Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms

Yihua Hu , Feng Zhang , Yifei Xia , Zhiming Yao
IEEE Transactions on Parallel and Distributed Systems

2023
Deepfake disrupter: The detector of deepfake is my friend

Xueyu Wang , Jiajun Huang , Siqi Ma , Surya Nepal
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 14920 -14929

27
2022
An empirical study of SMS one-time password authentication in android apps (2019)

Siqi Ma , Runhan FENG , Juanru LI , Yang LIU
Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC 2019) 339 -354

2
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

Huihui Gong , Minjing Dong , Siqi Ma , Seyit Camtepe
IEEE Transactions on Multimedia

1
2023
Private Image Generation with Dual-Purpose Auxiliary Classifier

Chen Chen , Daochang Liu , Siqi Ma , Surya Nepal
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 20361 -20370

1
2023
Anti-Compression Contrastive Facial Forgery Detection

Jiajun Huang , Chengbin Du , Xinqi Zhu , Siqi Ma
IEEE Transactions on Multimedia

2023
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects

Ruidong Han , Huihui Gong , Siqi Ma , Juanru Li
IEEE Transactions on Information Forensics and Security

2023
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

Huihui Gong , Minjing Dong , Siqi Ma , Seyit Camtepe
arXiv preprint arXiv:2309.16207

2023
Reducing Adversarial Training Cost with Gradient Approximation

Huihui Gong , Shuo Yang , Siqi Ma , Seyit Camtepe
arXiv preprint arXiv:2309.09464

2023
Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis

Yunlong Lyu , Yi Fang , Yiwei Zhang , Qibin Sun
2022 IEEE Symposium on Security and Privacy (SP) 2096 -2113

13
2022
Kingfisher: Unveiling insecurely used credentials in iot-to-mobile communications

Yiwei Zhang , Siqi Ma , Juanru Li , Dawu Gu
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 488 -500

5
2022
EvilScreen attack: smart TV hijacking via multi-channel remote control mimicry

Yiwei Zhang , Siqi Ma , Tiancheng Chen , Juanru Li
IEEE Transactions on Dependable and Secure Computing

4
2023
Medusa Attack: Exploring Security Hazards of {In-App}{QR} Code Scanning

Xing Han , Yuheng Zhang , Xue Zhang , Zeyuan Chen
32nd USENIX Security Symposium (USENIX Security 23) 4607 -4624

1
2023
A data trading scheme with efficient data usage control for industrial IoT

Xiaohan Zhang , Xinghua Li , Yinbin Miao , Xizhao Luo
IEEE Transactions on Industrial Informatics 18 ( 7) 4456 -4465

19
2021
DistPreserv: Maintaining user distribution for privacy-preserving location-based services

Yanbing Ren , Xinghua Li , Yinbin Miao , Robert H Deng
IEEE Transactions on Mobile Computing 22 ( 6) 3287 -3302

13
2022
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network

Jiao Liu , Xinghua Li , Ximeng Liu , Jiawei Tang
IEEE Transactions on Cloud Computing

1
2023
Plp 2021: Workshop on programming language processing

Chang Xu , Siqi Ma , David Lo
4171 -4172

1
2021
Range Specification Bug Detection in Flight Control System Through Fuzzing

Ruidong Han , Siqi Ma , Juanru Li , Surya Nepal
IEEE Transactions on Software Engineering

2024
EmIr-Auth: Eye movement and iris-based portable remote authentication for smart grid

Zhuo Ma , Yilong Yang , Ximeng Liu , Yang Liu
IEEE Transactions on Industrial Informatics 16 ( 10) 6597 -6606

38
2019