


Остановите войну!
for scientists:
Siqi Ma
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j19]Qingfeng Cheng, Ting Chen, Siqi Ma, Xinghua Li:
Improvement on a batch authenticated key agreement scheme. Frontiers Comput. Sci. 16(2): 162803 (2022) - [j18]Xinghua Li
, Hengyou Zhang
, Yinbin Miao
, Siqi Ma
, Jianfeng Ma
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles. IEEE Internet Things J. 9(5): 3359-3371 (2022) - [j17]Hongyang Li, Qingfeng Cheng
, Xinghua Li
, Siqi Ma
, Jianfeng Ma
:
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing. IEEE Syst. J. 16(2): 1832-1841 (2022) - [j16]Yang Liu
, Zhuo Ma
, Ximeng Liu
, Siqi Ma, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j15]Xiaohan Zhang
, Xinghua Li
, Yinbin Miao
, Xizhao Luo
, Yunwei Wang
, Siqi Ma
, Jian Weng
:
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT. IEEE Trans. Ind. Informatics 18(7): 4456-4465 (2022) - [j14]Siqi Ma
, Wenqian Shen
, Xinyu Gao
, Jianping An
:
Robust Channel Estimation for RIS-Aided Millimeter-Wave System With RIS Blockage. IEEE Trans. Veh. Technol. 71(5): 5621-5626 (2022) - [c23]Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - 2021
- [j13]Xinghua Li
, Ting Chen, Qingfeng Cheng
, Siqi Ma
, Jianfeng Ma
:
Smart Applications in Edge Computing: Overview on Authentication and Data Security. IEEE Internet Things J. 8(6): 4063-4080 (2021) - [j12]Ranran Sun
, Bin Yang
, Siqi Ma
, Yulong Shen
, Xiaohong Jiang
:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j11]Siqi Ma
, Wenqian Shen
, Jianping An
, Lajos Hanzo
:
Wideband Channel Estimation for IRS-Aided Systems in the Face of Beam Squint. IEEE Trans. Wirel. Commun. 20(10): 6240-6253 (2021) - [c22]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. ACSAC 2021: 311-322 - [c21]Yunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li:
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation. Inscrypt 2021: 129-148 - [c20]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal
, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c19]Chang Xu, Siqi Ma, David Lo:
PLP 2021: Workshop on Programming Language Processing. KDD 2021: 4171-4172 - [c18]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. QRS 2021: 702-713 - [i10]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i9]Siqi Ma, Wenqian Shen, Jianping An, Lajos Hanzo:
Antenna Array Diagnosis for Millimeter-Wave MIMO Systems. CoRR abs/2106.02862 (2021) - [i8]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. CoRR abs/2110.11603 (2021) - [i7]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. CoRR abs/2111.04005 (2021) - [i6]Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - [i5]Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma:
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis. CoRR abs/2112.06146 (2021) - [i4]Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code. CoRR abs/2112.06702 (2021) - 2020
- [j10]Xinghua Li
, Huijuan Zhang
, Yanbing Ren
, Siqi Ma, Bin Luo
, Jian Weng
, Jianfeng Ma
, Xiaoming Huang:
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 7(12): 11789-11802 (2020) - [j9]Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Yang Liu
, Siqi Ma, Kui Ren
, Chang Yao
:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6597-6606 (2020) - [j8]Siqi Ma
, Wenqian Shen
, Jianping An
, Lajos Hanzo
:
Antenna Array Diagnosis for Millimeter-Wave MIMO Systems. IEEE Trans. Veh. Technol. 69(4): 4585-4589 (2020) - [j7]Siqi Ma, Yang Liu, Surya Nepal
:
Are Android Apps Being Protected Well Against Attacks? IEEE Wirel. Commun. 27(3): 66-71 (2020) - [c17]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal
, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c16]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal
, Robert H. Deng
, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c15]Wei Wang, Yongfeng Ma, Siqi Ma, Jianguo Li, Xiangming Li:
A Pre-restructured Learning-ISTA Deep Network for Millimeter Wave Antenna Array Diagnosis. IWCMC 2020: 183-187 - [c14]Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma:
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication. IWQoS 2020: 1-10 - [c13]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, YunBo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. SEC 2020: 189-202 - [c12]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal
, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [c11]Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma:
EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. SANER 2020: 116-126 - [i3]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020)
2010 – 2019
- 2019
- [c10]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c9]Siqi Ma, Elisa Bertino, Surya Nepal
, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c8]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c7]Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - [c6]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c5]Xiaoping Che, Siqi Ma, Qi Yu, Chenfeng Yue:
An Event-Based User Experience Evaluation Method for Virtual Reality Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 767-774 - [i2]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019) - [i1]Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren:
Revocable Federated Learning: A Benchmark of Federated Forest. CoRR abs/1911.03242 (2019) - 2018
- [j6]Qi Yu, Xiaoping Che
, Siqi Ma, Shirui Pan
, Yuxiang Yang, Weiwei Xing, Ximeng Wang
:
A Hybrid User Experience Evaluation Method for Mobile Games. IEEE Access 6: 49067-49079 (2018) - 2017
- [j5]Siqi Ma, Junzuo Lai, Robert H. Deng
, Xuhua Ding
:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017) - [c4]Siqi Ma, Ferdian Thung, David Lo
, Cong Sun
, Robert H. Deng
:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS (2) 2017: 229-246 - 2016
- [j4]Siqi Ma, David Lo
, Ning Xi:
Collaborative 'many to many' DDoS detection in cloud. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 192-202 (2016) - [c3]Siqi Ma, David Lo
, Teng Li, Robert H. Deng
:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. AsiaCCS 2016: 711-722 - 2015
- [j3]Baodong Qin, Robert H. Deng
, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(7): 1384-1393 (2015) - [c2]Siqi Ma, Shaowei Wang, David Lo
, Robert Huijie Deng
, Cong Sun
:
Active Semi-supervised Approach for Checking App Behavior against Its Description. COMPSAC 2015: 179-184 - 2014
- [c1]Ximeng Liu
, Hui Zhu, Jianfeng Ma, Jun Ma, Siqi Ma:
Key-Policy Weighted Attribute based Encryption for fine-grained access control. ICC Workshops 2014: 694-699 - 2013
- [j2]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - 2012
- [j1]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-29 23:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint