A survey on security aspects for LTE and LTE-A networks J Cao, M Ma, H Li, Y Zhang, Z Luo IEEE communications surveys & tutorials 16 (1), 283-302, 2013 | 383 | 2013 |
A survey on MAC protocols for underwater wireless sensor networks K Chen, M Ma, E Cheng, F Yuan, W Su IEEE Communications Surveys & Tutorials 16 (3), 1433-1447, 2014 | 328 | 2014 |
A bandwidth guaranteed polling MAC protocol for Ethernet passive optical networks M Ma, Y Zhu, TH Cheng IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 273 | 2003 |
Smart healthcare in smart cities: wireless patient monitoring system using IoT M Poongodi, A Sharma, M Hamdi, M Maode, N Chilamkurti The Journal of Supercomputing, 1-26, 2021 | 269 | 2021 |
A survey on security aspects for 3GPP 5G networks J Cao, M Ma, H Li, R Ma, Y Sun, P Yu, L Xiong IEEE communications surveys & tutorials 22 (1), 170-195, 2019 | 262 | 2019 |
A strong user authentication scheme with smart cards for wireless communications D He, M Ma, Y Zhang, C Chen, J Bu Computer Communications 34 (3), 367-374, 2011 | 256 | 2011 |
Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds Y Yang, M Ma IEEE Transactions on Information Forensics and Security 11 (4), 746-759, 2015 | 255 | 2015 |
DDoS detection mechanism using trust-based evaluation system in VANET M Poongodi, M Hamdi, A Sharma, M Ma, PK Singh IEEE Access 7, 183532-183544, 2019 | 250 | 2019 |
Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics M Poongodi, V Vijayakumar, F Al-Turjman, M Hamdi, M Ma IEEE Access 7, 158481-158491, 2019 | 208 | 2019 |
Building an authentic and ethical keyword search by applying decentralised (Blockchain) verification M Poongodi, M Hamdi, V Varadarajan, BS Rawal, M Maode IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 180 | 2020 |
Machine learning algorithms with ROC curve for predicting and diagnosing the heart disease NB Muppalaneni, M Ma, S Gurumoorthy, R Kannan, V Vasanthi Soft computing and medical bioinformatics, 63-72, 2019 | 145 | 2019 |
AOA cooperative position localization J Xu, M Ma, CL Law IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 142 | 2008 |
Network lifetime optimization in wireless sensor networks H Wang, N Agoulmine, M Ma, Y Jin IEEE Journal on Selected Areas in Communications 28 (7), 1127-1137, 2010 | 135 | 2010 |
A simple and robust handover authentication between HeNB and eNB in LTE networks J Cao, H Li, M Ma, Y Zhang, C Lai Computer Networks 56 (8), 2119-2131, 2012 | 118 | 2012 |
Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network J Cao, P Yu, M Ma, W Gao IEEE Internet of Things Journal 6 (2), 1561-1575, 2018 | 115 | 2018 |
A hybrid load balancing strategy of sequential tasks for grid computing environments Y Li, Y Yang, M Ma, L Zhou Future Generation Computer Systems 25 (8), 819-828, 2009 | 112 | 2009 |
A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks Y Qiu, M Ma IEEE transactions on industrial informatics 12 (6), 2074-2085, 2016 | 105 | 2016 |
A clock synchronization method for molecular nanomachines in bionanosensor networks L Lin, C Yang, M Ma, S Ma, H Yan IEEE Sensors Journal 16 (19), 7194-7203, 2016 | 96 | 2016 |
Controller placement optimization in hierarchical distributed software defined vehicular networks KSK Liyanage, M Ma, PHJ Chong Computer Networks 135, 226-239, 2018 | 95 | 2018 |
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications H Guo, Y Wu, F Bao, H Chen, M Ma IEEE Transactions on Smart Grid 2 (4), 707-714, 2011 | 94 | 2011 |