Siqi Ma

Orcid: 0000-0003-3479-5713

According to our database1, Siqi Ma authored at least 79 papers between 2013 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Automated TEE Adaptation With LLMs: Identifying, Transforming, and Porting Sensitive Functions in Programs.
IEEE Trans. Software Eng., March, 2026

FGRW: Fine-Grained Reversible Watermarking Based on Distribution-Adaptive Contrastive Augmentation Across Diverse Domains.
IEEE Trans. Dependable Secur. Comput., 2026

2025
Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent.
ACM Trans. Softw. Eng. Methodol., May, 2025

Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2025

Environment-Adaptive Representation Interaction for Privacy-Perturbed Graphs Against Deceptive OOD Attacks.
IEEE Trans. Inf. Forensics Secur., 2025

Accuracy-Enabling Differential Privacy-Preserving Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2025

GNNDroid: Graph-Learning Based Malware Detection for Android Apps With Native Code.
IEEE Trans. Dependable Secur. Comput., 2025

SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation.
IEEE Trans. Dependable Secur. Comput., 2025

Hotpatching on the Fly - Mitigating Drone Incidents Arising From Incorrect Configuration.
IEEE Trans. Dependable Secur. Comput., 2025

2024
GPU-based butterfly counting.
VLDB J., September, 2024

Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS.
IEEE Trans. Knowl. Data Eng., February, 2024

A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS.
IEEE Trans. Serv. Comput., 2024

Anti-Compression Contrastive Facial Forgery Detection.
IEEE Trans. Multim., 2024

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.
IEEE Trans. Multim., 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry.
IEEE Trans. Dependable Secur. Comput., 2024

Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making.
Syst., 2024

Dismantling complex networks with graph contrastive learning and multi-hop aggregation.
Inf. Sci., 2024

2023
Homomorphic Compression: Making Text Processing on Compression Unlimited.
Proc. ACM Manag. Data, December, 2023

Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms.
IEEE Trans. Parallel Distributed Syst., October, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection.
CoRR, 2023

RaceBench: A Triggerable and Observable Concurrency Bug Benchmark.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

Improvement on a batch authenticated key agreement scheme.
Frontiers Comput. Sci., 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Vulnerability Detection Using Deep Learning Based Function Classification.
Proceedings of the Network and System Security - 16th International Conference, 2022

PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

DeepFake Disrupter: The Detector of DeepFake Is My Friend.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021

Smart Applications in Edge Computing: Overview on Authentication and Data Security.
IEEE Internet Things J., 2021

Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

PLP 2021: Workshop on Programming Language Processing.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Are Android Apps Being Protected Well Against Attacks?
IEEE Wirel. Commun., 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020

EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

IMShell-Dec: Pay More Attention to External Links in PowerShell.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Collaborative 'many to many' DDoS detection in cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2016

CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013


  Loading...