default search action
Wenping Ma 0002
Person information
- affiliation (PhD 1999): Xidian University, State Key Laboratory of Integrated Service Networks (ISN), Xi'an, China
- not to be confused with: Wenping Ma 0001
Other persons with the same name
- Wenping Ma — disambiguation page
- Wenping Ma 0001 — Xidian University, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Kun Yan, Wenping Ma, Qi Yang, Shaohui Sun, Weiwei Wang:
Info-Chain: Reputation-Based Blockchain for Secure Information Sharing in 6G Intelligent Transportation Systems. IEEE Internet Things J. 11(5): 9198-9212 (2024) - [c13]Pei He, Licheng Jiao, Lingling Li, Xu Liu, Fang Liu, Wenping Ma, Shuyuan Yang, Ronghua Shang:
Domain Generalization-Aware Uncertainty Introspective Learning for 3D Point Clouds Segmentation. ACM Multimedia 2024: 651-660 - 2023
- [j56]Qizheng Wang, Wenping Ma, Weiwei Wang:
B-LNN: Inference-time linear model for secure neural network inference. Inf. Sci. 638: 118966 (2023) - [j55]Kun Yan, Ping Zeng, Kan Wang, Wenping Ma, Geng Zhao, Yingjie Ma:
Reputation Consensus-Based Scheme for Information Sharing in Internet of Vehicles. IEEE Trans. Veh. Technol. 72(10): 13631-13636 (2023) - 2022
- [j54]Ge Liu, Wenping Ma:
A quantum artificial neural network for stock closing price prediction. Inf. Sci. 598: 75-85 (2022) - 2021
- [j53]Wei Luo, Wenping Ma, Juntao Gao:
MHB*T based dynamic data integrity auditing in cloud storage. Clust. Comput. 24(3): 2115-2132 (2021) - [j52]Hui Han, Jianjun Mu, Yu-Cheng He, Xiaopeng Jiao, Wenping Ma:
Rate-Improved Permutation Codes for Correcting a Single Burst of Deletions. IEEE Commun. Lett. 25(1): 49-53 (2021) - [j51]Hao Cao, Wenping Ma, Liangdong Lu, Ge Liu, Xiaoxue Liu, Wen-Yang Sun:
Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment". Inf. Sci. 543: 106-111 (2021) - [j50]Qizheng Wang, Wenping Ma, Ge Liu:
SieveNet: Decoupling activation function neural network for privacy-preserving deep learning. Inf. Sci. 573: 262-278 (2021) - 2020
- [j49]Hui Han, Jianjun Mu, Yu-Cheng He, Xiaopeng Jiao, Wenping Ma:
Multi-Permutation Codes Correcting a Single Burst Unstable Deletions in Flash Memory. IEEE Commun. Lett. 24(4): 720-724 (2020) - [j48]Huili Wang, Wenping Ma, Lang Liao, Yushan Li, Linfeng Zheng:
Impossible Differential Distinguishers of Two Generalized Feistel Structures. Secur. Commun. Networks 2020: 8828504:1-8828504:9 (2020) - [i6]Liangdong Lu, Wenping Ma, Ruihu Li, Hao Cao:
Two families of Entanglement-assisted Quantum MDS Codes from cyclic Codes. CoRR abs/2011.12232 (2020) - [i5]Liangdong Lu, Ruihu Li, Qiang Fu, Chen Xuan, Wenping Ma:
Optimal Ternary Linear Complementary Dual Codes. CoRR abs/2012.12093 (2020) - [i4]Qizheng Wang, Wenping Ma, Jie Li, Ge Liu:
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference. IACR Cryptol. ePrint Arch. 2020: 961 (2020)
2010 – 2019
- 2019
- [j47]Xiaoxue Liu, Wenping Ma, Hao Cao:
MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture. IEEE Access 7: 149282-149298 (2019) - [j46]Wei Luo, Wenping Ma:
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. Clust. Comput. 22(2): 541-551 (2019) - [j45]Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
Lossy trapdoor functions based on the PLWE. Clust. Comput. 22(Supplement): 5647-5654 (2019) - [j44]Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
A new method of generating hard random lattices with short bases. EURASIP J. Inf. Secur. 2019: 8 (2019) - [j43]Chengli Zhang, Wenping Ma, Feifei Zhao:
Trapdoor function based on the Ring-LWE and applications in communications. J. Ambient Intell. Humaniz. Comput. 10(5): 1821-1827 (2019) - [j42]Xiaoxue Liu, Wenping Ma, Hao Cao:
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture. J. Medical Syst. 43(10): 318:1-318:16 (2019) - [j41]Jiaojiao Zhao, Wenping Ma, Wei Luo, Xiaoxue Liu:
基于密钥共享的分层混合认证模型 (Hierarchical Hybrid Authentication Model Based on Key Sharing). 计算机科学 46(2): 115-119 (2019) - [j40]Tong Wang, Wenping Ma, Wei Luo:
基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain). 计算机科学 46(9): 162-168 (2019) - [j39]YeFeng He, Wenping Ma:
