Attribute-based encryption with efficient verifiable outsourced decryption B Qin, RH Deng, S Liu, S Ma IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015 | 141 | 2015 |
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen Computer Science and Information Systems 10 (2), 667-684, 2013 | 108 | 2013 |
Cdrep: Automatic repair of cryptographic misuses in android applications S Ma, D Lo, T Li, RH Deng Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 60 | 2016 |
CDRep: Automatic repair of cryptographic-misuses in Android applications.(2016) S MA, D LO, T LI, RH DENG ASIA CCS'16: Proceedings of the 11th ACM Asia Conference on Computer and …, 0 | 60* | |
Vurle: Automatic vulnerability detection and repair by learning from examples S Ma, F Thung, D Lo, C Sun, RH Deng European Symposium on Research in Computer Security, 229-246, 2017 | 28 | 2017 |
Active semi-supervised approach for checking app behavior against its description M Siqi, S Wang, LO David, RH DENG, C Sun IEEE, 2015 | 28 | 2015 |
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen JoWUA 3 (4), 61-71, 2012 | 28 | 2012 |
Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing Y Liu, Z Ma, X Liu, S Ma, S Nepal, R Deng arXiv preprint arXiv:1907.10218, 2019 | 19 | 2019 |
Key-Policy Weighted Attribute based Encryption for fine-grained access control X Liu, H Zhu, J Ma, J Ma, S Ma Communications Workshops (ICC), 2014 IEEE International Conference on, 694-699, 2014 | 15 | 2014 |
Privacy-Preserving Object Detection for Medical Images with Faster R-CNN Y Liu, Z Ma, X Liu, S Ma, K Ren IEEE Transactions on Information Forensics and Security, 2019 | 13 | 2019 |
Adaptable key-policy attribute-based encryption with time interval S Ma, J Lai, RH Deng, X Ding Soft Computing 21 (20), 6191-6200, 2017 | 13 | 2017 |
Smartshield: Automatic smart contract protection made easy Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 5 | 2020 |
EmIr-Auth: Eye-movement and Iris Based Portable Remote Authentication for Smart Grid Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao IEEE Transactions on Industrial Informatics, 2019 | 5 | 2019 |
AClog: attack chain construction based on log correlation T Li, J Ma, Q Pei, Y Shen, C Lin, S Ma, MS Obaidat 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 4 | 2019 |
Ethploit: From fuzzing to efficient exploit generation against smart contracts Q Zhang, Y Wang, J Li, S Ma 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 3 | 2020 |
An empirical study of SMS one-time password authentication in Android apps S Ma, R Feng, J Li, Y Liu, S Nepal, E Bertino, RH Deng, Z Ma, S Jha Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 3 | 2019 |
Finding Flaws from Password Authentication Code in Android Apps S Ma, E Bertino, S Nepal, J Li, D Ostry, RH Deng, S Jha European Symposium on Research in Computer Security, 619-637, 2019 | 3 | 2019 |
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification J Wang, S Ma, Y Zhang, J Li, Z Ma, L Mai, T Chen, D Gu 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 2 | 2019 |
Collaborative'many to many'DDoS detection in cloud S Ma, D Lo, N Xi International Journal of Ad Hoc and Ubiquitous Computing 23 (3-4), 192-202, 2016 | 2 | 2016 |
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features L Mai, Y Yan, S Jia, S Wang, J Wang, J Li, S Ma, D Gu International Conference on Information and Communications Security, 430-446, 2019 | 1 | 2019 |