default search action
Siqi Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Yaping Zhao, Siqi Ma, Xiangzhi Mo, Xiaoyun Xu:
Data-driven optimization for energy-constrained dietary supplement scheduling: A bounded cut MP-DQN approach. Comput. Ind. Eng. 188: 109894 (2024) - [j54]Siqi Ma, John Aloysius:
Inventory control under different forms of uncertainty: Ambiguity and stochastic variability. Decis. Sci. 55(2): 137-148 (2024) - [j53]Kai Han, Victor S. Sheng, Yuqing Song, Yi Liu, Chengjian Qiu, Siqi Ma, Zhe Liu:
Deep semi-supervised learning for medical image segmentation: A review. Expert Syst. Appl. 245: 123052 (2024) - [j52]Jiaxin Chen, Wenqian Shen, Shixun Luo, Siqi Ma, Chengwen Xing, Lajos Hanzo:
Estimation of Dispersive High-Doppler Channels in the RIS-Aided mmWave Internet of Vehicles. IEEE Internet Things J. 11(1): 677-691 (2024) - [j51]Siqi Ma, Weixin Zeng, Weidong Xiao, Xiang Zhao:
Dismantling complex networks with graph contrastive learning and multi-hop aggregation. Inf. Sci. 676: 120780 (2024) - [j50]Zhe Liu, Siqi Ma, Yi Liu, Wenqiang Wang, Yuqing Song, Jun Su, Yangyang Tang, Aihong Yu, Xuesheng Liu:
Pancreas segmentation in CT based on RC-3DUNet with SOM. Multim. Syst. 30(2): 66 (2024) - [j49]Stuart Fowler, Keith F. Joiner, Siqi Ma:
Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making. Syst. 12(7): 238 (2024) - [j48]Ju Jia, Siqi Ma, Lina Wang, Yang Liu, Robert H. Deng:
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services. IEEE Trans. Computers 73(1): 58-72 (2024) - [j47]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j46]Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 59-73 (2024) - [j45]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j44]Zhe Chen, Haiyan Zhang, Xinghua Li, Yinbin Miao, Xiaohan Zhang, Man Zhang, Siqi Ma, Robert H. Deng:
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 8140-8154 (2024) - [j43]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Yanbing Ren, Siqi Ma:
PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS. IEEE Trans. Knowl. Data Eng. 36(2): 781-794 (2024) - [j42]Bin Luo, Xinghua Li, Ximeng Liu, Jingjing Guo, Yanbing Ren, Siqi Ma, Jianfeng Ma:
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing. IEEE Trans. Knowl. Data Eng. 36(3): 927-942 (2024) - [j41]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. IEEE Trans. Multim. 26: 5014-5025 (2024) - [j40]Jiajun Huang, Chengbin Du, Xinqi Zhu, Siqi Ma, Surya Nepal, Chang Xu:
Anti-Compression Contrastive Facial Forgery Detection. IEEE Trans. Multim. 26: 6166-6177 (2024) - [j39]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Siqi Ma, Kim-Kwang Raymond Choo, Robert H. Deng:
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS. IEEE Trans. Serv. Comput. 17(2): 589-603 (2024) - [j38]Ruidong Han, Siqi Ma, Juanru Li, Surya Nepal, David Lo, Zhuo Ma, Jianfeng Ma:
Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024) - [j37]Yifei Xia, Feng Zhang, Qingyu Xu, Mingde Zhang, Zhiming Yao, Lv Lu, Xiaoyong Du, Dong Deng, Bingsheng He, Siqi Ma:
GPU-based butterfly counting. VLDB J. 33(5): 1543-1567 (2024) - [c38]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Random Entangled Tokens for Adversarially Robust Vision Transformer. CVPR 2024: 24554-24563 - [c37]Yang Jiang, Jun Chen, Kai Han, Yi Liu, Siqi Ma, Yuqing Song, Zhe Liu:
AugMixSpeech: A Data Augmentation Method and Consistency Regularization for Mandarin Automatic Speech Recognition. NLPCC (3) 2024: 145-157 - [i22]Cheng Tan, Dongxin Lyu, Siyuan Li, Zhangyang Gao, Jingxuan Wei, Siqi Ma, Zicheng Liu, Stan Z. Li:
Peer Review as A Multi-Turn and Long-Context Dialogue with Role-Based Interactions. CoRR abs/2406.05688 (2024) - [i21]Xinna Lin, Siqi Ma, Junjie Shan, Xiaojing Zhang, Shell Xu Hu, Tiannan Guo, Stan Z. Li, Kaicheng Yu:
BioKGBench: A Knowledge Graph Checking Benchmark of AI Agent for Biomedical Science. CoRR abs/2407.00466 (2024) - [i20]Junwei Sun, Siqi Ma, Yiran Fan, Peter Washington:
