hero image
Liran Ma - Texas Christian University. Fort Worth, TX, US

Liran Ma Liran Ma

Professor | Texas Christian University


Dr. Ma's current research focuses on security and privacy, data analytics, artificial intelligence, and STEM education.



Liran Ma Publication



loading image loading image





Liran Ma is a Professor in the Department of Computer Science at Texas Christian University. His current research focuses on wireless, mobile, and embedded systems, including security and privacy, smart devices and health, mobile computing, data analytics, Internet of Things, artificial intelligence, and cybersecurity education. It involves building and simulating prototype systems and conducting real experiments and measurements.

Areas of Expertise (5)

Internet of Things

Mobile Health and Safety

Wireless Networks

Security Systems

Cloud Computing

Education (3)

The George Washington University: DSc, Computer Science 2008

Beijing Jiaotong University: MS 2003

Hunan University: BSEE 1999

Affiliations (1)

  • Institute of Electrical and Electronics Engineers (IEEE) : Member

Media Appearances (3)

TCU Magazine’s Winter Issue Talks Cybersecurity, More

TCU News  online


“Two professors — Liran Ma in computer science and Curby Alexander in the College of Education — are co-principal investigators in a large grant project from the National Science Foundation. They have developed a series of online lessons to teach people around the world the basics of staying safe from hacking attempts.”

view more

Cryptocurrency: Risky Investment or Money of the Future?

TCU College of Science & Engineering  online


When someone at the party turns to the topic of Bitcoin, do you panic? You’re not alone. The ins and outs of cryptocurrency are confusing to say the least. In simple terms, this digital asset utilizes computer code and blockchain technology to operate without the need for a central party, whether that be a person, company, government, or bank. Bitcoin, the first cryptocurrency created, was at first developed to act as a payment tool solely for the online universe. It has evolved from a hobby among coders to a mainstream exchange on Wall Street. There are risks, however, with getting involved with cryptocurrency and financial systems that aren’t regulated by the government. Liran Ma, professor in the department of computer science at TCU, clears up some of the confusion surrounding cryptocurrency, including complications related to cybersecurity.

view more

Hearing Problems? There's an iPhone App for That

Lead On  online


"Computer scientist Liran Ma is developing a program to make an iPhone operate as an inexpensive hearing aid..."

view more

Articles (6)

An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring

International Conference on Wireless Algorithms, Systems, and Applications

2019 An important part of environmental monitoring is the collection of meteorological data. In this paper, we develop an integrated data acquisition and transmission platform utilizing unmanned aerial vehicles (UAVs) with an intelligent path planning algorithm to achieve efficient and accurate meteorological data collection in real-time. We adopt the improved traveling salesman problem model to represent the path planning problem. Based on the model, we propose an improved simulated annealing genetic algorithm (ISAGA) to solve the path planning problem. Our proposed ISAGA is able to overcome the deficiencies of the traditional genetic algorithm and simulated annealing algorithm. In addition, we design and implement a mobile application integrated with the path planning algorithm to control UAVs and conduct data exchange to the cloud. Our evaluation results demonstrate that data can be collected and transmitted more efficiently via selecting better paths.

view more

Secure communications in tiered 5G wireless networks with cooperative jamming

IEEE Transactions on Wireless Communications

2019 Cooperative jamming is deemed as a promising physical layer-based approach to secure wireless transmissions in the presence of eavesdroppers. In this paper, we investigate cooperative jamming in a two-tier 5G heterogeneous network (HetNet), where the macrobase stations (MBSs) at the macrocell tier are equipped with large-scale antenna arrays to provide space diversity and the local base stations (LBSs) at the local cell tier adopt non-orthogonal multiple access (NOMA) to accommodate dense local users (LUs). In the presence of imperfect channel state information, we propose three robust secrecy transmission algorithms that can be applied to various scenarios with different security requirements. The first algorithm employs robust beamforming (RBA) that aims to optimize the secrecy rate of a marcouser (MU) in a macrocell. The second algorithm provides robust power allocation (RPA) that can optimize the secrecy rate of an LU in a local cell. The third algorithm tackles a robust joint optimization (RJO) problem across tiers that seek the maximum secrecy sum rate of a target MU and a target LU robustly. We employ convex optimization techniques to find feasible solutions to these highly non-convex problems. The numerical results demonstrate that the proposed algorithms are highly effective in improving the secrecy performance of a two-tier HetNet.

