Siqi Lu

Orcid: 0000-0002-8593-9636

According to our database1, Siqi Lu authored at least 43 papers between 2016 and 2026.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2026
Entropy-regulated cross-modal generative fusion for multimodal network intrusion detection.
Inf. Fusion, 2026

2025
Enhancing privacy and security in IoT: a CoAP protocol analysis and improvement approach.
J. Supercomput., June, 2025

ZeroReg3D: A Zero-shot Registration Pipeline for 3D Consecutive Histopathology Image Reconstruction.
CoRR, June, 2025

IRS: Incremental Relationship-guided Segmentation for Digital Pathology.
CoRR, May, 2025

DeepAndes: A Self-Supervised Vision Foundation Model for Multi-Spectral Remote Sensing Imagery of the Andes.
CoRR, April, 2025

IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships.
IEEE Trans. Netw. Serv. Manag., February, 2025

MagNet: Multi-Level Attention Graph Network for Predicting High-Resolution Spatial Transcriptomics.
CoRR, February, 2025

KPIs 2024 Challenge: Advancing Glomerular Segmentation from Patch- to Slide-Level.
CoRR, February, 2025

Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic.
J. Inf. Secur. Appl., 2025

EUAV: An enhanced blockchain-based two-factor anonymous authentication key agreement protocol for UAV networks.
Comput. Networks, 2025

SAAChain: release and storage platform of digital works based on non-fungible tokens.
Comput. J., 2025

ASIGN: An Anatomy-aware Spatial Imputation Graphic Network for 3D Spatial Transcriptomics.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Privacy preserving and secure robust federated learning: A survey.
Concurr. Comput. Pract. Exp., June, 2024

Speed-Up DDPM for Real-Time Underwater Image Enhancement.
IEEE Trans. Circuits Syst. Video Technol., May, 2024

Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement.
IEEE Trans. Dependable Secur. Comput., 2024

An SGX-based online voting protocol with maximum voter privacy.
J. Syst. Archit., 2024

Underwater image enhancement based on global features and prior distribution guided.
Image Vis. Comput., 2024

GloFinder: AI-empowered QuPath Plugin for WSI-level Glomerular Detection, Visualization, and Curation.
CoRR, 2024

How Good Are We? Evaluating Cell AI Foundation Models in Kidney Pathology with Human-in-the-Loop Enrichment.
CoRR, 2024

Assessment of Cell Nuclei AI Foundation Models in Kidney Pathology.
CoRR, 2024

AI Foundation Models in Remote Sensing: A Survey.
CoRR, 2024

Observational equivalence and security games: Enhancing the formal analysis of security protocols.
Comput. Secur., 2024

metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024

SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023

Underwater image enhancement method based on denoising diffusion probabilistic model.
J. Vis. Commun. Image Represent., October, 2023

A Quantitative Detection Algorithm for Multi-Test Line Lateral Flow Immunoassay Applied in Smartphones.
Sensors, July, 2023

A Novel Mine-Specific Eco-Environment Index (MSEEI) for Mine Ecological Environment Monitoring Using Landsat Imagery.
Remote. Sens., February, 2023

PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy.
IEEE Trans. Comput. Soc. Syst., 2023

2022
Assessing Elevation-Based Forest Dynamics over Space and Time toward REDD+ MRV in Upland Myanmar.
Remote. Sens., December, 2022

SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts.
Empir. Softw. Eng., 2022

A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022

2021
A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks.
J. Parallel Distributed Comput., 2021

Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations.
Inf. Technol. Control., 2021

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., 2021

ESD-PCM: Constructing Reliable Super Dense Phase Change Memory Under Write Disturbance.
Proceedings of the 26th IEEE European Test Symposium, 2021

2020
Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks.
Mob. Inf. Syst., 2020

Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Manual Audit for BitUnits Contracts.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2017
A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Commun. Syst., 2017

2016
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.
Int. J. Commun. Syst., 2016


  Loading...