Digital Domain's Adversarial Attack Methods on Face Detection
G Zhang, H Jing, X Wang, C Zhou, X He, D Ma
2021 2nd International Conference on Artificial Intelligence and Computer …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20