Siqi Ma
Siqi Ma
Verified email at uq.edu.au
Title
Cited by
Cited by
Year
Attribute-based encryption with efficient verifiable outsourced decryption
B Qin, RH Deng, S Liu, S Ma
IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015
1582015
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer Science and Information Systems 10 (2), 667-684, 2013
1142013
Cdrep: Automatic repair of cryptographic misuses in android applications
S Ma, D Lo, T Li, RH Deng
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
662016
CDRep: Automatic repair of cryptographic-misuses in Android applications.(2016)
S MA, D LO, T LI, RH DENG
ASIA CCS'16: Proceedings of the 11th ACM Asia Conference on Computer and …, 0
66*
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
European Symposium on Research in Computer Security, 229-246, 2017
392017
Active semi-supervised approach for checking app behavior against its description
M Siqi, S Wang, LO David, RH DENG, C Sun
IEEE, 2015
332015
Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing
Y Liu, Z Ma, X Liu, S Ma, S Nepal, R Deng
arXiv preprint arXiv:1907.10218, 2019
312019
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
JoWUA 3 (4), 61-71, 2012
282012
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
242020
Privacy-Preserving Object Detection for Medical Images with Faster R-CNN
Y Liu, Z Ma, X Liu, S Ma, K Ren
IEEE Transactions on Information Forensics and Security, 2019
232019
Smartshield: Automatic smart contract protection made easy
Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
172020
Adaptable key-policy attribute-based encryption with time interval
S Ma, J Lai, RH Deng, X Ding
Soft Computing 21 (20), 6191-6200, 2017
162017
Key-Policy Weighted Attribute based Encryption for fine-grained access control
X Liu, H Zhu, J Ma, J Ma, S Ma
Communications Workshops (ICC), 2014 IEEE International Conference on, 694-699, 2014
152014
EmIr-Auth: Eye-movement and Iris Based Portable Remote Authentication for Smart Grid
Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao
IEEE Transactions on Industrial Informatics, 2019
122019
Ethploit: From fuzzing to efficient exploit generation against smart contracts
Q Zhang, Y Wang, J Li, S Ma
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
102020
An empirical study of SMS one-time password authentication in Android apps
S Ma, R Feng, J Li, Y Liu, S Nepal, E Bertino, RH Deng, Z Ma, S Jha
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
62019
Finding Flaws from Password Authentication Code in Android Apps
S Ma, E Bertino, S Nepal, J Li, D Ostry, RH Deng, S Jha
European Symposium on Research in Computer Security, 619-637, 2019
62019
Smart Applications in Edge Computing: Overview on Authentication and Data Security
X Li, T Chen, Q Cheng, S Ma, J Ma
IEEE Internet of Things Journal 8 (6), 4063-4080, 2020
52020
Revocable Federated Learning: A Benchmark of Federated Forest
Y Liu, Z Ma, X Liu, Z Wang, S Ma, K Ren
arXiv preprint arXiv:1911.03242, 2019
52019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification
J Wang, S Ma, Y Zhang, J Li, Z Ma, L Mai, T Chen, D Gu
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20