{"id":50,"date":"2022-02-09T16:23:47","date_gmt":"2022-02-09T16:23:47","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/?page_id=50"},"modified":"2022-02-09T17:41:23","modified_gmt":"2022-02-09T17:41:23","slug":"publication","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/publication\/","title":{"rendered":"Publication"},"content":{"rendered":"\n<p><strong>Selected IEEE Journal Publications:<\/strong><\/p>\n\n\n\n<p>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Liang and&nbsp;<strong>Maode Ma<\/strong>, &#8220;ECF-MRS: An Efficient and Collaborative Framework with Markov-based Reputation Scheme for IDSs in Vehicular Networks,&#8221;&nbsp;IEEE Transactions on Information Forensics and Security,&nbsp;accepted for publication.<\/p>\n\n\n\n<p><a>2.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span class=\"has-inline-color has-black-color\">\u00a0J. Liang and\u00a0<strong>Maode<\/strong><\/span><strong>\u00a0<\/strong><\/a><strong>Ma<\/strong>, &#8220;FS-MOEA: A Novel Feature Selection Algorithm for Intrusion Detection in Vehicular Ad Hoc Networks,&#8221; Transactions on Intelligent Transportation Systems, accepted for publication.<\/p>\n\n\n\n<p>3.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Z. Shang,\u00a0<strong>Maode Ma<\/strong>, and X. Li, &#8220;A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks,&#8221; IEEE Transactions on Wireless Communications,\u00a0<a><span class=\"has-inline-color has-black-color\">accepted for publication.<\/span><\/a><\/p>\n\n\n\n<p>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Cao,&nbsp;<strong>Maode Ma<\/strong>, F. Li, and H. Li, &#8220;CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G&nbsp;HetNets,&#8221; IEEE Transactions on Dependable and Secure Computing,&nbsp;accepted for publication.<\/p>\n\n\n\n<p>5.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0J. Cao,\u00a0<strong>Maode Ma<\/strong>, H. Li, R. Ma, Y. Sun, P. Yu, and L.\u00a0Xiong, \u201cA Survey on Security Aspects for 3GPP 5G Networks,\u201d IEEE Communications Surveys and Tutorials,\u00a0<a>Vol. 22, No. 1<\/a>, January 2020, pp. 170-195.<\/p>\n\n\n\n<p>6.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;K. L. K. Sudheera,&nbsp;<strong>Maode Ma<\/strong>&nbsp;and P. H. J. Chong, \u201cLink Stability based Optimized Packet Routing Framework for Software Defined Vehicular Networks,\u201d IEEE Transactions on Vehicular Technology, Vol. 68, No. 3, March 2019, pp. 2934- 2945.<\/p>\n\n\n\n<p>7.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Q. Kong, R. Lu,&nbsp;<strong>Maode Ma,&nbsp;<\/strong>andH. Bao, \u201cA Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination,\u201d IEEE Transactions on Vehicular Technology, Vol.&nbsp;&nbsp;68, No. 2, February 2019, pp. 1877-1887.<\/p>\n\n\n\n<p>8.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Cao,&nbsp;<strong>Maode Ma<\/strong>, and H. Li, \u201cG2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks,\u201d IEEE Transactions on Vehicular Technology, Vol. 66, No. 11, November 2017, pp. 9689-9701.<\/p>\n\n\n\n<p>9.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Y. Hou, J. Xu, W. Xian,&nbsp;<strong>Maode Ma<\/strong>, and J. Lei,\u201d Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels,\u201d IEEE Transactions on Circuits and Systems for Video Technology, Vol. 27, No. 9, September 2017, pp. 2028-2040.<\/p>\n\n\n\n<p>10.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;L. Liu and&nbsp;<strong>Maode Ma<\/strong>, C. Liu, and Y. Shu, &#8220;Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks,&#8221;&nbsp;IEEE Transactions on Communications, Vol.65, No.5, May 2017, pp. 2141-2152.<\/p>\n\n\n\n<p>11.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;H. C. Tan,&nbsp;<strong>Maode Ma<\/strong>, H. Labiod, A.&nbsp;Boudguiga, J. Zhang, and H. J. Chong, \u201cA Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks,\u201d IEEE Transactions on Vehicular Technology, Vol. 65, No. 12, December 2016, pp. 9570-9584.<\/p>\n\n\n\n<p>12.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Y.