Multiparty quantum secure direct communication immune to collective noise. Quantum Inf. Process. 18(1): 4 (2019) - [j38]Hao Cao, Wenping Ma, Liangdong Lu, YeFeng He, Ge Liu:
Multi-party quantum privacy comparison of size based on d-level GHZ states. Quantum Inf. Process. 18(9): 287 (2019) - [c12]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c11]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - [c10]Pengfei Huang, Handing Wang, Wenping Ma:
Stochastic Ranking for Offline Data-Driven Evolutionary Optimization Using Radial Basis Function Networks with Multiple Kernels. SSCI 2019: 2050-2057 - [i3]Liangdong Lu, Wenping Ma, Luobin Guo:
Two families of Entanglement-assisted quantum MDS codes from constacyclic codes. CoRR abs/1912.12031 (2019) - 2018
- [j37]Feifei Zhao, Wenping Ma, Momiao Zhou, Chengli Zhang:
A Graph-Based QoS-Aware Resource Management Scheme for OFDMA Femtocell Networks. IEEE Access 6: 1870-1881 (2018) - [j36]Hao Cao, Wenping Ma:
Verifiable Threshold Quantum State Sharing Scheme. IEEE Access 6: 10453-10457 (2018) - [j35]Xiaoxue Liu, Wenping Ma:
ETAP: Energy-Efficient and Traceable Authentication Protocol in Mobile Medical Cloud Architecture. IEEE Access 6: 33513-33528 (2018) - [j34]Wei Luo, Wenping Ma:
Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing. IEEE Access 6: 40420-40428 (2018) - [j33]Qiang Gao, Wenping Ma, Wei Luo:
Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Networks 73: 40-50 (2018) - [j32]Liangdong Lu, Wenping Ma, Ruihu Li, Yuena Ma, Yang Liu, Hao Cao:
Entanglement-assisted quantum MDS codes from constacyclic codes with large minimum distance. Finite Fields Their Appl. 53: 309-325 (2018) - [j31]Qiang Gao, Wenping Ma, Wei Luo, Feifei Zhao:
Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 157-159 (2018) - [j30]Feifei Zhao, Wenping Ma, Momiao Zhou, Chengli Zhang:
Hybrid of Downlink and Uplink Transmission for Small Cell Networks with Interference Alignment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 988-991 (2018) - [j29]Lianfei Luo, Wenping Ma, Feifei Zhao:
Binary Sequence Pairs of Period pm-1 with Optimal Three-Level Correlation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(8): 1263-1266 (2018) - [j28]Xiaoxue Liu, Wenping Ma:
CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS. J. Medical Syst. 42(8): 135:1-135:15 (2018) - [j27]Yanrong Xie, Wenping Ma, Wei Luo:
一种新的信息服务实体跨域认证模型 (New Cross-domain Authentication Model for Information Services Entity). 计算机科学 45(9): 177-182 (2018) - [j26]Feifei Zhao, Wenping Ma, Momiao Zhou, Chengli Zhang:
A two-timescale graph-based resource allocation scheme combing dynamic eICIC in Heterogeneous Networks. Phys. Commun. 29: 191-202 (2018) - [j25]Hao Cao, Wenping Ma:
Multi-party traveling-mode quantum key agreement protocols immune to collusive attack. Quantum Inf. Process. 17(9): 219 (2018) - [j24]Hao Cao, Wenping Ma:
Comment on "A novel quantum deniable authentication protocol without entanglement". Quantum Inf. Process. 17(11): 289 (2018) - [j23]Chen Li, Wenping Ma:
Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys". IEEE Trans. Inf. Forensics Secur. 13(10): 2668-2669 (2018) - [c9]Wei Luo, Wenping Ma:
A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage. ICCCS (2) 2018: 519-530 - [i2]Liangdong Lu, Wenping Ma, Ruihu Li, Yuena Ma, Yang Liu, Hao Cao:
Entanglement-assisted quantum MDS codes from constacyclic codes with large minimum distance. CoRR abs/1803.04168 (2018) - [i1]Liangdong Lu, Wenping Ma, Ruihu Li, Yuena Ma, Luobin Guo:
New Quantum MDS codes constructed from Constacyclic codes. CoRR abs/1803.07927 (2018) - 2017
- [j22]Xiaopeng Yang, Wenping Ma, Chengli Zhang:
Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices. Int. J. Comput. Math. 94(5): 866-883 (2017) - [j21]YeFeng He, Wenping Ma:
Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16(10): 252 (2017) - [j20]Qiang Gao, Wenping Ma, Wei Luo:
A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks. Wirel. Pers. Commun. 96(2): 2179-2204 (2017) - 2016
- [j19]YeFeng He, Wenping Ma:
Two-party quantum key agreement against collective noise. Quantum Inf. Process. 15(12): 5023-5035 (2016) - [j18]Wei Luo, Wenping Ma, Qiang Gao:
