Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

Baodong Qin , Robert H Deng , Shengli Liu , Siqi Ma
IEEE Transactions on Information Forensics and Security 10 ( 7) 1384 -1393

194
2015
Key-Policy Weighted Attribute based Encryption for fine-grained access control

Ximeng Liu , Hui Zhu , Jianfeng Ma , Jun Ma
international conference on communications 694 -699

16
2014
VuRLE: Automatic vulnerability detection and repair by learning from examples.(2017)

MA SIQI , Ferdian THUNG , David LO , Cong SUN
Computer security ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15: Proceedings 10493 229 -246

Active Semi-supervised Approach for Checking App Behavior against its Description.(2015)

MA SIQI , Shaowei WANG , LO David , Robert H DENG
2015 IEEE 39th Annual Computers Software and Applications Conference (COMPSAC) 1 -5

2015
Active Semi-supervised Approach for Checking App Behavior against its Description.(2015)

MA SIQI , Shaowei WANG , LO David , Robert H DENG
2015 IEEE 39th Annual Computers Software and Applications Conference (COMPSAC): 1-5 July 2015, Taichung, Taiwan: Proceedings 179 -184

A New Efficient Verifiable Fuzzy Keyword Search Scheme.

Xiaofeng Chen , Qiang Tang , Jin Li , Jianfeng Wang
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3 ( 4) 61 -71

20
2012
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing

Yang Liu , Zhuo Ma , Ximeng Liu , Siqi Ma
arXiv: Cryptography and Security

58
2019
Revocable Federated Learning: A Benchmark of Federated Forest

Ximeng Liu , Siqi Ma , Yang Liu , Zhuzhu Wang
arXiv: Cryptography and Security

12
2019
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.

Anmin Fu , Hyoungshick Kim , Surya Nepal , Yansong Gao
arXiv: Cryptography and Security

87
2020
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing

Yang Liu , Zhuo Ma , Ximeng Liu , Siqi Ma
international conference on distributed computing systems 1 -11

33
2020
Fine with “1234”? An Analysis of SMS One-Time Password Randomness in Android Apps

Elisa Bertino , Diethelm Ostry , Juanru Li , Hyoungshick Kim
international conference on software engineering

2021
Finding flaws from password authentication code in Android apps

Siqi Ma , Elisa Bertino , Surya Nepal , Juanru Li
european symposium on research in computer security 619 -637

3
2019
Are Android Apps Being Protected Well Against Attacks

Siqi Ma , Yang Liu , Surya Nepal
IEEE Wireless Communications 27 ( 3) 66 -71

2020
AClog: Attack Chain Construction Based on Log Correlation

Teng Li , Jianfeng Ma , Qingqi Pei , Yulong Shen
2019 IEEE Global Communications Conference (GLOBECOM) 1 -6

6
2019
Active Semi-supervised Approach for Checking App Behavior against Its Description

Siqi Ma , Shaowei Wang , David Lo , Robert Huijie Deng
computer software and applications conference 2 179 -184

39
2015
Orchestration or Automation: Authentication Flaw Detection in Android Apps

Siqi Ma , Juanru Li , Surya Nepal , Diethelm Ostry
IEEE Transactions on Dependable and Secure Computing 1 -1

1
2021
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication

Yang Liu , Yilong Yang , Zhuo Ma , Ximeng Liu
international workshop on quality of service 1 -10

2020
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs

Xinghua Li , Huijuan Zhang , Yanbing Ren , Siqi Ma
IEEE Internet of Things Journal 7 ( 12) 11789 -11802

1
2020
Smart Applications in Edge Computing: Overview on Authentication and Data Security

Xinghua Li , Ting Chen , Qingfeng Cheng , Siqi Ma
IEEE Internet of Things Journal 8 ( 6) 4063 -4080

25
2021