Login / Signup
Duohe Ma
ORCID
Publication Activity (10 Years)
Years Active: 2006-2024
Publications (10 Years): 18
Top Topics
Data Leakage Prevention
Facial Features
Game Theory
Moving Target Defense
Top Venues
HPCC/DSS/SmartCity
IPCCC
AsiaCCS
Int. J. Digit. Crime Forensics
</>
Publications
</>
Kai Chen
,
Qian Yang
,
Jiankai Wang
,
Duohe Ma
,
Liming Wang
,
Zhen Xu
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention.
CSCWD
(2024)
Zhitong Lu
,
Duohe Ma
,
Linna Fan
,
Zhen Xu
,
Kai Chen
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion.
IH&MMSec
(2024)
Xinzhe Wang
,
Duohe Ma
,
Liming Wang
,
Zhitong Lu
,
Zhenchao Zhang
,
Junye Jiang
Deepfake Detection Using Multiple Facial Features.
IFIP Int. Conf. Digital Forensics
(2023)
Zhimin Tang
,
Duohe Ma
,
Xiaoyan Sun
,
Kai Chen
,
Liming Wang
,
Junye Jiang
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
ISCC
(2023)
Duohe Ma
,
Zhimin Tang
,
Xiaoyan Sun
,
Lu Guo
,
Liming Wang
,
Kai Chen
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense.
MTD@CCS
(2022)
Chuan Zhou
,
Huiyun Jing
,
Xin He
,
Liming Wang
,
Kai Chen
,
Duohe Ma
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
ICICS (1)
(2021)
Tong Kong
,
Liming Wang
,
Duohe Ma
,
Zhen Xu
,
Qian Yang
,
Zhitong Lu
,
Yijun Lu
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud.
HPCC/DSS/SmartCity
(2020)
Yaqin Zhang
,
Duohe Ma
,
Xiaoyan Sun
,
Kai Chen
,
Feng Liu
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense.
ICWS
(2020)
Tong Kong
,
Liming Wang
,
Duohe Ma
,
Kai Chen
,
Zhen Xu
,
Yijun Lu
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
HPCC/DSS/SmartCity
(2020)
Yaqin Zhang
,
Duohe Ma
,
Xiaoyan Sun
,
Kai Chen
,
Feng Liu
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
IPCCC
(2020)
Tong Kong
,
Liming Wang
,
Duohe Ma
,
Zhen Xu
,
Qian Yang
,
Kai Chen
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
HPCC/SmartCity/DSS
(2019)
Zhaocan Li
,
Liming Wang
,
Sijiang Ge
,
Duohe Ma
,
Bo Qin
基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding).
计算机科学
46 (12) (2019)
Xuehu Yan
,
Yuliang Lu
,
Lintao Liu
,
Duohe Ma
Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics
10 (3) (2018)
Cheng Lei
,
Hongqi Zhang
,
Liming Wang
,
Lu Liu
,
Duohe Ma
Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun.
116 (2018)
Cheng Lei
,
Duohe Ma
,
Hongqi Zhang
Optimal Strategy Selection for Moving Target Defense Based on Markov Game.
IEEE Access
5 (2017)
Duohe Ma
,
Liming Wang
,
Cheng Lei
,
Zhen Xu
,
Hongqi Zhang
,
Meng Li
Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
AsiaCCS
(2017)
Duohe Ma
,
Liming Wang
,
Cheng Lei
,
Zhen Xu
,
Hongqi Zhang
,
Meng Li
Thwart eavesdropping attacks on network communication based on moving target defense.
IPCCC
(2016)
Duohe Ma
,
Cheng Lei
,
Liming Wang
,
Hongqi Zhang
,
Zhen Xu
,
Meng Li
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
ICICS
(2016)
Duohe Ma
,
Zhen Xu
,
Dongdai Lin
Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
SecureComm (1)
(2014)
Han Yu
,
Xiamu Niu
,
Duohe Ma
,
Changxiang Shen
Research on Applying Java Card to Database Encryption Systems.
IIH-MSP
(2006)