Siqi Lu

Orcid: 0000-0002-8593-9636

According to our database1, Siqi Lu authored at least 32 papers between 2016 and 2025.

Collaborative distances:

Timeline

2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
0
5
10
15
1
12
5
3
3
1
2
1
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic.
J. Inf. Secur. Appl., 2025

2024
Privacy preserving and secure robust federated learning: A survey.
Concurr. Comput. Pract. Exp., June, 2024

Speed-Up DDPM for Real-Time Underwater Image Enhancement.
IEEE Trans. Circuits Syst. Video Technol., May, 2024

Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement.
IEEE Trans. Dependable Secur. Comput., 2024

An SGX-based online voting protocol with maximum voter privacy.
J. Syst. Archit., 2024

Underwater image enhancement based on global features and prior distribution guided.
Image Vis. Comput., 2024

ASIGN: An Anatomy-aware Spatial Imputation Graphic Network for 3D Spatial Transcriptomics.
CoRR, 2024

GloFinder: AI-empowered QuPath Plugin for WSI-level Glomerular Detection, Visualization, and Curation.
CoRR, 2024

How Good Are We? Evaluating Cell AI Foundation Models in Kidney Pathology with Human-in-the-Loop Enrichment.
CoRR, 2024

Assessment of Cell Nuclei AI Foundation Models in Kidney Pathology.
CoRR, 2024

AI Foundation Models in Remote Sensing: A Survey.
CoRR, 2024

Observational equivalence and security games: Enhancing the formal analysis of security protocols.
Comput. Secur., 2024

metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024

Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023

Underwater image enhancement method based on denoising diffusion probabilistic model.
J. Vis. Commun. Image Represent., October, 2023

A Quantitative Detection Algorithm for Multi-Test Line Lateral Flow Immunoassay Applied in Smartphones.
Sensors, July, 2023

A Novel Mine-Specific Eco-Environment Index (MSEEI) for Mine Ecological Environment Monitoring Using Landsat Imagery.
Remote. Sens., February, 2023

PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy.
IEEE Trans. Comput. Soc. Syst., 2023

2022
Assessing Elevation-Based Forest Dynamics over Space and Time toward REDD+ MRV in Upland Myanmar.
Remote. Sens., December, 2022

SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts.
Empir. Softw. Eng., 2022

A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022

2021
A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks.
J. Parallel Distributed Comput., 2021

Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations.
Inf. Technol. Control., 2021

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., 2021

ESD-PCM: Constructing Reliable Super Dense Phase Change Memory Under Write Disturbance.
Proceedings of the 26th IEEE European Test Symposium, 2021

2020
Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks.
Mob. Inf. Syst., 2020

Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Manual Audit for BitUnits Contracts.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2017
A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Commun. Syst., 2017

2016
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.
Int. J. Commun. Syst., 2016


  Loading...