Siqi Ma

Orcid: 0000-0003-3479-5713

According to our database1, Siqi Ma authored at least 104 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GPU-based butterfly counting.
VLDB J., September, 2024

Pancreas segmentation in CT based on RC-3DUNet with SOM.
Multim. Syst., April, 2024

Inventory control under different forms of uncertainty: Ambiguity and stochastic variability.
Decis. Sci., April, 2024

Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS.
IEEE Trans. Knowl. Data Eng., February, 2024

A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

Estimation of Dispersive High-Doppler Channels in the RIS-Aided mmWave Internet of Vehicles.
IEEE Internet Things J., January, 2024

Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS.
IEEE Trans. Serv. Comput., 2024

Anti-Compression Contrastive Facial Forgery Detection.
IEEE Trans. Multim., 2024

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.
IEEE Trans. Multim., 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry.
IEEE Trans. Dependable Secur. Comput., 2024

Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making.
Syst., 2024

Dismantling complex networks with graph contrastive learning and multi-hop aggregation.
Inf. Sci., 2024

Deep semi-supervised learning for medical image segmentation: A review.
Expert Syst. Appl., 2024

Visual Agents as Fast and Slow Thinkers.
CoRR, 2024

Evaluating Large Language Models for Anxiety and Depression Classification using Counseling and Psychotherapy Transcripts.
CoRR, 2024

BioKGBench: A Knowledge Graph Checking Benchmark of AI Agent for Biomedical Science.
CoRR, 2024

Peer Review as A Multi-Turn and Long-Context Dialogue with Role-Based Interactions.
CoRR, 2024

Data-driven optimization for energy-constrained dietary supplement scheduling: A bounded cut MP-DQN approach.
Comput. Ind. Eng., 2024

AugMixSpeech: A Data Augmentation Method and Consistency Regularization for Mandarin Automatic Speech Recognition.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

Random Entangled Tokens for Adversarially Robust Vision Transformer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Homomorphic Compression: Making Text Processing on Compression Unlimited.
Proc. ACM Manag. Data, December, 2023

Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms.
IEEE Trans. Parallel Distributed Syst., October, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023

A Bi-Temporal-Feature-Difference- and Object-Based Method for Mapping Rice-Crayfish Fields in Sihong, China.
Remote. Sens., February, 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023

Solve the Puzzle of Instance Segmentation in Videos: A Weakly Supervised Framework With Spatio-Temporal Collaboration.
IEEE Trans. Circuits Syst. Video Technol., 2023

A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection.
CoRR, 2023

Classification and Prediction of Driver's Mental Workload Based on Long Time Sequences and Multiple Physiological Factors.
IEEE Access, 2023

LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Domain Knowledge-Based Semi-supervised Pancreas Segmentation Approach.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

TransFlow: Transformer as Flow Learner.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Private Image Generation with Dual-Purpose Auxiliary Classifier.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

RaceBench: A Triggerable and Observable Concurrency Bug Benchmark.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Robust Channel Estimation for RIS-Aided Millimeter-Wave System With RIS Blockage.
IEEE Trans. Veh. Technol., 2022

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

Video Captioning Using Global-Local Representation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

Improvement on a batch authenticated key agreement scheme.
Frontiers Comput. Sci., 2022

Bio-physiological-signals-based VR cybersickness detection.
CCF Trans. Pervasive Comput. Interact., 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Vulnerability Detection Using Deep Learning Based Function Classification.
Proceedings of the Network and System Security - 16th International Conference, 2022

PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

DeepFake Disrupter: The Detector of DeepFake Is My Friend.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Wideband Channel Estimation for IRS-Aided Systems in the Face of Beam Squint.
IEEE Trans. Wirel. Commun., 2021

Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021

Smart Applications in Edge Computing: Overview on Authentication and Data Security.
IEEE Internet Things J., 2021

CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021

Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

PLP 2021: Workshop on Programming Language Processing.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Are Android Apps Being Protected Well Against Attacks?
IEEE Wirel. Commun., 2020

Antenna Array Diagnosis for Millimeter-Wave MIMO Systems.
IEEE Trans. Veh. Technol., 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

IMShell-Dec: Pay More Attention to External Links in PowerShell.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

A Pre-restructured Learning-ISTA Deep Network for Millimeter Wave Antenna Array Diagnosis.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Revocable Federated Learning: A Benchmark of Federated Forest.
CoRR, 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

An Event-Based User Experience Evaluation Method for Virtual Reality Applications.
Proceedings of the 2019 IEEE SmartWorld, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A Hybrid User Experience Evaluation Method for Mobile Games.
IEEE Access, 2018

2017
Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Collaborative 'many to many' DDoS detection in cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2016

CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

2012
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012


  Loading...