Selected IEEE Journal Publications:

1.        J. Liang and Maode Ma, “ECF-MRS: An Efficient and Collaborative Framework with Markov-based Reputation Scheme for IDSs in Vehicular Networks,” IEEE Transactions on Information Forensics and Security, accepted for publication.

2.        J. Liang and Maode Ma, “FS-MOEA: A Novel Feature Selection Algorithm for Intrusion Detection in Vehicular Ad Hoc Networks,” Transactions on Intelligent Transportation Systems, accepted for publication.

3.        Z. Shang, Maode Ma, and X. Li, “A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks,” IEEE Transactions on Wireless Communications, accepted for publication.

4.        J. Cao, Maode Ma, F. Li, and H. Li, “CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets,” IEEE Transactions on Dependable and Secure Computing, accepted for publication.

5.        J. Cao, Maode Ma, H. Li, R. Ma, Y. Sun, P. Yu, and L. Xiong, “A Survey on Security Aspects for 3GPP 5G Networks,” IEEE Communications Surveys and Tutorials, Vol. 22, No. 1, January 2020, pp. 170-195.

6.        K. L. K. Sudheera, Maode Ma and P. H. J. Chong, “Link Stability based Optimized Packet Routing Framework for Software Defined Vehicular Networks,” IEEE Transactions on Vehicular Technology, Vol. 68, No. 3, March 2019, pp. 2934- 2945.

7.        Q. Kong, R. Lu, Maode Ma, andH. Bao, “A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination,” IEEE Transactions on Vehicular Technology, Vol.  68, No. 2, February 2019, pp. 1877-1887.

8.        J. Cao, Maode Ma, and H. Li, “G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks,” IEEE Transactions on Vehicular Technology, Vol. 66, No. 11, November 2017, pp. 9689-9701.

9.        Y. Hou, J. Xu, W. Xian, Maode Ma, and J. Lei,” Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 27, No. 9, September 2017, pp. 2028-2040.

10.     L. Liu and Maode Ma, C. Liu, and Y. Shu, “Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks,” IEEE Transactions on Communications, Vol.65, No.5, May 2017, pp. 2141-2152.

11.     H. C. Tan, Maode Ma, H. Labiod, A. Boudguiga, J. Zhang, and H. J. Chong, “A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks,” IEEE Transactions on Vehicular Technology, Vol. 65, No. 12, December 2016, pp. 9570-9584.

12.     Y. Qiu and Maode Ma, “A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks,” IEEE Transactions on Industrial Informatics, Vol. 12, No. 6, December 2016, pp. 2074 – 2085.

13.     M. Minelli, Maode Ma, M. Coupechoux, J. Kelif, and P. Godlewski, “Uplink Energy-Delay Trade-off under Optimized Relay Placement in Cellular Networks,” IEEE Transactions on Mobile Computing, Vol. 15, No. 9, September 2016, pp. 2376-2387.

14.     M. Minelli, Maode Ma, M. Coupechoux, J. Kelif, and P. Godlewski, “Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks,” IEEE Transactions on Vehicular Technology, Vol. 65, No. 4, April 2016, pp. 2496-2508.

15.     Y. Yang and Maode Ma, “Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds,” IEEE Transactions on Information Forensics and Security, Vol.11, No.4, April 2016. pp. 746-59.

16.     B. Lian, G. Chen, Maode Ma, and J. Li, “Periodic K-Times Anonymous Authentication with Efficient Revocation of Violator’s Credential,” IEEE Transactions on Information Forensics & Security, Vol. 10, No.3, March 2015, pp 543-557.

17.     K. Chen, Maode Ma, E. Cheng, F. Yuan, and W. Su, “A Survey on MAC Protocols for Underwater Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, Vol. 16, No. 3, July 2014, pp.1433-1447.

18.     M. Minelli, Maode Ma, M. Coupechoux, J.-M. Kelif, M. Sigelle, and P. Godlewski, “Optimal Relay Placement in Cellular Networks,” IEEE Transactions on Wireless Communications, Vol. 13, No. 2, February 2014, pp. 998 – 1009.

19.     J. Cao, Maode Ma, H. Li, Y. Zhang, and Z. Luo, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE Communications Surveys and Tutorials, Vol. 16, No. 1, January 2014, pp. 283 – 302.

20.     J. Cao, Maode Ma, and H. Li, “A Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks,” IEEE Transactions on Wireless Communications, Vol. 11, No. 10, October 2012, pp. 3644-3650.

21.     B. Wang and Maode Ma,“A Server Independent Authentication Scheme for RFID Systems,” IEEE Transactions on Industrial Informatics, Vol. 8, No. 3, August 2012, pp. 689-696.

22.     T. N. Nguyen and Maode Ma, “Enhanced EAP-based Pre-authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks,” IEEE Transactions on Wireless Communications, Vol. 11, No. 6, June 2012, pp. 2173-2181.

23.     D. Ma and Maode Ma, “A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks,”IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 4, April 2012, pp. 598-606.

24.     H. Wang, N. Agoulmine, and Maode Ma, “Network Lifetime Optimization in Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, Vol. 28, No. 7, September 2010, pp. 1127 – 1137.

25.     D. He, L. Cui, H. Huang, and Maode Ma, “Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 7, July 2009, pp.1050-1058.

26.     J. Zheng and Maode Ma, “A Utility-Based Joint Power and Rate Adaptive Algorithm in Wireless Ad Hoc Networks,” IEEE Transaction of Communication, Vol. 57, No. 1, January 2009, pp. 134-140.

27.     H. Wang, Y. Yang, Maode Ma, J. He,and X. Wang, “Network Lifetime Maximization with Cross-layer Design in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 10, October 2008, pp. 3759- 3768.

28.     X. Huang and Maode Ma, “Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks,” IEEE Transaction of Communication, Vol. 56, No. 8, August 2008, pp. 1324-1330.

29.     Y. Zhu and Maode Ma, “IPACT with Grant Estimation (IPACT-GE) Scheme for Ethernet Passive Optical Networks,” IEEE/OSA Journal of Lightwave Technology, Vol. 26, Issue 14, July 2008, pp. 2055-2063.

30.     Y. Zhang, Maode Ma, and M. Fujise, “Call Completion in Wireless Network Over Lossy Link”, IEEE Transactions on Vehicular Technology, Vol. 56, No. 2, March 2007, pp. 929-941.

31.     X. Huang and Maode Ma, “An Efficient Scheduling Algorithm for Real-Time Traffic on WDM Passive Star Optical Networks,” IEEE/OSA Journal of Lightwave Technology, Vol. 23, No.11, November 2005, pp. 3683-3695.

32.     Maode Ma, Y. Zhu, and T. H. Cheng, “A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks,” IEEE/OSA Journal of Lightwave Technology, Vol. 23, No.11, November 2005, pp. 3671-3682.

33.     L. Wang, Maode Ma and M. Hamdi, “Efficient Protocols for Multimedia Streams on WDMA Networks,” IEEE/OSA Journal of Lightwave Technology, Vol.21, No.10, October 2003, pp. 2123-2144.

34.     Maode Ma and M. Hamdi, “Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks,” IEEE Journal on Selected Areas in Communications, Vol.18, No.10, October 2000, pp. 2072-2083.

35.     B. Hamidzadeh, Maode Ma and M. Hamdi, “Message Sequencing Techniques for On-Line Scheduling in WDM Networks,” IEEE/OSA Journal of Lightwave Technology, Vol.17, No.8, August 1999, pp. 1309-1319.