view more

A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks

IEEE Transactions on Vehicular Technology

2019 In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where a primary base station sends a message to a primary user. Meanwhile, a secondary user transmitter (SU-Tx) acts as a friendly jammer that sends jamming signals (artificial noise) to protect the transmitted message from a potential eavesdropper (Eve). However, the SU-Tx may not be completely honest in sending jamming signals for selfish reasons, i.e., it may be untrusted. To select a trustworthy SU-Tx as a friendly jammer, we adopt the concept of trust degree as a selection criterion. We investigate the trust degree's influence on the secrecy performance of a CCRN in cases of perfect channel state information (CSI) and statistical CSI, respectively. In the case of perfect CSI, the accurate expected secrecy rate is derived to evaluate the secrecy performance. In the case of statistical CSI, we calculate the probabilities of the transmission and secrecy outage events, and the secrecy performance is evaluated in terms of effective secrecy throughput. In both cases, we obtain the target trust degree thresholds based on the target secrecy performance thresholds, respectively. Next, we investigate how to calculate the trust degree of each SU-Tx and establish a trust degree list of all SU-Txs. Finally, according to the trust degree list and the target trust degree thresholds, we can select a trustworthy SU-Tx as a friendly jammer in both two cases. A comprehensive simulation study is carried out to validate our secrecy performance analyses and the trust degree management.

view more

A coalition formation game based relay selection scheme for cooperative cognitive radio networks

Wireless Networks

2017 In a cognitive radio network, cooperative communications between a primary user (PU) and a second user (SU) may be able to significantly improve the spectrum utilization, and thus, the network performance. To be specific, the PU can select a number of SUs as its relays to cooperatively transmit its data. In turn, these relays can be granted access to the licensed channel of the PU to transmit their data. In this paper, an effective cooperation strategy for SUs is presented. We formulate the problem of cooperative relay selection as a coalition formation game, and develop a utility function based on the game. The utility function considers various factors such as transmission power and noise level. With the utility function, a distributed coalition formation algorithm is proposed, which can be used by SUs to decide whether to join or leave a coalition. Such a decision is based on whether it can increase the maximal coalition utility value. We rigorously prove that our proposed coalition formation algorithm can terminate and reach a stable state. Finally, this paper demonstrates that the proposed scheme is able to enhance the network throughput via a simulation study.

view more

Effects of catalyst agglomerate shape in polymer electrolyte fuel cells investigated by a multi-scale modelling framework


2017 A multi-scale modelling framework is developed for the PEFC cathode electrode. Unlike the conventional agglomerate model, the effects of the microstructure of the agglomerate are numerically coupled to the fuel cell-scale model in this framework. This is performed through solving the agglomerate-scale model first and subsequently extracting and using the data required to generate the performance curves in the fuel cell-scale model. This enables one to freely investigate the structure of the agglomerate without being limited to the only three agglomerate shapes that can be investigated using the conventional agglomerate model: spheres, long cylinders with sealed ends and long slabs with sealed ends. The numerical studies conducted in this work using the developed framework have revealed that the performance of the cathode electrode is highly sensitive to the specific surface area of the agglomerate if the size of the latter is relatively large, i.e. of the order of 1000 nm. Namely, the maximum reported current density has increased by about 60% when changing from the ‘large’ spherical agglomerate to the ‘large’ cylindrical agglomerate. Also, it has been shown that a slight change in the structure of the agglomerate may significantly improve the fuel cell performance.

view more

Rho-kinase inhibitor prevents acute injury against transient focal cerebral ischemia by enhancing the expression and function of GABA receptors in rats

European Journal of Pharmacology

2017 Studies have shown hydroxyfasudil-mediated inhibition of Rho-kinase (ROCK) has efficacy in rodent models of focal ischemia and in in vitro systems that recapitulate stroke conditions. However, the mechanisms underlying the neuroprotective effects of the ROCK inhibitor on stroke are not well understood. In this study, we examined the role of γ-aminobutyric acid (GABA) interneurons in the effects of hydroxyfasudil on transient middle cerebral artery occlusion (tMCAO) induced acute ischemia-reperfusion injury to explore the mechanisms. tMCAO rats developed marked neurological deficits and impaired long-term potentiation; these effects were attenuated by hydroxyfasudil. Expression of GABAA and GABAB receptors after ischemia was decreased to various extents in three brain regions: the cortex, hippocampus, and striatum. Hydroxyfasudil up-regulated expression in the cortex and hippocampus but not in the striatum. Moreover, hydroxyfasudil could suppress the activation of nuclear factor-κB (NF-κB) in these regions during the acute ischemia. We further found that in tMCAO rats, hydroxyfasudil was able to abolish the decrease in GABAA and GABAB receptor phosphorylation triggered by high-frequency stimulation as well as the activation of phosphatase and tensin homolog deleted on chromosome 10 (PTEN). In summary, our results suggest ROCK inhibition improved neurological function and mitigated synaptic plasticity deficits caused by transient focal cerebral ischemia through the inactivation of two distinct pathways: (1) a ROCK-NF-κB pathway that leads to the suppression of GABAA and GABAB expression, and (2) a ROCK-PTEN pathway that decreases the phosphorylation of GABAA and GABAB, thereby affecting receptor function by triggering receptor endocytosis and the degradation of internalized receptors.

view more