Journal Articles Conference Papers Google Scholar Citations

Research and Education Interests

My current research interests cover the security of information and intelligent systems (such as wireless networks, IoT, and cloud computing), smartphone based applications (such as smart health and care), and effective education of cybersecurity (Eureka Labs) and artificial intelligence (AI) to computer science and STEM majors.

 

Grants

  1. Fire and ICE: Raising Security Awareness through Experiential Learning Activities for Building Trustworthy Deep Learning-based Applications. (NSF-SaTC, PI, In-Progress).
  2. Advancing Cybersecurity Learning through Inquiry-based Laboratories on a Container-based Virtualization Platform. (NSF-SaTC, PI, Completed).
  3. Enhancing Mobile Security Education by Creating Eureka Experiences. (NSF-CyberTraining, PI, Completed).
  4. A Social and Context Aware Spectrum Management Framework for Heterogeneous Cognitive Radio Networks. (NSF-CNS, PI, Completed).

Publications

Selected Journal Articles

  1. Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang ``Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help students understand AI and Cybersecurity,'' Journal of Cybersecurity Education, Research and Practice, Nov. 2023. [link]
  2. Tianhui Zhang, Yan Huo, Qinghe Gao, Liran Ma, Yue Wu, Rayna Li, ``Cooperative Physical Layer Authentication with Reputation-inspired Collaborator Selection,'' IEEE Internet of Things Journal, Aug. 2023. [link]
  3. Jian Mao, Qixiao Lin, Shishi Zhu, Liran Ma, Jianwei Liu, ``SmartTracer: Anomaly-driven Provenance Analysis based on Device Correlation in Smart Home Systems,'' IEEE Internet of Things Journal, Aug. 2023. [link]
  4. Tianhui Zhang, Yan Huo, Liran Ma, Ela Guo, ``Distributed Physical Layer Authentication: Overview and Opportunities,'' IEEE Communications Magazine, April 2023. [link].
  5. Jialing He, Zijian Zhang, Liran Ma, Zhouyu Zhang, Meng Li, Bakh Khoussainov, Jiamou Liu, Liehuang Zhu, ``InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring through Self-Attention Mechanisms,'' IEEE Transactions on Smart Grid, Jan. 2023. [link]
  6. Jian Mao, Xiaohe Xu, Qixiao Lin, Liran Ma, Jianwei Liu, ``EScope: Effective event validation for IoT systems based on state correlation,'' Big Data Mining and Analytics, Jan. 2023. [link].
  7. Hao Yin, Zijian Zhang, Jialing He, Liran Ma, Liehuang Zhu, Meng Li, and Bakh Khoussainov, ``Proof of Continuous Work for Reliable Data Storage over Permissionless Blockchain,'' IEEE Internet of Things Journal, Vol. 9, Issue 10, May 2022, pp. 7866 - 7875. [link]
  8. Jialing He, Zijian Zhang, Jian Mao, Liran Ma, Bakh Khoussainov, Rui Jin, and Liehuang Zhu, ``Video Aficionado: We Know What You Are Watching,'' IEEE Transactions on Mobile Computing, December 2020. [link]
  9. Shengling Wang, Weiman Sun, Liran Ma, Weifeng Lv, and Xiuzhen Cheng, ``Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services,'' IEEE Transactions on Parallel and Distributed Systems, Vol. 31, Issue 1, Jan. 2020, pp. 159-170. [link]
