Select Publications
By Dr Siqi Ma
Book Chapters
2022, 'Vulnerability Detection Using Deep Learning Based Function Classification', in , pp. 3 - 22, http://dx.doi.org/10.1007/978-3-031-23020-2_1
,2020, 'Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features', in , pp. 430 - 446, http://dx.doi.org/10.1007/978-3-030-41579-2_25
,2020, 'IMShell-Dec: Pay More Attention to External Links in PowerShell', in , pp. 189 - 202, http://dx.doi.org/10.1007/978-3-030-58201-2_13
,2017, 'VuRLE: Automatic vulnerability detection and repair by learning from examples', in , pp. 229 - 246, http://dx.doi.org/10.1007/978-3-319-66399-9_13
,Journal articles
2024, 'D2MTS: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 927 - 942, http://dx.doi.org/10.1109/TKDE.2023.3294503
,2024, 'Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS', IEEE Transactions on Services Computing, 17, pp. 589 - 603, http://dx.doi.org/10.1109/TSC.2024.3354240
,2024, 'Range Specification Bug Detection in Flight Control System Through Fuzzing', IEEE Transactions on Software Engineering, 50, pp. 461 - 473, http://dx.doi.org/10.1109/TSE.2024.3354739
,2024, 'PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 781 - 794, http://dx.doi.org/10.1109/TKDE.2023.3295451
,2024, '<sc>GNNDroid</sc>: Graph-Learning based Malware Detection for Android Apps with Native Code', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3444913
,2024, 'A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 59 - 73, http://dx.doi.org/10.1109/TIFS.2023.3318936
,2024, 'A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects', IEEE Transactions on Information Forensics and Security, 19, pp. 722 - 734, http://dx.doi.org/10.1109/TIFS.2023.3326985
,2024, 'A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services', IEEE Transactions on Computers, 73, pp. 58 - 72, http://dx.doi.org/10.1109/TC.2023.3318403
,2024, 'Anti-Compression Contrastive Facial Forgery Detection', IEEE Transactions on Multimedia, 26, pp. 6166 - 6177, http://dx.doi.org/10.1109/TMM.2023.3347103
,2024, 'EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry', IEEE Transactions on Dependable and Secure Computing, 21, pp. 1544 - 1556, http://dx.doi.org/10.1109/TDSC.2023.3286182
,2024, 'FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 8140 - 8154, http://dx.doi.org/10.1109/TIFS.2024.3433537
,2023, 'A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network', IEEE Transactions on Cloud Computing, 11, pp. 3381 - 3395, http://dx.doi.org/10.1109/TCC.2023.3287552
,2023, 'Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System', IEEE Internet of Things Journal, 10, pp. 16715 - 16726, http://dx.doi.org/10.1109/JIOT.2023.3270300
,2023, 'Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms', IEEE Transactions on Parallel and Distributed Systems, 34, pp. 2699 - 2717, http://dx.doi.org/10.1109/TPDS.2023.3294341
,2023, 'CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis', IET Information Security, 17, pp. 582 - 597, http://dx.doi.org/10.1049/ise2.12117
,2023, 'Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis', IEEE Transactions on Knowledge and Data Engineering, 35, pp. 5665 - 5679, http://dx.doi.org/10.1109/TKDE.2022.3155924
,2023, 'DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services', IEEE Transactions on Mobile Computing, 22, pp. 3287 - 3302, http://dx.doi.org/10.1109/TMC.2022.3141398
,2023, 'μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1461 - 1475, http://dx.doi.org/10.1109/TDSC.2022.3155693
,2023, 'Privacy-Preserving Top- κ Spatial Keyword Queries in Fog-Based Cloud Computing', IEEE Transactions on Services Computing, 16, pp. 504 - 514, http://dx.doi.org/10.1109/TSC.2021.3130633
,2023, 'Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization', IEEE Transactions on Multimedia, 26, pp. 5014 - 5025, http://dx.doi.org/10.1109/TMM.2023.3330089
,2023, 'VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data', IEEE Transactions on Services Computing, 16, pp. 698 - 710, http://dx.doi.org/10.1109/TSC.2021.3140092
,2022, 'Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning', IEEE Transactions on Industrial Informatics, 18, pp. 7463 - 7474, http://dx.doi.org/10.1109/TII.2022.3168029
,2022, 'A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT', IEEE Transactions on Industrial Informatics, 18, pp. 4456 - 4465, http://dx.doi.org/10.1109/TII.2021.3123312
,2022, 'Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing', IEEE Systems Journal, 16, pp. 1832 - 1841, http://dx.doi.org/10.1109/JSYST.2021.3112581
,2022, 'Improvement on a batch authenticated key agreement scheme', Frontiers of Computer Science, 16, http://dx.doi.org/10.1007/s11704-020-0194-7
,2022, 'CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles', IEEE Internet of Things Journal, 9, pp. 3359 - 3371, http://dx.doi.org/10.1109/JIOT.2021.3098221
,2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
,2022, 'Privacy-Preserving Object Detection for Medical Images with Faster R-CNN', IEEE Transactions on Information Forensics and Security, 17, pp. 69 - 84, http://dx.doi.org/10.1109/TIFS.2019.2946476
,2022, 'Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3194704
,2021, 'Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control', IEEE Transactions on Communications, 69, pp. 6198 - 6212, http://dx.doi.org/10.1109/TCOMM.2021.3089694
,2021, 'Smart Applications in Edge Computing: Overview on Authentication and Data Security', IEEE Internet of Things Journal, 8, pp. 4063 - 4080, http://dx.doi.org/10.1109/JIOT.2020.3019297
,2020, 'PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs', IEEE Internet of Things Journal, 7, pp. 11789 - 11802, http://dx.doi.org/10.1109/JIOT.2020.3001381
,2020, 'EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid', IEEE Transactions on Industrial Informatics, 16, pp. 6597 - 6606, http://dx.doi.org/10.1109/TII.2019.2946047
,2020, 'Are android apps being protected well against attacks?', IEEE Wireless Communications, 27, pp. 66 - 71, http://dx.doi.org/10.1109/MWC.001.1900432
,2017, 'Adaptable key-policy attribute-based encryption with time interval', Soft Computing, 21, pp. 6191 - 6200, http://dx.doi.org/10.1007/s00500-016-2177-z
,2016, 'Collaborative 'many to many' DDoS detection in cloud', International Journal of Ad Hoc and Ubiquitous Computing, 23, pp. 192 - 202, http://dx.doi.org/10.1504/IJAHUC.2016.10000397
,2015, 'Attribute-based encryption with efficient verifiable outsourced decryption', IEEE Transactions on Information Forensics and Security, 10, pp. 1384 - 1393, http://dx.doi.org/10.1109/TIFS.2015.2410137
,Conference Papers
2023, 'PASS2EDIT: A Multi-Step Generative Model for Guessing Edited Passwords', in SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, USENIX Association, Anaheim, CA, pp. 983 - 1000, presented at 32nd USENIX Security Symposium, Anaheim, CA, 09 August 2023 - 11 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620293
,2023, 'LibScan: Towards More Precise Third-Party Library Identification for Android Applications', in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, pp. 3385 - 3402, presented at SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, Anaheim, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620427
,2023, 'Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning', in 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, pp. 4607 - 4624, presented at 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620495
,2023, 'RaceBench: A Triggerable and Observable Concurrency Bug Benchmark', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 415 - 428, http://dx.doi.org/10.1145/3579856.3595787
,2023, 'Private Image Generation with Dual-Purpose Auxiliary Classifier', in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, pp. 20361 - 20370, presented at 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 17 June 2023 - 24 June 2023, http://dx.doi.org/10.1109/cvpr52729.2023.01950
,2022, 'PrIntFuzz: Fuzzing Linux drivers via automated virtual device simulation', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 404 - 416, http://dx.doi.org/10.1145/3533767.3534226
,2022, 'Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK', in Proceedings - IEEE Symposium on Security and Privacy, pp. 650 - 665, http://dx.doi.org/10.1109/SP46214.2022.9833650
,2022, 'Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search', in Proceedings - International Conference on Software Engineering, pp. 462 - 473, http://dx.doi.org/10.1145/3510003.3510084
,2022, 'DeepFake Disrupter: The Detector of DeepFake Is My Friend', in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 14900 - 14909, http://dx.doi.org/10.1109/CVPR52688.2022.01450
,