Evaluating Large Language Models for Anxiety and Depression Classification using Counseling and Psychotherapy Transcripts. CoRR abs/2407.13228 (2024) - [i19]Guangyan Sun, Mingyu Jin, Zhenting Wang, Cheng-Long Wang, Siqi Ma, Qifan Wang, Ying Nian Wu, Yongfeng Zhang, Dongfang Liu:
Visual Agents as Fast and Slow Thinkers. CoRR abs/2408.08862 (2024) - 2023
- [j36]Wanyu Wei, Xinsha Fu, Yaqiao Zhu, Ning Lu, Siqi Ma:
Classification and Prediction of Driver's Mental Workload Based on Long Time Sequences and Multiple Physiological Factors. IEEE Access 11: 81725-81736 (2023) - [j35]Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang:
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis. IET Inf. Secur. 17(4): 582-597 (2023) - [j34]Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen:
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J. 10(19): 16715-16726 (2023) - [j33]Jiawei Guan, Feng Zhang, Siqi Ma, Kuangyu Chen, Yihua Hu, Yuxing Chen, Anqun Pan, Xiaoyong Du:
Homomorphic Compression: Making Text Processing on Compression Unlimited. Proc. ACM Manag. Data 1(4): 271:1-271:28 (2023) - [j32]Siqi Ma, Danyang Wang, Haichao Yang, Huagang Hou, Cheng Li, Zhaofu Li:
A Bi-Temporal-Feature-Difference- and Object-Based Method for Mapping Rice-Crayfish Fields in Sihong, China. Remote. Sens. 15(3): 658 (2023) - [j31]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Siqi Ma, Jian Weng:
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network. IEEE Trans. Cloud Comput. 11(4): 3381-3395 (2023) - [j30]Liqi Yan, Qifan Wang, Siqi Ma, Jingang Wang, Changbin Yu:
Solve the Puzzle of Instance Segmentation in Videos: A Weakly Supervised Framework With Spatio-Temporal Collaboration. IEEE Trans. Circuits Syst. Video Technol. 33(1): 393-406 (2023) - [j29]Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. IEEE Trans. Dependable Secur. Comput. 20(2): 1461-1475 (2023) - [j28]Ju Jia, Meng Luo, Siqi Ma, Lina Wang, Yang Liu:
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis. IEEE Trans. Knowl. Data Eng. 35(6): 5665-5679 (2023) - [j27]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j26]Yihua Hu, Feng Zhang, Yifei Xia, Zhiming Yao, Letian Zeng, Haipeng Ding, Zhewei Wei, Xiao Zhang, Jidong Zhai, Xiaoyong Du, Siqi Ma:
Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms. IEEE Trans. Parallel Distributed Syst. 34(10): 2699-2717 (2023) - [j25]Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. IEEE Trans. Serv. Comput. 16(1): 504-514 (2023) - [j24]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [c36]Jiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han, Chao Zhang:
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark. AsiaCCS 2023: 415-428 - [c35]Yawen Lu, Qifan Wang, Siqi Ma, Tong Geng, Yingjie Victor Chen, Huaijin G. Chen, Dongfang Liu:
TransFlow: Transformer as Flow Learner. CVPR 2023: 18063-18073 - [c34]Chen Chen, Daochang Liu, Siqi Ma, Surya Nepal, Chang Xu:
Private Image Generation with Dual-Purpose Auxiliary Classifier. CVPR 2023: 20361-20370 - [c33]Siqi Ma, Zhe Liu, Yuqing Song, Yi Liu, Kai Han, Yang Jiang:
A Domain Knowledge-Based Semi-supervised Pancreas Segmentation Approach. ICONIP (4) 2023: 69-82 - [c32]Ding Wang, Yunkai Zou, Yuan-an Xiao, Siqi Ma, Xiaofeng Chen:
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. USENIX Security Symposium 2023: 983-1000 - [c31]Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang:
LibScan: Towards More Precise Third-Party Library Identification for Android Applications. USENIX Security Symposium 2023: 3385-3402 - [c30]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [i18]Jiajun Huang, Xinqi Zhu, Chengbin Du, Siqi Ma, Surya Nepal, Chang Xu:
Anti-Compression Contrastive Facial Forgery Detection. CoRR abs/2302.06183 (2023) - [i17]Chuyang Zhou, Jiajun Huang, Daochang Liu, Chengbin Du, Siqi Ma, Surya Nepal, Chang Xu:
Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection. CoRR abs/2302.10437 (2023) - [i16]Yawen Lu, Qifan Wang, Siqi Ma, Tong Geng, Yingjie Victor Chen, Huaijin G. Chen, Dongfang Liu:
TransFlow: Transformer as Flow Learner. CoRR abs/2304.11523 (2023) - [i15]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i14]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. CoRR abs/2309.09480 (2023) - [i13]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks. CoRR abs/2309.16207 (2023) - 2022
- [j23]Chenxin Qu, Xiaoping Che, Siqi Ma, Shuqin Zhu:
Bio-physiological-signals-based VR cybersickness detection. CCF Trans. Pervasive Comput. Interact. 4(3): 268-284 (2022) - [j22]Qingfeng Cheng, Ting Chen, Siqi Ma, Xinghua Li:
Improvement on a batch authenticated key agreement scheme. Frontiers Comput. Sci. 16(2): 162803 (2022) - [j21]Xinghua Li, Hengyou Zhang, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles. IEEE Internet Things J. 9(5): 3359-3371 (2022) - [j20]Hongyang Li, Qingfeng Cheng, Xinghua Li, Siqi Ma, Jianfeng Ma:
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing. IEEE Syst. J. 16(2): 1832-1841 (2022) - [j19]Liqi Yan, Siqi Ma, Qifan Wang, Yingjie Victor Chen, Xiangyu Zhang, Andreas E. Savakis, Dongfang Liu:
Video Captioning Using Global-Local Representation. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6642-6656 (2022) - [j18]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j17]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j16]Xiaohan Zhang, Xinghua Li, Yinbin Miao, Xizhao Luo, Yunwei Wang, Siqi Ma, Jian Weng:
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT. IEEE Trans. Ind. Informatics 18(7): 4456-4465 (2022) - [j15]Ju Jia, Meng Luo, Siqi Ma, Lina Wang:
Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning. IEEE Trans. Ind. Informatics 18(11): 7463-7474 (2022) - [j14]Siqi Ma, Wenqian Shen, Xinyu Gao, Jianping An:
Robust Channel Estimation for RIS-Aided Millimeter-Wave System With RIS Blockage. IEEE Trans. Veh. Technol. 71(5): 5621-5626 (2022) - [c29]Xueyu Wang, Jiajun Huang, Siqi Ma, Surya Nepal, Chang Xu:
DeepFake Disrupter: The Detector of DeepFake Is My Friend. CVPR 2022: 14900-14909 - [c28]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c27]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c26]Zheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang:
PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation. ISSTA 2022: 404-416 - [c25]Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Vulnerability Detection Using Deep Learning Based Function Classification. NSS 2022: 3-22 - [c24]Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. SP 2022: 650-665 - [c23]Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [i12]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - [i11]Liqi Yan, Qifan Wang, Siqi Ma, Jingang Wang, Changbin Yu:
Solve the Puzzle of Instance Segmentation in Videos: A Weakly Supervised Framework with Spatio-Temporal Collaboration. CoRR abs/2212.07592 (2022) - 2021
- [j13]Xinghua Li, Ting Chen, Qingfeng Cheng, Siqi Ma, Jianfeng Ma:
Smart Applications in Edge Computing: Overview on Authentication and Data Security. IEEE Internet Things J. 8(6): 4063-4080 (2021) - [j12]Ranran Sun, Bin Yang, Siqi Ma, Yulong Shen, Xiaohong Jiang:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j11]Siqi Ma, Wenqian Shen, Jianping An, Lajos Hanzo:
Wideband Channel Estimation for IRS-Aided Systems in the Face of Beam Squint. IEEE Trans. Wirel. Commun. 20(10): 6240-6253 (2021) - [c22]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. ACSAC 2021: 311-322 - [c21]Yunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li:
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation. Inscrypt 2021: 129-148 - [c20]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c19]Chang Xu, Siqi Ma, David Lo:
PLP 2021: Workshop on Programming Language Processing. KDD 2021: 4171-4172 - [c18]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. QRS 2021: 702-713 - [i10]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i9]Siqi Ma, Wenqian Shen, Jianping An, Lajos Hanzo:
