What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Siqi Ma
Google Scholar
ORCID:
0000-0003-3479-5713
23
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy.
Zhichao You
Xuewen Dong
Shujun Li
Ximeng Liu
Siqi Ma
Yulong Shen
2025
conf/ndss
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
Shangzhi Xu
Jialiang Dong
Weiting Cai
Juanru Li
Arash Shaghaghi
Nan Sun
Siqi Ma
2025
conf/dsn
What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
Jialiang Dong
Xinzhang Chen
Willy Susilo
Nan Sun
Arash Shaghaghi
Siqi Ma
2024
journals/tifs
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
Ju Jia
Siqi Ma
Yang Liu
Lina Wang
Robert H. Deng
2024
journals/tifs
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning.
Zhe Chen
Haiyan Zhang
Xinghua Li
Yinbin Miao
Xiaohan Zhang
Man Zhang
Siqi Ma
Robert H. Deng
2024
journals/tifs
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
Ruidong Han
Huihui Gong
Siqi Ma
Juanru Li
Chang Xu
Elisa Bertino
Surya Nepal
Zhuo Ma
Jianfeng Ma
2023
conf/uss
LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Yafei Wu
Cong Sun
Dongrui Zeng
Gang Tan
Siqi Ma
Peicheng Wang
2023
conf/uss
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Xing Han
Yuheng Zhang
Xue Zhang
Zeyuan Chen
Mingzhe Wang
Yiwei Zhang
Siqi Ma
Yu Yu
Elisa Bertino
Juanru Li
2023
conf/uss
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Ding Wang
Yunkai Zou
Yuan-an Xiao
Siqi Ma
Xiaofeng Chen
2023
conf/asiaccs
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark.
Jiashuo Liang
Ming Yuan
Zhanzhao Ding
Siqi Ma
Xinhui Han
Chao Zhang
2022
journals/tifs
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
Yang Liu
Zhuo Ma
Ximeng Liu
Siqi Ma
Kui Ren
2022
conf/sp
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Xuancheng Jin
Xuangan Xiao
Songlin Jia
Wang Gao
Dawu Gu
Hang Zhang
Siqi Ma
Zhiyun Qian
Juanru Li
2022
conf/sp
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Yunlong Lyu
Yi Fang
Yiwei Zhang
Qibin Sun
Siqi Ma
Elisa Bertino
Kangjie Lu
Juanru Li
2022
conf/dsn
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Yiwei Zhang
Siqi Ma
Juanru Li
Dawu Gu
Elisa Bertino
2021
conf/acsac
ReCFA: Resilient Control-Flow Attestation.
Yumei Zhang
Xinzhi Liu
Cong Sun
Dongrui Zeng
Gang Tan
Xiao Kan
Siqi Ma
2020
conf/sec
IMShell-Dec: Pay More Attention to External Links in PowerShell.
Ruidong Han
Chao Yang
Jianfeng Ma
Siqi Ma
Yunbo Wang
Feng Li
2020
conf/acsac
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Siqi Ma
Hehao Li
Wenbo Yang
Juanru Li
Surya Nepal
Elisa Bertino
2019
conf/esorics
Finding Flaws from Password Authentication Code in Android Apps.
Siqi Ma
Elisa Bertino
Surya Nepal
Juanru Li
Diethelm Ostry
Robert H. Deng
Sanjay Jha
2019
conf/icics
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Long Mai
Yuan Yan
Songlin Jia
Shuran Wang
Jianqiang Wang
Juanru Li
Siqi Ma
Dawu Gu
2019
conf/acsac
An empirical study of SMS one-time password authentication in Android apps.
Siqi Ma
Runhan Feng
Juanru Li
Yang Liu
Surya Nepal
Diethelm Ostry
Elisa Bertino
Robert H. Deng
Zhuo Ma
Sanjay Jha
2017
conf/esorics
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Siqi Ma
Ferdian Thung
David Lo
Cong Sun
Robert H. Deng
2016
conf/ccs
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Siqi Ma
David Lo
Teng Li
Robert H. Deng
2015
journals/tifs
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
Baodong Qin
Robert H. Deng
Shengli Liu
Siqi Ma
Coauthors
Arash Shaghaghi
(2)
Baodong Qin
(1)
Chang Xu
(1)
Chao Yang
(1)
Chao Zhang
(1)
Cong Sun
(3)
David Lo
(2)
Dawu Gu
(3)
Diethelm Ostry
(2)
Ding Wang
(1)
Dongrui Zeng
(2)
Elisa Bertino
(7)
Feng Li
(1)
Ferdian Thung
(1)
Gang Tan
(2)
Haiyan Zhang
(1)
Hang Zhang
(1)
Hehao Li
(1)
Huihui Gong
(1)
Jialiang Dong
(2)
Jianfeng Ma
(2)
Jianqiang Wang
(1)
Jiashuo Liang
(1)
Ju Jia
(1)
Juanru Li
(10)
Kangjie Lu
(1)
Kui Ren
(1)
Lina Wang
(1)
Long Mai
(1)
Man Zhang
(1)
Ming Yuan
(1)
Mingzhe Wang
(1)
Nan Sun
(1)
Nan Sun
(1)
Peicheng Wang
(1)
Qibin Sun
(1)
Robert H. Deng
(7)
Ruidong Han
(2)
Runhan Feng
(1)
Sanjay Jha
(2)
Shangzhi Xu
(1)
Shengli Liu
(1)
Shujun Li
(1)
Shuran Wang
(1)
Siqi Ma
(23)
Songlin Jia
(2)
Surya Nepal
(4)
Teng Li
(1)
Wang Gao
(1)
Weiting Cai
(1)
Wenbo Yang
(1)
Willy Susilo
(1)
Xiao Kan
(1)
Xiaofeng Chen
(1)
Xiaohan Zhang
(1)
Ximeng Liu
(2)
Xing Han
(1)
Xinghua Li
(1)
Xinhui Han
(1)
Xinzhang Chen
(1)
Xinzhi Liu
(1)
Xuancheng Jin
(1)
Xuangan Xiao
(1)
Xue Zhang
(1)
Xuewen Dong
(1)
Yafei Wu
(1)
Yang Liu
(1)
Yang Liu
(2)
Yi Fang
(1)
Yinbin Miao
(1)
Yiwei Zhang
(3)
Yu Yu
(1)
Yuan Yan
(1)
Yuan-an Xiao
(1)
Yuheng Zhang
(1)
Yulong Shen
(1)
Yumei Zhang
(1)
Yunbo Wang
(1)
Yunkai Zou
(1)
Yunlong Lyu
(1)
Zeyuan Chen
(1)
Zhanzhao Ding
(1)
Zhe Chen
(1)
Zhichao You
(1)
Zhiyun Qian
(1)
Zhuo Ma
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to