&nbsp;Qiu&nbsp;and&nbsp;<strong>Maode Ma<\/strong>, &#8220;A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks,&#8221; IEEE Transactions on Industrial Informatics, Vol. 12, No. 6, December 2016, pp. 2074 \u2013 2085.<\/p>\n\n\n\n<p>13.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;M. Minelli,&nbsp;<strong>Maode Ma<\/strong>, M.&nbsp;Coupechoux, J.&nbsp;Kelif, and P.&nbsp;Godlewski, \u201cUplink Energy-Delay Trade-off under Optimized Relay Placement in Cellular Networks,\u201d IEEE Transactions on Mobile Computing, Vol. 15, No. 9, September 2016, pp. 2376-2387.<\/p>\n\n\n\n<p>14.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;M. Minelli,&nbsp;<strong>Maode Ma<\/strong>, M.&nbsp;Coupechoux, J.&nbsp;Kelif, and P.&nbsp;Godlewski, \u201cScheduling Impact on the Performance of Relay-Enhanced LTE-A Networks,\u201d IEEE Transactions on Vehicular Technology, Vol. 65, No. 4, April 2016, pp. 2496-2508.<\/p>\n\n\n\n<p>15.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Y. Yang and&nbsp;<strong>Maode Ma<\/strong>, \u201cConjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds,\u201d IEEE Transactions on Information Forensics and Security, Vol.11, No.4, April 2016. pp. 746-59.<\/p>\n\n\n\n<p>16.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;B. Lian, G. Chen,&nbsp;<strong>Maode Ma<\/strong>, and J. Li, \u201cPeriodic K-Times Anonymous Authentication with Efficient Revocation of Violator\u2019s Credential,\u201d IEEE Transactions on Information Forensics &amp; Security, Vol. 10, No.3, March 2015, pp 543-557.<\/p>\n\n\n\n<p>17.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;K. Chen,&nbsp;<strong>Maode Ma<\/strong>, E. Cheng, F. Yuan, and W. Su, \u201cA Survey on MAC Protocols for Underwater Wireless Sensor Networks,\u201d IEEE Communications Surveys and Tutorials, Vol. 16, No. 3, July 2014, pp.1433-1447.<\/p>\n\n\n\n<p>18.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;M. Minelli,&nbsp;<strong>Maode Ma<\/strong>, M.&nbsp;Coupechoux, J.-M.&nbsp;Kelif, M.&nbsp;Sigelle, and P.&nbsp;Godlewski, \u201cOptimal Relay Placement in Cellular Networks,\u201d IEEE Transactions on Wireless Communications, Vol. 13, No. 2, February 2014, pp. 998 &#8211; 1009.<\/p>\n\n\n\n<p>19.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Cao,&nbsp;<strong>Maode Ma<\/strong>, H. Li, Y. Zhang, and Z. Luo, \u201cA Survey on Security Aspects for LTE and LTE-A Networks,\u201d IEEE Communications Surveys and Tutorials,&nbsp;Vol. 16, No. 1, January 2014, pp. 283 &#8211; 302.<\/p>\n\n\n\n<p>20.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Cao,&nbsp;<strong>Maode Ma<\/strong>, and H. Li, \u201cA Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks,\u201d IEEE Transactions on Wireless Communications, Vol. 11, No. 10, October 2012, pp. 3644-3650.<\/p>\n\n\n\n<p>21.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;B. Wang and&nbsp;<strong>Maode Ma<\/strong>,\u201cA Server Independent&nbsp;Authentication Scheme for RFID Systems,\u201d IEEE&nbsp;Transactions on Industrial Informatics,&nbsp;Vol. 8, No. 3, August 2012, pp. 689-696.<\/p>\n\n\n\n<p>22.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;T. N. Nguyen and&nbsp;<strong>Maode Ma<\/strong>, \u201cEnhanced EAP-based Pre-authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks,\u201d IEEE Transactions on Wireless Communications, Vol. 11, No. 6, June 2012, pp. 2173-2181.<\/p>\n\n\n\n<p>23.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;D. Ma and&nbsp;<strong>Maode Ma<\/strong>, \u201cA QoS Oriented Vertical Handoff Scheme for WiMAX\/WLAN Overlay Networks,\u201dIEEE Transactions on Parallel and Distributed Systems,&nbsp;Vol. 23, No. 4,&nbsp;April 2012,&nbsp;pp. 598-606.<\/p>\n\n\n\n<p>24.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;H. Wang, N.&nbsp;Agoulmine, and&nbsp;<strong>Maode Ma<\/strong>, \u201cNetwork Lifetime Optimization in Wireless Sensor Networks,\u201d&nbsp;IEEE Journal on Selected Areas in Communications,&nbsp;Vol. 28, No. 7, September 2010, pp. 1127 &#8211; 1137.<\/p>\n\n\n\n<p>25.