Follow
Chris Ma
Chris Ma
Hang Seng University of Hong Kong
Verified email at hsu.edu.hk
Title
Cited by
Cited by
Year
Privacy vulnerability of published anonymous mobility traces
CYT Ma, DKY Yau, NK Yip, NSV Rao
Proceedings of the sixteenth annual international conference on Mobile …, 2010
3112010
Markov game analysis for attack-defense of power networks under possible misinformation
CYT Ma, DKY Yau, X Lou, NSV Rao
IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012
1282012
Accurate localization of low-level radioactive source under noise and measurement errors
JC Chin, DKY Yau, NSV Rao, Y Yang, CYT Ma, M Shankar
Proceedings of the 6th ACM conference on Embedded network sensor systems …, 2008
912008
Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models
NSV Rao, SW Poole, CYT Ma, F He, J Zhuang, DKY Yau
Risk Analysis 36 (4), 694-710, 2016
752016
A game theoretic study of attack and defense in cyber-physical systems
CYT Ma, NSV Rao, DKY Yau
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
532011
Scalable solutions of Markov games for smart-grid infrastructure protection
CYT Ma, DKY Yau, NSV Rao
IEEE Transactions on Smart Grid 4 (1), 47-55, 2013
492013
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering
J Won, CYT Ma, DKY Yau, NSV Rao
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2804-2812, 2014
482014
Localization under random measurements with application to radiation sources
NSV Rao, M Shankar, JC Chin, DKY Yau, CYT Ma, Y Yang, JC Hou, X Xu, ...
2008 11th International Conference on Information Fusion, 1-8, 2008
472008
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage
DKY Yau, NK Yip, CYT Ma, NSV Rao, M Shankar
ACM Transactions on Sensor Networks (TOSN) 7 (2), 1-49, 2010
442010
Detection of intelligent mobile target in a mobile sensor network
JC Chin, Y Dong, WK Hon, CYT Ma, DKY Yau
IEEE/ACM transactions on networking 18 (1), 41-52, 2009
422009
Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach
J Won, CYT Ma, DKY Yau, NSV Rao
IEEE/ACM Transactions on Networking 24 (3), 1661-1674, 2015
332015
An experimental low-cost, low-data-rate rapid structural assessment network
JC Chin, JM Rautenberg, CYT Ma, S Pujol, DKY Yau
IEEE Sensors Journal 9 (11), 1361-1369, 2009
332009
Cloud computing infrastructure robustness: A game theory approach
NSV Rao, SW Poole, F He, J Zhuang, CYT Ma, DKY Yau
2012 International Conference on Computing, Networking and Communications …, 2012
272012
Matching and fairness in threat-based mobile sensor coverage
CYT Ma, DKY Yau, J Chin, NSV Rao, M Shankar
IEEE transactions on mobile computing 8 (12), 1649-1662, 2009
272009
Improved SPRT detection using localization with application to radiation sources
NSV Rao, CW Glover, M Shankar, Y Yang, JC Chin, DKY Yau, CYT Ma, ...
2009 12th International Conference on Information Fusion, 633-640, 2009
232009
On resilience of cyber-physical infrastructures using discrete product-form games
NSV Rao, CYT Ma, U Shah, J Zhuang, F He, DKY Yau
2015 18th International Conference on Information Fusion (Fusion), 1451-1458, 2015
202015
Game-theoretic resilience analysis of cyber-physical systems
F He, J Zhuang, NSV Rao, CYT Ma, DKY Yau
2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks …, 2013
202013
Stochastic steepest descent optimization of multiple-objective mobile sensor coverage
CYT Ma, DKY Yau, NK Yip, NSV Rao, J Chen
IEEE Transactions on Vehicular Technology 61 (4), 1810-1822, 2012
192012
On information-theoretic measures for quantifying privacy protection of time-series data
CYT Ma, DKY Yau
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Cyber-physical correlations for infrastructure resilience: A game-theoretic approach
NSV Rao, CYT Ma, F He, J Zhuang, DKY Yau
17th International Conference on Information Fusion (FUSION), 1-8, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20