Junchao MA
Junchao MA
Shenzhen Technology University
Verified email at
Cited by
Cited by
Energy efficient TDMA sleep scheduling in wireless sensor networks
J Ma, W Lou, Y Wu, XY Li, G Chen
IEEE INFOCOM 2009, 630-638, 2009
Contiguous link scheduling for data aggregation in wireless sensor networks
J Ma, W Lou, XY Li
IEEE Transactions on parallel and distributed systems 25 (7), 1691-1701, 2013
An information model for geographic greedy forwarding in wireless ad-hoc sensor networks
Z Jiang, J Ma, W Lou, J Wu
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 825-833, 2008
Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map
ZA Abduljabbar, IQ Abduljaleel, J Ma, MA Al Sibahee, VO Nyangaresi, ...
IEEE Access 10, 26257-26270, 2022
Minimum latency broadcast scheduling in duty-cycled multihop wireless networks
X Jiao, W Lou, J Ma, J Cao, X Wang, X Zhou
IEEE Transactions on Parallel and Distributed Systems 23 (1), 110-117, 2011
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010
A hybrid cluster-based target tracking protocol for wireless sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Journal of Distributed Sensor Networks 9 (3), 494863, 2013
Interference-aware spatio-temporal link scheduling for long delay underwater sensor networks
J Ma, W Lou
2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2011
A formally verified message validation protocol for intelligent IoT E-health systems
VO Nyangaresi, J Ma
2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 416-422, 2022
Duty-cycle-aware minimum latency broadcast scheduling in multi-hop wireless networks
X Jiao, W Lou, J Ma, J Cao, X Wang, X Zhou
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things
MA Al Sibahee, VO Nyangaresi, J Ma, ZA Abduljabbar
International Conference on Internet of Things as a Service, 3-18, 2021
Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems
ZA Hussien, HA Abdulmalik, MA Hussain, VO Nyangaresi, J Ma, ...
Applied Sciences 13 (2), 691, 2023
Provably throttling SQLI using an enciphering query and secure matching
MA Hussain, ZA Hussien, ZA Abduljabbar, J Ma, MA Al Sibahee, ...
Egyptian Informatics Journal 23 (4), 145-162, 2022
A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques
IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee, MJJ Ghrabat, J Ma, ...
Journal of Sensor and Actuator Networks 11 (4), 66, 2022
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
MA Al Sibahee, AI Abdulsada, ZA Abduljabbar, J Ma, VO Nyangaresi, ...
Applied Sciences 11 (24), 12040, 2021
Efficient extreme gradient boosting based algorithm for QoS optimization in inter-radio access technology handoffs
MA Al Sibahee, J Ma, VO Nyangaresi, ZA Abduljabbar
2022 international congress on human-computer interaction, optimization and …, 2022
TSCD: a novel secure localization approach for wireless sensor networks
H Chen, W Lou, J Ma, Z Wang
2008 Second international conference on sensor technologies and applications …, 2008
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks
ZA Abduljabbar, V Omollo Nyangaresi, MA Al Sibahee, MJJ Ghrabat, ...
Journal of Sensor and Actuator Networks 11 (3), 55, 2022
Elliptic curve cryptography-based scheme for secure signaling and data exchanges in precision agriculture
ZA Abduljabbar, VO Nyangaresi, HM Jasim, J Ma, MA Hussain, ...
Sustainability 15 (13), 10264, 2023
Provably secure and efficient audio compression based on compressive sensing
EW Abood, ZA Hussien, HA Kawi, ZA Abduljabbar, VO Nyangaresi, J Ma, ...
International Journal of Electrical and Computer Engineering (IJECE) 13 (1 …, 2023
The system can't perform the operation now. Try again later.
Articles 1–20