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;D. He, L. Cui, H. Huang, and&nbsp;<strong>Maode Ma<\/strong>,&nbsp;\u201cDesign and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks,\u201d&nbsp;IEEE Transactions on Parallel and Distributed Systems,&nbsp;Vol. 20, No. 7, July&nbsp;2009, pp.1050-1058.<\/p>\n\n\n\n<p>26.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Zheng and&nbsp;<strong>Maode Ma<\/strong>, \u201cA Utility-Based Joint Power and Rate Adaptive Algorithm in Wireless Ad Hoc Networks,&#8221; IEEE Transaction of Communication, Vol. 57, No. 1, January 2009, pp. 134-140.<\/p>\n\n\n\n<p>27.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;H. Wang, Y. Yang,&nbsp;<strong>Maode Ma,<\/strong>&nbsp;J. He,and X. Wang, \u201cNetwork Lifetime Maximization with Cross-layer Design in Wireless Sensor Networks,\u201d IEEE Transactions on Wireless Communications,&nbsp;Vol. 7, No. 10, October 2008, pp. 3759- 3768.<\/p>\n\n\n\n<p>28.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;X. Huang and&nbsp;<strong>Maode Ma,<\/strong>&nbsp;&#8220;Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks,&#8221; IEEE Transaction of Communication, Vol. 56, No. 8, August 2008, pp. 1324-1330.<\/p>\n\n\n\n<p>29.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Y. Zhu and&nbsp;<strong>Maode Ma<\/strong>,&nbsp;&#8220;IPACT with Grant Estimation (IPACT-GE) Scheme for Ethernet Passive Optical Networks,&#8221; IEEE\/OSA Journal of Lightwave Technology, Vol. 26, Issue 14, July 2008, pp.&nbsp;2055-2063.<\/p>\n\n\n\n<p>30.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Y. Zhang,&nbsp;<strong>Maode Ma<\/strong>, and M.&nbsp;Fujise, &#8220;Call Completion in Wireless Network Over Lossy Link&#8221;, IEEE Transactions on Vehicular Technology, Vol. 56, No. 2, March 2007, pp. 929-941.<\/p>\n\n\n\n<p>31.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;X. Huang and&nbsp;<strong>Maode Ma<\/strong>, \u201cAn Efficient Scheduling Algorithm for Real-Time Traffic on WDM Passive Star Optical Networks,\u201d IEEE\/OSA Journal of Lightwave Technology, Vol. 23, No.11, November 2005, pp. 3683-3695.<\/p>\n\n\n\n<p>32.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>Maode Ma<\/strong>, Y. Zhu, and T. H. Cheng, \u201cA Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks,\u201d IEEE\/OSA Journal of Lightwave Technology, Vol. 23, No.11, November 2005, pp. 3671-3682.<\/p>\n\n\n\n<p>33.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;L. Wang,&nbsp;<strong>Maode Ma<\/strong>&nbsp;and M. Hamdi, \u201c<strong>Efficient Protocols for Multimedia Streams on WDMA Networks,\u201d&nbsp;<\/strong>IEEE\/OSA Journal of Lightwave Technology, Vol.21, No.10, October 2003, pp. 2123-2144.<\/p>\n\n\n\n<p>34.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>Maode Ma<\/strong>&nbsp;and M. Hamdi, &#8220;Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks,&#8221; IEEE Journal on Selected Areas in Communications, Vol.18, No.10, October 2000, pp. 2072-2083.<\/p>\n\n\n\n<p>35.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;B.&nbsp;Hamidzadeh,&nbsp;<strong>Maode Ma<\/strong>&nbsp;and M. Hamdi, &#8220;Message Sequencing Techniques for On-Line Scheduling in WDM Networks,&#8221; IEEE\/OSA Journal of Lightwave Technology, Vol.17, No.8, August 1999, pp. 1309-1319.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selected IEEE Journal Publications: 1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;J. Liang and&nbsp;Maode Ma, &#8220;ECF-MRS: An Efficient and Collaborative Framework with Markov-based Reputation Scheme for IDSs [&hellip;]<\/p>\n","protected":false},"author":1287,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-50","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/pages\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/users\/1287"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":2,"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/pages\/50\/revisions"}],"predecessor-version":[{"id":85,"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/pages\/50\/revisions\/85"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/mamaode\/wp-json\/wp\/v2\/media?parent=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}