Optimal strategy selection for moving target defense based on Markov game C Lei, DH Ma, HQ Zhang IEEE Access 5, 156-169, 2017 | 105 | 2017 |
Incomplete information Markov game theoretic approach to strategy generation for moving target defense C Lei, HQ Zhang, LM Wan, L Liu, D Ma Computer Communications 116, 184-199, 2018 | 56 | 2018 |
Defending blind DDoS attack on SDN based on moving target defense D Ma, Z Xu, D Lin International Conference on Security and Privacy in Communication Networks …, 2015 | 45 | 2015 |
Moving target network defense effectiveness evaluation based on change-point detection C Lei, D Ma, H Zhang, L Wang Mathematical Problems in Engineering 2016, 2016 | 30 | 2016 |
Research of webshell detection based on decision tree J Hu, Z Xu, D Ma, J Yang Journal of network new media 6 (005), 2012 | 28 | 2012 |
A secure container deployment strategy by genetic algorithm to defend against co-resident attacks in cloud computing T Kong, L Wang, D Ma, Z Xu, Q Yang, K Chen 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 25 | 2019 |
A self-adaptive hopping approach of moving target defense to thwart scanning attacks D Ma, C Lei, L Wang, H Zhang, Z Xu, M Li Information and Communications Security: 18th International Conference …, 2016 | 24 | 2016 |
Quantitative security assessment method based on entropy for moving target defense D Ma, L Wang, C Lei, Z Xu, H Zhang, M Li Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 13 | 2017 |
Image secret sharing construction for general access structure with meaningful share X Yan, Y Lu, L Liu, D Ma International Journal of Digital Crime and Forensics (IJDCF) 10 (3), 66-77, 2018 | 11 | 2018 |
Network moving target defense technique based on self-adaptive end-point hopping C Lei, H Zhang, D Ma, Y Yang Arabian Journal for Science and Engineering 42 (8), 3249-3262, 2017 | 11 | 2017 |
Automated honeynet deployment strategy for active defense in container-based cloud T Kong, L Wang, D Ma, Z Xu, Q Yang, Z Lu, Y Lu 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 9 | 2020 |
Thwart eavesdropping attacks on network communication based on moving target defense D Ma, L Wang, C Lei, Z Xu, H Zhang, M Li 2016 IEEE 35th international performance computing and communications …, 2016 | 9 | 2016 |
Game theory approaches for evaluating the deception-based moving target defense D Ma, Z Tang, X Sun, L Guo, L Wang, K Chen Proceedings of the 9th ACM workshop on moving target defense, 67-77, 2022 | 5 | 2022 |
WGT: Thwarting web attacks through web gene tree-based moving target defense Y Zhang, D Ma, X Sun, K Chen, F Liu 2020 IEEE International Conference on Web Services (ICWS), 364-371, 2020 | 4 | 2020 |
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud T Kong, L Wang, D Ma, K Chen, Z Xu, Y Lu 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 3 | 2020 |
Disappeared face: a physical adversarial attack method on black-box face detection models C Zhou, H Jing, X He, L Wang, K Chen, D Ma Information and Communications Security: 23rd International Conference …, 2021 | 2 | 2021 |
What you see is not what you get: Towards deception-based data moving target defense Y Zhang, D Ma, X Sun, K Chen, F Liu 2020 IEEE 39th International Performance Computing and Communications …, 2020 | 2 | 2020 |
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense Z Tang, D Ma, X Sun, K Chen, L Wang, J Jiang 2023 IEEE Symposium on Computers and Communications (ISCC), 568-574, 2023 | | 2023 |
Deepfake Detection Using Multiple Facial Features X Wang, D Ma, L Wang, Z Lu, Z Zhang, J Jiang IFIP International Conference on Digital Forensics, 161-175, 2023 | | 2023 |
Thwart Physical and Digital Domain's Adversarial Attack Methods on Face Detection G Zhang, H Jing, X Wang, C Zhou, X He, D Ma 2021 2nd International Conference on Artificial Intelligence and Computer …, 2021 | | 2021 |