Siqi Ma
Siqi Ma
在 uq.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Attribute-based encryption with efficient verifiable outsourced decryption
B Qin, RH Deng, S Liu, S Ma
IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015
1412015
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer Science and Information Systems 10 (2), 667-684, 2013
1082013
Cdrep: Automatic repair of cryptographic misuses in android applications
S Ma, D Lo, T Li, RH Deng
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
602016
CDRep: Automatic repair of cryptographic-misuses in Android applications.(2016)
S MA, D LO, T LI, RH DENG
ASIA CCS'16: Proceedings of the 11th ACM Asia Conference on Computer and …, 0
60*
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
European Symposium on Research in Computer Security, 229-246, 2017
282017
Active semi-supervised approach for checking app behavior against its description
M Siqi, S Wang, LO David, RH DENG, C Sun
IEEE, 2015
282015
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
JoWUA 3 (4), 61-71, 2012
282012
Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing
Y Liu, Z Ma, X Liu, S Ma, S Nepal, R Deng
arXiv preprint arXiv:1907.10218, 2019
192019
Key-Policy Weighted Attribute based Encryption for fine-grained access control
X Liu, H Zhu, J Ma, J Ma, S Ma
Communications Workshops (ICC), 2014 IEEE International Conference on, 694-699, 2014
152014
Privacy-Preserving Object Detection for Medical Images with Faster R-CNN
Y Liu, Z Ma, X Liu, S Ma, K Ren
IEEE Transactions on Information Forensics and Security, 2019
132019
Adaptable key-policy attribute-based encryption with time interval
S Ma, J Lai, RH Deng, X Ding
Soft Computing 21 (20), 6191-6200, 2017
132017
Smartshield: Automatic smart contract protection made easy
Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
52020
EmIr-Auth: Eye-movement and Iris Based Portable Remote Authentication for Smart Grid
Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao
IEEE Transactions on Industrial Informatics, 2019
52019
AClog: attack chain construction based on log correlation
T Li, J Ma, Q Pei, Y Shen, C Lin, S Ma, MS Obaidat
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
42019
Ethploit: From fuzzing to efficient exploit generation against smart contracts
Q Zhang, Y Wang, J Li, S Ma
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
32020
An empirical study of SMS one-time password authentication in Android apps
S Ma, R Feng, J Li, Y Liu, S Nepal, E Bertino, RH Deng, Z Ma, S Jha
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
32019
Finding Flaws from Password Authentication Code in Android Apps
S Ma, E Bertino, S Nepal, J Li, D Ostry, RH Deng, S Jha
European Symposium on Research in Computer Security, 619-637, 2019
32019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification
J Wang, S Ma, Y Zhang, J Li, Z Ma, L Mai, T Chen, D Gu
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
22019
Collaborative'many to many'DDoS detection in cloud
S Ma, D Lo, N Xi
International Journal of Ad Hoc and Ubiquitous Computing 23 (3-4), 192-202, 2016
22016
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
L Mai, Y Yan, S Jia, S Wang, J Wang, J Li, S Ma, D Gu
International Conference on Information and Communications Security, 430-446, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20