Antenna Array Diagnosis for Millimeter-Wave MIMO Systems. CoRR abs/2106.02862 (2021) - [i8]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. CoRR abs/2110.11603 (2021) - [i7]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. CoRR abs/2111.04005 (2021) - [i6]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - [i5]Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma:
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis. CoRR abs/2112.06146 (2021) - [i4]Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code. CoRR abs/2112.06702 (2021) - 2020
- [j10]Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma, Xiaoming Huang:
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 7(12): 11789-11802 (2020) - [j9]Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, Chang Yao:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6597-6606 (2020) - [j8]Siqi Ma, Wenqian Shen, Jianping An, Lajos Hanzo:
Antenna Array Diagnosis for Millimeter-Wave MIMO Systems. IEEE Trans. Veh. Technol. 69(4): 4585-4589 (2020) - [j7]Siqi Ma, Yang Liu, Surya Nepal:
Are Android Apps Being Protected Well Against Attacks? IEEE Wirel. Commun. 27(3): 66-71 (2020) - [c17]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c16]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c15]Wei Wang, Yongfeng Ma, Siqi Ma, Jianguo Li, Xiangming Li:
A Pre-restructured Learning-ISTA Deep Network for Millimeter Wave Antenna Array Diagnosis. IWCMC 2020: 183-187 - [c14]Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma:
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication. IWQoS 2020: 1-10 - [c13]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. SEC 2020: 189-202 - [c12]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [c11]Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma:
EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. SANER 2020: 116-126 - [i3]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020)
2010 – 2019
- 2019
- [c10]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c9]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c8]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c7]Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - [c6]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c5]Xiaoping Che, Siqi Ma, Qi Yu, Chenfeng Yue:
An Event-Based User Experience Evaluation Method for Virtual Reality Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 767-774 - [i2]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019) - [i1]Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren:
Revocable Federated Learning: A Benchmark of Federated Forest. CoRR abs/1911.03242 (2019) - 2018
- [j6]Qi Yu, Xiaoping Che, Siqi Ma, Shirui Pan, Yuxiang Yang, Weiwei Xing, Ximeng Wang:
A Hybrid User Experience Evaluation Method for Mobile Games. IEEE Access 6: 49067-49079 (2018) - 2017
- [j5]Siqi Ma, Junzuo Lai, Robert H. Deng, Xuhua Ding:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017) - [c4]Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS (2) 2017: 229-246 - 2016
- [j4]Siqi Ma, David Lo, Ning Xi:
Collaborative 'many to many' DDoS detection in cloud. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 192-202 (2016) - [c3]Siqi Ma, David Lo, Teng Li, Robert H. Deng:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. AsiaCCS 2016: 711-722 - 2015
- [j3]Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(7): 1384-1393 (2015) - [c2]Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun:
Active Semi-supervised Approach for Checking App Behavior against Its Description. COMPSAC 2015: 179-184 - 2014
- [c1]Ximeng Liu, Hui Zhu, Jianfeng Ma, Jun Ma, Siqi Ma:
Key-Policy Weighted Attribute based Encryption for fine-grained access control. ICC Workshops 2014: 694-699 - 2013
- [j2]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - 2012
- [j1]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint