Select Publications
By Dr Siqi Ma
Journal articles
2024, 'D2MTS: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 927 - 942, http://dx.doi.org/10.1109/TKDE.2023.3294503
,2024, 'Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS', IEEE Transactions on Services Computing, 17, pp. 589 - 603, http://dx.doi.org/10.1109/TSC.2024.3354240
,2024, 'Range Specification Bug Detection in Flight Control System Through Fuzzing', IEEE Transactions on Software Engineering, 50, pp. 461 - 473, http://dx.doi.org/10.1109/TSE.2024.3354739
,2024, 'PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 781 - 794, http://dx.doi.org/10.1109/TKDE.2023.3295451
,2024, '<sc>GNNDroid</sc>: Graph-Learning based Malware Detection for Android Apps with Native Code', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3444913
,2024, 'A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 59 - 73, http://dx.doi.org/10.1109/TIFS.2023.3318936
,2024, 'A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects', IEEE Transactions on Information Forensics and Security, 19, pp. 722 - 734, http://dx.doi.org/10.1109/TIFS.2023.3326985
,2024, 'A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services', IEEE Transactions on Computers, 73, pp. 58 - 72, http://dx.doi.org/10.1109/TC.2023.3318403
,2024, 'Anti-Compression Contrastive Facial Forgery Detection', IEEE Transactions on Multimedia, 26, pp. 6166 - 6177, http://dx.doi.org/10.1109/TMM.2023.3347103
,2024, 'EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry', IEEE Transactions on Dependable and Secure Computing, 21, pp. 1544 - 1556, http://dx.doi.org/10.1109/TDSC.2023.3286182
,2024, 'FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 8140 - 8154, http://dx.doi.org/10.1109/TIFS.2024.3433537
,2023, 'A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network', IEEE Transactions on Cloud Computing, 11, pp. 3381 - 3395, http://dx.doi.org/10.1109/TCC.2023.3287552
,2023, 'Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System', IEEE Internet of Things Journal, 10, pp. 16715 - 16726, http://dx.doi.org/10.1109/JIOT.2023.3270300
,2023, 'Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms', IEEE Transactions on Parallel and Distributed Systems, 34, pp. 2699 - 2717, http://dx.doi.org/10.1109/TPDS.2023.3294341
,2023, 'CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis', IET Information Security, 17, pp. 582 - 597, http://dx.doi.org/10.1049/ise2.12117
,2023, 'Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis', IEEE Transactions on Knowledge and Data Engineering, 35, pp. 5665 - 5679, http://dx.doi.org/10.1109/TKDE.2022.3155924
,2023, 'DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services', IEEE Transactions on Mobile Computing, 22, pp. 3287 - 3302, http://dx.doi.org/10.1109/TMC.2022.3141398
,2023, 'μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1461 - 1475, http://dx.doi.org/10.1109/TDSC.2022.3155693
,2023, 'Privacy-Preserving Top- κ Spatial Keyword Queries in Fog-Based Cloud Computing', IEEE Transactions on Services Computing, 16, pp. 504 - 514, http://dx.doi.org/10.1109/TSC.2021.3130633
,2023, 'Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization', IEEE Transactions on Multimedia, 26, pp. 5014 - 5025, http://dx.doi.org/10.1109/TMM.2023.3330089
,2023, 'VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data', IEEE Transactions on Services Computing, 16, pp. 698 - 710, http://dx.doi.org/10.1109/TSC.2021.3140092
,2022, 'Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning', IEEE Transactions on Industrial Informatics, 18, pp. 7463 - 7474, http://dx.doi.org/10.1109/TII.2022.3168029
,2022, 'A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT', IEEE Transactions on Industrial Informatics, 18, pp. 4456 - 4465, http://dx.doi.org/10.1109/TII.2021.3123312
,2022, 'Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing', IEEE Systems Journal, 16, pp. 1832 - 1841, http://dx.doi.org/10.1109/JSYST.2021.3112581
,2022, 'Improvement on a batch authenticated key agreement scheme', Frontiers of Computer Science, 16, http://dx.doi.org/10.1007/s11704-020-0194-7
,2022, 'CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles', IEEE Internet of Things Journal, 9, pp. 3359 - 3371, http://dx.doi.org/10.1109/JIOT.2021.3098221
,2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
,2022, 'Privacy-Preserving Object Detection for Medical Images with Faster R-CNN', IEEE Transactions on Information Forensics and Security, 17, pp. 69 - 84, http://dx.doi.org/10.1109/TIFS.2019.2946476
,2022, 'Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3194704
,2021, 'Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control', IEEE Transactions on Communications, 69, pp. 6198 - 6212, http://dx.doi.org/10.1109/TCOMM.2021.3089694
,2021, 'Smart Applications in Edge Computing: Overview on Authentication and Data Security', IEEE Internet of Things Journal, 8, pp. 4063 - 4080, http://dx.doi.org/10.1109/JIOT.2020.3019297
,2020, 'PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs', IEEE Internet of Things Journal, 7, pp. 11789 - 11802, http://dx.doi.org/10.1109/JIOT.2020.3001381
,2020, 'EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid', IEEE Transactions on Industrial Informatics, 16, pp. 6597 - 6606, http://dx.doi.org/10.1109/TII.2019.2946047
,2020, 'Are android apps being protected well against attacks?', IEEE Wireless Communications, 27, pp. 66 - 71, http://dx.doi.org/10.1109/MWC.001.1900432
,2017, 'Adaptable key-policy attribute-based encryption with time interval', Soft Computing, 21, pp. 6191 - 6200, http://dx.doi.org/10.1007/s00500-016-2177-z
,2016, 'Collaborative 'many to many' DDoS detection in cloud', International Journal of Ad Hoc and Ubiquitous Computing, 23, pp. 192 - 202, http://dx.doi.org/10.1504/IJAHUC.2016.10000397
,2015, 'Attribute-based encryption with efficient verifiable outsourced decryption', IEEE Transactions on Information Forensics and Security, 10, pp. 1384 - 1393, http://dx.doi.org/10.1109/TIFS.2015.2410137
,