A dynamic trust management system for wireless sensor networks. Secur. Commun. Networks 9(7): 613-621 (2016) - 2015
- [j17]YeFeng He, Wenping Ma:
On Hyperbent Functions and Semibent Functions with Dillon-Like Exponents. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6): 1266-1275 (2015) - [j16]Yinfang Hong, Hui Li, Wenping Ma, Xinmei Wang:
Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing. IEICE Trans. Commun. 98-B(9): 1824-1831 (2015) - [j15]YeFeng He, Wenping Ma:
Quantum key agreement protocols with four-qubit cluster states. Quantum Inf. Process. 14(9): 3483-3498 (2015) - [j14]Xiaopeng Yang, Wenping Ma, Chengli Zhang:
Group authenticated key exchange schemes via learning with errors. Secur. Commun. Networks 8(17): 3142-3156 (2015) - 2014
- [j13]Wenping Ma, Chun'e Zhao, Dongsu Shen:
New optimal constructions of conflict-avoiding codes of odd length and weight 3. Des. Codes Cryptogr. 73(3): 791-804 (2014) - [j12]Ruochen Liu, Fei He, Jing Liu, Wenping Ma, Yangyang Li:
A point symmetry-based clonal selection clustering algorithm and its application in image compression. Pattern Anal. Appl. 17(3): 633-654 (2014) - [j11]Dong-Su Shen, Wenping Ma, Lili Wang:
Two-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 13(10): 2313-2324 (2014) - [c8]Jianshe Wu, Lin Yuan, Qingliang Gong, Wenping Ma, Jingjing Ma, Yangyang Li:
A compression optimization algorithm for community detection. IEEE Congress on Evolutionary Computation 2014: 667-671 - [c7]Tuo He, Maode Ma, Wenping Ma, Bingsheng He:
A novel authenticated multi-party key agreement for private cloud. ICC 2014: 3776-3781 - [c6]Shuyuan Yang, Bin Li, Min Wang, Wenping Ma:
Compressive Direction-of-Arrival Estimation via Regularized Multiple Measurement FOCUSS algorithm. IJCNN 2014: 2800-2803 - 2013
- [j10]Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao:
Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 363-366 (2013) - [j9]Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao:
Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(5): 1001-1005 (2013) - [j8]Chun'e Zhao, Wenping Ma, Tongjiang Yan, Yuhua Sun:
Autocorrelation Values of Generalized Cyclotomic Sequences of Order Six. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2045-2048 (2013) - [j7]Xunru Yin, Wenping Ma, Wei-yan Liu, Dong-Su Shen:
Efficient bidirectional quantum secure communication with two-photon entanglement. Quantum Inf. Process. 12(9): 3093-3102 (2013) - 2012
- [j6]YeFeng He, Wenping Ma, Parminder Kang:
On semi-bent functions with Niho exponents. Sci. China Inf. Sci. 55(7): 1624-1630 (2012) - [j5]Jianfa Qian, Wenping Ma:
Secret Sharing Schemes from Linear Codes over Finite Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1193-1196 (2012) - [c5]Wenping Ma, Yuanyuan Huang, Congling Li, Jing Liu:
Image segmentation based on a hybrid Immune Memetic Algorithm. IEEE Congress on Evolutionary Computation 2012: 1-8 - 2011
- [j4]Sheng Gao, Wenping Ma, Zepeng Zhuo, Fenghe Wang:
On cross-correlation indicators of an S-box. Frontiers Comput. Sci. China 5(4): 448-453 (2011) - [j3]YeFeng He, Wenping Ma:
On Balanced Semi-Bent Functions with High Algebraic Degrees. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(3): 1019-1022 (2011) - [c4]Xunru Yin, Wenping Ma:
Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2. TrustCom 2011: 897-899 - 2010
- [j2]Wenping Ma, YeFeng He, Shaohui Sun:
The Extended FDH Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 336-338 (2010) - [j1]Yuanyuan Yang, Wenping Ma, Weibo Liu, Qi Jiang:
Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1837-1839 (2010)
2000 – 2009
- 2007
- [c3]Chen Yang, Wenping Ma, Xinmei Wang:
Novel Remote User Authentication Scheme Using Bilinear Pairings. ATC 2007: 306-312 - 2006
- [c2]Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang:
A New ID-Based Broadcast Encryption Scheme. ATC 2006: 487-492 - 2005
- [c1]Wenping Ma, Fu Tai Zhang:
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. CISC 2005: 384-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint