Follow
Chris Ma
Chris Ma
Hang Seng University of Hong Kong
Verified email at hsu.edu.hk
Title
Cited by
Cited by
Year
Privacy vulnerability of published anonymous mobility traces
CYT Ma, DKY Yau, NK Yip, NSV Rao
Proceedings of the sixteenth annual international conference on Mobile …, 2010
3192010
Markov game analysis for attack-defense of power networks under possible misinformation
CYT Ma, DKY Yau, X Lou, NSV Rao
IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012
1332012
Accurate localization of low-level radioactive source under noise and measurement errors
JC Chin, DKY Yau, NSV Rao, Y Yang, CYT Ma, M Shankar
Proceedings of the 6th ACM conference on Embedded network sensor systems …, 2008
922008
Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models
NSV Rao, SW Poole, CYT Ma, F He, J Zhuang, DKY Yau
Risk Analysis 36 (4), 694-710, 2016
792016
A game theoretic study of attack and defense in cyber-physical systems
CYT Ma, NSV Rao, DKY Yau
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
562011
Scalable solutions of Markov games for smart-grid infrastructure protection
CYT Ma, DKY Yau, NSV Rao
IEEE Transactions on Smart Grid 4 (1), 47-55, 2013
532013
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering
J Won, CYT Ma, DKY Yau, NSV Rao
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2804-2812, 2014
502014
Localization under random measurements with application to radiation sources
NSV Rao, M Shankar, JC Chin, DKY Yau, CYT Ma, Y Yang, JC Hou, X Xu, ...
2008 11th International Conference on Information Fusion, 1-8, 2008
482008
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage
DKY Yau, NK Yip, CYT Ma, NSV Rao, M Shankar
ACM Transactions on Sensor Networks (TOSN) 7 (2), 1-49, 2010
472010
Detection of intelligent mobile target in a mobile sensor network
JC Chin, Y Dong, WK Hon, CYT Ma, DKY Yau
IEEE/ACM transactions on networking 18 (1), 41-52, 2009
412009
Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach
J Won, CYT Ma, DKY Yau, NSV Rao
IEEE/ACM Transactions on Networking 24 (3), 1661-1674, 2015
352015
An experimental low-cost, low-data-rate rapid structural assessment network
JC Chin, JM Rautenberg, CYT Ma, S Pujol, DKY Yau
IEEE Sensors Journal 9 (11), 1361-1369, 2009
352009
Cloud computing infrastructure robustness: A game theory approach
NSV Rao, SW Poole, F He, J Zhuang, CYT Ma, DKY Yau
2012 International Conference on Computing, Networking and Communications …, 2012
272012
Matching and fairness in threat-based mobile sensor coverage
CYT Ma, DKY Yau, J Chin, NSV Rao, M Shankar
IEEE transactions on mobile computing 8 (12), 1649-1662, 2009
262009
Improved SPRT detection using localization with application to radiation sources
NSV Rao, CW Glover, M Shankar, Y Yang, JC Chin, DKY Yau, CYT Ma, ...
2009 12th International Conference on Information Fusion, 633-640, 2009
232009
On resilience of cyber-physical infrastructures using discrete product-form games
NSV Rao, CYT Ma, U Shah, J Zhuang, F He, DKY Yau
2015 18th International Conference on Information Fusion (Fusion), 1451-1458, 2015
202015
On information-theoretic measures for quantifying privacy protection of time-series data
CYT Ma, DKY Yau
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
202015
Game-theoretic resilience analysis of cyber-physical systems
F He, J Zhuang, NSV Rao, CYT Ma, DKY Yau
2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks …, 2013
202013
Stochastic steepest descent optimization of multiple-objective mobile sensor coverage
CYT Ma, DKY Yau, NK Yip, NSV Rao, J Chen
IEEE Transactions on Vehicular Technology 61 (4), 1810-1822, 2012
182012
Coverage in wireless sensor networks
JC Hou, DKY Yau, CYT Ma, Y Yang, H Zhang, IH Hou, NSV Rao, ...
Guide to Wireless Sensor Networks, 47-79, 2009
172009
The system can't perform the operation now. Try again later.
Articles 1–20