​
Login / Signup
Hengtai Ma
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 4
Top Topics
Wireless Networks
Ciphertext
Root Cause
Information Hiding
Top Venues
CSCloud
MFI
CSCWD
ICASSP
</>
Publications
</>
Jian Ge
,
Jianwu Rui
,
Hengtai Ma
,
Bin Li
,
Yeping He
Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems.
CSCWD
(2024)
Jian Ge
,
Jianwu Rui
,
Hengtai Ma
,
Bin Li
,
Yeping He
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph.
ICIC (9)
(2024)
Jian Ge
,
Jianwu Rui
,
Hengtai Ma
,
Bin Li
,
Yeping He
HySense: Hybrid Event Occurrence Detection Method for IoT Devices.
ICASSP
(2024)
Xiaohui Wu
,
Yeping He
,
Qiming Zhou
,
Hengtai Ma
,
Liang He
,
Wenhao Wang
,
Liheng Chen
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
TrustCom
(2020)
Xuefei Wang
,
Hengtai Ma
,
Lisha Jing
A dynamic marking method for implicit information flow in dynamic taint analysis.
SIN
(2015)
Hongliang Liang
,
Dongyang Wu
,
Jiuyun Xu
,
Hengtai Ma
Survey on Privacy Protection of Android Devices.
CSCloud
(2015)
Xuefei Wang
,
Hengtai Ma
,
Ke Yang
A Method of Handling Control Dependence in Dynamic Taint Analysis.
CIT/IUCC/DASC/PICom
(2015)
Xuefei Wang
,
Hengtai Ma
,
Ke Yang
,
Hongliang Liang
An Uneven Distributed System for Dynamic Taint Analysis Framework.
CSCloud
(2015)
Xiaowei Yi
,
Gang Zheng
,
Mingyu Li
,
Hengtai Ma
,
Changwen Zheng
Efficient authentication of scalable media streams over wireless networks.
Multim. Tools Appl.
71 (3) (2014)
Hengtai Ma
,
Xiaowei Yi
,
Xiaohui Wu
,
Dingfeng Gu
,
Hui Pan
,
Changwen Zheng
A capacity self-adaption information hiding algorithm based on RS code.
MFI
(2014)
Yong Fu
,
Xiaowei Yi
,
Hengtai Ma
,
Xiaowei Yi
An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding.
MFI
(2014)
Xiaowei Yi
,
Yong Fu
,
Hengtai Ma
,
Changwen Zheng
Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming.
ICME
(2013)
Gang Zheng
,
Hengtai Ma
,
C. Cheng
,
Y.-C. Tu
Design and logical analysis on the access authentication scheme for satellite mobile communication networks.
IET Inf. Secur.
6 (1) (2012)
Yuxuan Ji
,
Hengtai Ma
,
Gang Zheng
Analysis and Design on Key Updating Policies for Satellite Networks.
Int. J. Comput. Commun. Control
3 (4) (2008)