Follow
Siqi Ma
Title
Cited by
Cited by
Year
Attribute-based encryption with efficient verifiable outsourced decryption
B Qin, RH Deng, S Liu, S Ma
IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015
2242015
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
1832020
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer Science and Information Systems 10 (2), 667-684, 2013
1352013
Cdrep: Automatic repair of cryptographic misuses in android applications
S Ma, D Lo, T Li, RH Deng
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
992016
Privacy-Preserving Object Detection for Medical Images with Faster R-CNN
Y Liu, Z Ma, X Liu, S Ma, K Ren
IEEE Transactions on Information Forensics and Security, 2019
862019
Smartshield: Automatic smart contract protection made easy
Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
822020
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
822017
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing
Y Liu, Z Ma, X Liu, S Ma, S Nepal, RH Deng, K Ren
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
652020
Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing
Y Liu, Z Ma, X Liu, S Ma, S Nepal, R Deng
arXiv preprint arXiv:1907.10218, 2019
612019
Ethploit: From fuzzing to efficient exploit generation against smart contracts
Q Zhang, Y Wang, J Li, S Ma
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
542020
Active semi-supervised approach for checking app behavior against its description
S Ma, S Wang, D Lo, RH Deng, C Sun
2015 IEEE 39Th annual computer software and applications conference 2, 179-184, 2015
472015
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs
X Li, H Zhang, Y Ren, S Ma, B Luo, J Weng, J Ma, X Huang
IEEE Internet of Things Journal 7 (12), 11789-11802, 2020
462020
Smart Applications in Edge Computing: Overview on Authentication and Data Security
X Li, T Chen, Q Cheng, S Ma, J Ma
IEEE Internet of Things Journal 8 (6), 4063-4080, 2020
442020
An empirical study of sms one-time password authentication in android apps
S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ...
Proceedings of the 35th annual computer security applications conference …, 2019
332019
EmIr-Auth: Eye-movement and Iris Based Portable Remote Authentication for Smart Grid
Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao
IEEE Transactions on Industrial Informatics, 2019
332019
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012
322012
DeepFake Disrupter: The Detector of DeepFake Is My Friend
X Wang, J Huang, S Ma, S Nepal, C Xu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
222022
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK
X Jin, X Xiao, S Jia, W Gao, D Gu, H Zhang, S Ma, Z Qian, J Li
IEEE Symposium on Security and Privacy (S&P), 2022
192022
Adaptable key-policy attribute-based encryption with time interval
S Ma, J Lai, RH Deng, X Ding
Soft Computing 21, 6191-6200, 2017
192017
VRFMS: Verifiable Ranked Fuzzy Multi-keyword Search over Encrypted Data
X Li, Q Tong, J Zhao, Y Miao, S Ma, J Weng, J Ma, KKR Choo
IEEE Transactions on Services Computing, 2022
182022
The system can't perform the operation now. Try again later.
Articles 1–20