Siqi Ma
Orcid: 0000-0003-3479-5713
According to our database1,
Siqi Ma
authored at least 104 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Inventory control under different forms of uncertainty: Ambiguity and stochastic variability.
Decis. Sci., April, 2024
IEEE Trans. Software Eng., March, 2024
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024
IEEE Trans. Knowl. Data Eng., February, 2024
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024
Estimation of Dispersive High-Doppler Channels in the RIS-Aided mmWave Internet of Vehicles.
IEEE Internet Things J., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Multim., 2024
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making.
Syst., 2024
Dismantling complex networks with graph contrastive learning and multi-hop aggregation.
Inf. Sci., 2024
Expert Syst. Appl., 2024
Evaluating Large Language Models for Anxiety and Depression Classification using Counseling and Psychotherapy Transcripts.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Data-driven optimization for energy-constrained dietary supplement scheduling: A bounded cut MP-DQN approach.
Comput. Ind. Eng., 2024
AugMixSpeech: A Data Augmentation Method and Consistency Regularization for Mandarin Automatic Speech Recognition.
Proceedings of the Natural Language Processing and Chinese Computing, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Proc. ACM Manag. Data, December, 2023
Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms.
IEEE Trans. Parallel Distributed Syst., October, 2023
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023
A Bi-Temporal-Feature-Difference- and Object-Based Method for Mapping Rice-Crayfish Fields in Sihong, China.
Remote. Sens., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023
Solve the Puzzle of Instance Segmentation in Videos: A Weakly Supervised Framework With Spatio-Temporal Collaboration.
IEEE Trans. Circuits Syst. Video Technol., 2023
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023
Classification and Prediction of Driver's Mental Workload Based on Long Time Sequences and Multiple Physiological Factors.
IEEE Access, 2023
LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Ind. Informatics, 2022
Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022
IEEE Internet Things J., 2022
Frontiers Comput. Sci., 2022
CCF Trans. Pervasive Comput. Interact., 2022
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
IEEE Trans. Wirel. Commun., 2021
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021
IEEE Internet Things J., 2021
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Veh. Technol., 2020
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020
CoRR, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
A Pre-restructured Learning-ISTA Deep Network for Millimeter Wave Antenna Array Diagnosis.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
2017
Soft Comput., 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Comput. Sci. Inf. Syst., 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012