​
Login / Signup
Zuchao Ma
ORCID
Publication Activity (10 Years)
Years Active: 2019-2023
Publications (10 Years): 14
Top Topics
E Learning
Malicious Nodes
Black Hole
Attack Detection
Top Venues
IEEE Internet Things J.
ISC
Future Gener. Comput. Syst.
Networking
</>
Publications
</>
Zuchao Ma
,
Liang Liu
,
Weizhi Meng
,
Xiapu Luo
,
Lisong Wang
,
Wenjuan Li
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J.
10 (14) (2023)
Lei Yang
,
Liang Liu
,
Zuchao Ma
,
Youwei Ding
Detection of selective-edge packet attack based on edge reputation in IoT networks.
Comput. Networks
188 (2021)
Liang Liu
,
Yiting Wang
,
Weizhi Meng
,
Zhe Xu
,
Wenzhao Gao
,
Zuchao Ma
Towards efficient and energy-aware query processing for industrial internet of things.
Peer-to-Peer Netw. Appl.
14 (6) (2021)
Mengqi Li
,
Liang Liu
,
Jie Xi
,
Zuchao Ma
,
Xiangyu Xu
,
Lisong Wang
ECTSA: An Efficient Charging Time Scheduling Algorithm for Wireless Rechargeable UAV Network.
Networking
(2021)
Lihong Fan
,
Liang Liu
,
Hang Gao
,
Zuchao Ma
,
Yuting Wu
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks.
Digit. Commun. Networks
7 (2) (2021)
Jingxiu Yang
,
Lu Zhou
,
Liang Liu
,
Zuchao Ma
ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network.
WASA (2)
(2021)
Liang Liu
,
Xiangyu Xu
,
Yulei Liu
,
Zuchao Ma
,
Jianfei Peng
A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network.
IEEE Internet Things J.
8 (20) (2021)
Yiming Xiao
,
Liang Liu
,
Zuchao Ma
,
Zijie Wang
,
Weizhi Meng
Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing.
Trans. Emerg. Telecommun. Technol.
32 (9) (2021)
Shanshan Sun
,
Zuchao Ma
,
Liang Liu
,
Hang Gao
,
Jianfei Peng
Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms.
MSN
(2020)
Zuchao Ma
,
Liang Liu
,
Weizhi Meng
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks.
ISC
(2020)
Zuchao Ma
,
Liang Liu
,
Weizhi Meng
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Comput. Secur.
96 (2020)
Zuchao Ma
,
Liang Liu
,
Weizhi Meng
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
ACISP
(2020)
Liang Liu
,
Zhaoyang Han
,
Liming Fang
,
Zuchao Ma
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves.
Sensors
19 (3) (2019)
Liang Liu
,
Zuchao Ma
,
Weizhi Meng
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Future Gener. Comput. Syst.
101 (2019)