Di Ma

ORCID: 0000-0001-7330-4716
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Energy Efficient Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Indoor and Outdoor Localization Technologies
  • User Authentication and Security Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • RFID technology advancements
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks
  • Chaos-based Image/Signal Encryption
  • Advanced Battery Materials and Technologies
  • Privacy, Security, and Data Protection
  • Cryptographic Implementations and Security
  • Quantum Information and Cryptography
  • Advancements in Battery Materials
  • Underwater Vehicles and Communication Systems
  • Advanced Steganography and Watermarking Techniques
  • Access Control and Trust
  • Advanced Authentication Protocols Security
  • Network Packet Processing and Optimization
  • IPv6, Mobility, Handover, Networks, Security

Chinese Academy of Medical Sciences & Peking Union Medical College
2023-2025

University of Michigan
2010-2025

Command Hospital
2025

University of Michigan–Dearborn
2015-2024

Northeast Electric Power University
2021-2024

Tongji Hospital
2016-2024

Huazhong University of Science and Technology
2010-2024

Jinan Institute of Quantum Technology
2023-2024

University of Science and Technology of China
2024

BGI Genomics
2024

Quantum key distribution (QKD) aims to generate secure private keys shared by two remote parties. With its security being protected principles of quantum mechanics, some technology challenges remain towards practical application QKD. The major one is the distance limit, which caused fact that a signal cannot be amplified while channel loss exponential with for photon transmission in optical fiber. Here using 3-intensity sending-or-not-sending protocol actively-odd-parity-pairing method, we...

10.1103/physrevlett.130.210801 article EN Physical Review Letters 2023-05-25

Data clustering is an important data mining technology that plays a crucial role in numerous scientific applications. However, it challenging due to the size of datasets has been growing rapidly extra-large scale real world. Meanwhile, MapReduce desirable parallel programming platform widely applied kinds process fields. In this paper, we propose efficient density-based algorithm and implement by 4-stages paradigm. Furthermore, adopt quick partitioning strategy for large non-indexed data. We...

10.1109/icpads.2011.83 article EN 2011-12-01

The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. ability to efficiently verify all (or some) log entries important any application employing techniques. In this article, we begin examining state of art in identify some problems inherent systems based on trusted third-party servers. We then propose a different approach upon recently developed Forward-Secure Sequential Aggregate (FssAgg) authentication Our offers...

10.1145/1502777.1502779 article EN ACM Transactions on Storage 2009-03-01

Nitrogen-doped carbon-covered Na3V2(PO4)2F3 (NVPF/C-PDPA) composites have been successfully prepared by self-polymerization of dopamine on the NVPF surface and subsequent sintering. The X-ray diffraction results show that NVPF/C-PDPA has good crystallinity introducing does not affect lattice structure NVPF. high-resolution transmission electron microscopy, high-angle annular dark-field images, energy dispersive spectroscopy analyses reveal particles are covered a complete uniform covering...

10.1021/acsami.8b10299 article EN ACS Applied Materials & Interfaces 2018-10-08

<title>ABSTRACT</title> <p>With recent advancements in the automotive world and introductions of autonomous vehicles, cybersecurity has become a main primary issue for every automaker. In order to come up with measures detect protect against malicious attacks, intrusion detection systems (IDS) are commonly used. These identify attacks while comparing normal behavior abnormalities. this paper, we propose novel, two-stage IDS based on deep-learning rule-based systems. The...

10.4271/2024-01-3688 article EN SAE technical papers on CD-ROM/SAE technical paper series 2024-11-15

Though representing a promising approach for personalization, targeting, and recommendation, aggregation of user profiles from multiple social networks will inevitably incur serious privacy leakage issue. In this paper, we propose Novel Heterogeneous De-anonymization Scheme (NHDS) aiming at de-anonymizing heterogeneous networks. NHDS first leverages the network graph structure to significantly reduce size candidate set, then exploits profile information identify correct mapping users with...

10.1109/tdsc.2017.2754249 article EN IEEE Transactions on Dependable and Secure Computing 2017-09-20

Global investment and recent advancements in vehicle automation are making autonomous cooperative automated driving (AD) a reality. Not only will vehicles incorporate more electronics connectivity than ever before, but also, notably, they transfer control responsibility of monitoring the environment from human driver to robotic system. While prior work has assessed provided security solutions for non-automated vehicles, there is much understand regarding implications AD. In this work, we...

10.1145/2994487.2994499 article EN 2016-10-28

10.1007/s10489-019-01436-1 article EN Applied Intelligence 2019-03-25

Layered LiNi1/3Co1/3Mn1/3O2 (NCM333) is successfully coated by fast ionic conductor LiTi2(PO4)3 (LTP) via a wet chemical method. The effects of LTP on the physicochemical properties and electrochemical performance are studied. results reveal that highly layered structure NCM333 can be well maintained with less cation mixing after coating. about 5 nm thickness surface NCM333. Such an coating layer effectively suppress side reactions between electrolyte but will not hinder lithium ion...

10.1021/acsami.7b19692 article EN ACS Applied Materials & Interfaces 2018-03-16

With recent advancements in the automotive world and introduction of autonomous vehicles, security has become a real important issue. Modern vehicles have tens Electronic Control Units (ECUs) connected to in-vehicle networks. As de facto standard for network communication, Controller Area Network (CAN) target cyber attacks. Anomaly-based Intrusion Detection System (IDS) is considered as an effective approach secure CAN detect malicious Currently, there are two primary approaches used...

10.1109/access.2022.3145007 article EN cc-by IEEE Access 2022-01-01

Wireless sensors are employed in a wide range of applications. One common feature many sensor settings is the need to communicate sensed data some collection point or sink. This communication can be direct (to mobile collector) indirect-via other towards remote In either case, might not able sink at will. Instead it collect and wait (for potentially long time) for signal upload accumulated directly. hostile setting, may compromised its post-compromise manipulated. important issue forward...

10.1109/sp.2007.18 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2007-05-01

With recent advances in technology, various wearable sensors have been developed for the monitoring of human physiological parameters. A Body Sensor Network (BSN) consisting such and biomedical sensor nodes placed on, near or within a body can be used real-time health monitoring. In this paper, we describe an on-going effort to develop system interconnected BSNs soldiers. We discuss background application scenario project. preliminary prototype present blast source localization application.

10.1109/bsn.2010.58 article EN 2010-06-01

Short-range wireless communication technologies have been used in many security-sensitive smartphone applications and services such as contactless micro payment device pairing. Typically, the data confidentiality of existing short-range systems relies on so-called "key-exchange then encryption" mechanism, which is inefficient, especially for short sessions. In this work, we present <formula formulatype="inline" xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/jiot.2014.2297998 article EN IEEE Internet of Things Journal 2014-01-31

10.1007/s11432-014-5147-z article EN Science China Information Sciences 2014-09-17

In this study, low cost anthracite-derived dual-phase carbon-coated Li3V2(PO4)3 composites have been successfully prepared via a traditional solid-phase method. XRD results show that the as-prepared samples high crystallinity and anthracite introduction has no influence on LVP crystal structure. The LVP/C particles are uniformly covered with carbon layer composed of amorphous graphitic carbon. effect amount battery performance as cathode material also studied. composite obtained 10 wt %...

10.1021/acsami.7b14117 article EN ACS Applied Materials & Interfaces 2017-11-20
Coming Soon ...