  10. Qinghe Gao, Yan Huo, Tao Jing, Liran Ma, Yingkun Wen, and Xiaoshuang Xing, ``An Intermittent Cooperative Jamming Strategy for Securing Energy-constrained Networks,'' IEEE Transactions on Communications, Vol. 67, Issue 11, Nov. 2019, pp. 7715-7726. [link]
  11. Qin Hu, Shengling Wang, Xiuzhen Cheng, Liran Ma, and Rongfang Bie, ``Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies'', IEEE Transactions on Information Forensics and Security, Vol. 15, Oct. 2019, pp. 1778 - 1789. [link]
  12. Yue Wu, Fan Li, Liran Ma, Yadong Xie, Ting Li, and Yu Wang, ``A Context-Aware Multi-Armed Bandit Incentive Mechanism for Mobile Crowd Sensing Systems,'' IEEE Internet of Things Journal, Vol. 6, Issue 5, Oct. 2019, pp. 7648-7658. [link]
  13. Yan Huo, Xin Fan, Liran Ma, Xiuzhen Cheng, Zhi Tian, and Dechang Chen, ``Secure Communications in Tiered 5G Wireless Networks with Cooperative Jamming,'' IEEE Transactions on Wireless Communications, Vol. 18, Issue 6, June 2019, pp. 3265-3280. [link]
  14. Yingkun Wen, Yan Huo, Liran Ma, Tao Jing, and Qinghe Gao, ``A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks,'' IEEE Transactions on Vehicular Technology, Vol. 68 , Issue 4, April 2019, pp. 3500-3512. [link]
  15. Yan Huo, Yuqi Tian, Liran Ma, Xiuzhen Cheng, and Tao Jing, ``Jamming Strategies for Physical Layer Security,'' IEEE Wireless Communications, Vol. 25, Issue 1, February 2018, pp. 148-153. [link]
  16. Yan Huo, Lingling Liu, Liran Ma, Wei Zhou, Xiuzhen Cheng, Tao Jing, and Xiaobing Jiang, ``Coalition Formation Game based Relay Selection Scheme for Cooperative Cognitive Radio Networks,'' ACM/Springer Wireless Networks, Vol. 23, Issue 8, 2017, pp. 2533-2544. [link]
  17. Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, and Biao Chen, "A Time Fairness Based MAC Algorithm for Throughput Maximization in 802.11 Networks," IEEE Transactions on Computers , Vol. 64, No. 1, January 2015, pp. 19-31. [link]
  18. Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, and Xicheng Lu, ``3D Underwater Sensor Network Localization,'' IEEE Transactions on Mobile Computing, Vol. 8, December 2009, pp. 1610-1621.
  19. Yanxia Rong, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, and Hyeong-Ah Choi, ``A Novel Rate Adaptation Scheme for 802.11 Networks,'' IEEE Transactions on Wireless Communications, Vol. 8, No. 2, February 2009, pp. 862-870.
  20. Fang Liu, Xiuzhen Cheng, Liran Ma, and Kai Xing, ``SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks,'' IEEE Transactions on Mobile Computing, Vol. 7, No. 7, July 2008, pp. 858-868.
  21. Liran Ma, Qian Zhang, and Xiuzhen Cheng, ``A Power Controlled Interference Aware Routing Protocol for Dense Multi-hop Wireless Networks,'' ACM/Springer Wireless Networks , Vol. 14, April 2008, pp. 247-257.
  22. Liran Ma, Xiuzhen Cheng, Fang Liu, Major J. Rivera, and Fengguang An, ``iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks,'' IEEE Transactions on Parallel and Distributed Systems, Vol 18, August 2007, pp. 1174-1184.

Selected Conference Papers

  1. Tao Jing, Lingling Tan, Qinghe Gao, Yingzhen Wu, Xuehan Li, Yan Huo, and Liran Ma, ``Peak Age of Information Minimization for Integrated Sensing, Communication and Computation in IoV,'' The 20th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'23), Sep. 2023. [link]
  2. Curby Alexander, Liran Ma, Zhipeng Cai, and Wei Cheng, ``Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities,'' The 5th IEEE International Conference on Smart City Innovations, Atlanta, GA, Oct. 2021. [link]
  3. Kien X. Nguyen, Phuc Ly, Cuiling Gong, and Liran Ma, ``An Efficient Low-cost Notification System using AWS IoT,'' Proc. SPIE. 11730, Big Data III: Learning, Analytics, and Applications, April 2021. [link]
  4. Ze-Li Dou, Liran Ma, Khiem Nguyen, and Kien X. Nguyen, ``Paradox of AlphaZero: Strategic vs. Optimal Plays,'' The 39th IEEE International Performance Computing and Communications Conference (IPCCC'20), Austin, Texas, Nov. 2020. [link]
  5. Linyan Xu, Zhangjie Fu, and Liran Ma, ``An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring,'' The 14th International Conference on Wireless Algorithms, Systems, and Applications (WASA'19), Honolulu, HI, June 2019. [link]
  6. Blake Lucas and Liran Ma, ``Spark: A Smart Parking Lot Monitoring System,'' The 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA'18), Tianjin, China, June 2018. [link]
  7. Shengling Wang, Jianhui Huang, Luyun Li, Liran Ma, and Xiuzhen Cheng, ``Quantum Game Analysis of Privacy-Leakage for Application Ecosystems,'' ACM MobiHoc 2017, IIT Madras, Chennai, India, July 2017. [link]
  8. Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, and Xiuzhen Cheng, ``Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy,'' IEEE ICDCS 2017, Atlanta, GA, June 2017. [link]
  9. Chunchi Liu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie, and Jiguo Yu, ``Mechanism Design Games for Thwarting Malicious Behavior in Crowdsourcing,'' IEEE INFOCOM 2017, Atlanta, GA, May 2017. [link]
  10. Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, and Liping Feng, ``An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids,'' WASA 2017, Guilin, China, June 2017. [link]
  11. Qinghe Gao, Yan Huo, Liran Ma, Xiaoshuang Xing, Xiuzhen Cheng, Tao Jing, and Hang Liu, ``Optimal Stopping Theory based Jammer Selection for Securing Cooperative Cognitive Radio Networks,'' IEEE Globecom 2016, Washington, D.C., Dec. 2016. [link]
  12. Blake Lucas, Liran Ma, and Dechang Chen, ``iBeaconing: A Low-Cost Protection System for Schools with Autistic Students,'' WASA 2016, Bozeman, Montana, Aug. 2016. [link]
  13. Xiang Tian, Jiguo Yu, Liran Ma, Guangshun Li, and Xiuzhen Cheng, ``Distributed Deterministic Broadcasting Algorithms under the SINR Model,'' IEEE INFOCOM 2016, San Francisco, CA, April 2016.
  14. Kathryn Grebel, Duy Dang, Liran Ma, Donnell Payne, and Brenton Cooper, ``iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired,'' WASA 2015, Qufu, China, Aug., 2015.
  15. Bowu Zhang, Jinho Hwang, Liran Ma, and Timothy Wood, ``Towards Security-Aware Virtual Server Migration Optimization to the Cloud,'' The 12th IEEE International Conference on Autonomic Computing, Grenoble, France, July, 2015.
  16. Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, and Biao Chen, ``Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs,'' IEEE INFOCOM 2012, Orlando, FL, March 25-30, 2012, pp. 2911-2915.
  17. Liran Ma, ``A Novel Free-Rider Detection Scheme for IEEE 802.11 Wireless Networks,'' IEEE GLOBECOM 2011, Houston, TX, Dec, 2011, pp.1-5.
  18. Liran Ma, Amin Y. Teymorian, and Xiuzhen Cheng, ``A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks,'' IEEE INFOCOM 2008, Phoenix, Arizona, 13-18 April 2008, pp.1220-1228.
  19. Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu, ``Underwater Localization in Sparse 3D Acoustic Sensor Networks,'' IEEE INFOCOM 2008, Phoenix, Arizona, 13-18 April 2008, pp.236-240.
  20. Liran Ma, Amin Y. Teymorian, and Xiuzhen Cheng, ``Passive Listening and Intrusion Management in Commodity Wi-Fi Networks,'' IEEE GLOBECOM 2007, Washington, DC, November 2007, pp. 327-331. (Best Paper Award)
  21. Liran Ma, Qian Zhang, Yongqiang Xiong, and Wenwu Zhu, ``An Interference Aware Metric for Dense Multi-hop Wireless Networks,'' IEEE ICC 2005, May 2005, Seoul, Korea, pp. 1261-1265.