Dr Siqi Ma

Dr Siqi Ma

Senior Lecturer
UNSW Canberra
School of Systems & Computing

I am a senior lecturer of the UNSW Institute for Cyber Security (IFCYBER) in the School of Engineering and Information System (SEIT) at the University of New South Wales (UNSW). Currently, I am also the postgraduate program coordinator of Cyber Security Operations in UNSW.

Before joining UNSW, I was a lectuer in the School of Information Technology and Electrical Engineering (ITEE) at the University of Queensland (UQ). I received my Ph.D. degree in the School of Information System (SIS) from Singapore Management University (SMU) in 2018 and became a postdoctoral research fellow in Data61, CSIRO. I visited Carnegie Mellon University (CMU) in 2015.

 

To know more about my current and past research works, please visit my homepage: https://siqima.me/

  • Book Chapters | 2022
    Gong H; Ma S; Camtepe S; Nepal S; Xu C, 2022, 'Vulnerability Detection Using Deep Learning Based Function Classification', in , pp. 3 - 22, http://dx.doi.org/10.1007/978-3-031-23020-2_1
    Book Chapters | 2020
    Han RD; Yang C; Ma JF; Ma S; Wang YB; Li F, 2020, 'IMShell-Dec: Pay More Attention to External Links in PowerShell', in , pp. 189 - 202, http://dx.doi.org/10.1007/978-3-030-58201-2_13
    Book Chapters | 2020
    Mai L; Yan Y; Jia S; Wang S; Wang J; Li J; Ma S; Gu D, 2020, 'Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features', in , pp. 430 - 446, http://dx.doi.org/10.1007/978-3-030-41579-2_25
    Book Chapters | 2017
    Ma S; Thung F; Lo D; Sun C; Deng RH, 2017, 'VuRLE: Automatic vulnerability detection and repair by learning from examples', in , pp. 229 - 246, http://dx.doi.org/10.1007/978-3-319-66399-9_13
  • Journal articles | 2024
    Chen Z; Zhang H; Li X; Miao Y; Zhang X; Zhang M; Ma S; Deng RH, 2024, 'FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 8140 - 8154, http://dx.doi.org/10.1109/TIFS.2024.3433537
    Journal articles | 2024
    Han R; Gong H; Ma S; Li J; Xu C; Bertino E; Nepal S; Ma Z; Ma J, 2024, 'A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects', IEEE Transactions on Information Forensics and Security, 19, pp. 722 - 734, http://dx.doi.org/10.1109/TIFS.2023.3326985
    Journal articles | 2024
    Han R; Ma S; Li J; Nepal S; Lo D; Ma Z; Ma J, 2024, 'Range Specification Bug Detection in Flight Control System Through Fuzzing', IEEE Transactions on Software Engineering, 50, pp. 461 - 473, http://dx.doi.org/10.1109/TSE.2024.3354739
    Journal articles | 2024
    Huang J; Du C; Zhu X; Ma S; Nepal S; Xu C, 2024, 'Anti-Compression Contrastive Facial Forgery Detection', IEEE Transactions on Multimedia, 26, pp. 6166 - 6177, http://dx.doi.org/10.1109/TMM.2023.3347103
    Journal articles | 2024
    Jia J; Ma S; Liu Y; Wang L; Deng RH, 2024, 'A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 59 - 73, http://dx.doi.org/10.1109/TIFS.2023.3318936
    Journal articles | 2024
    Jia J; Ma S; Wang L; Liu Y; Deng RH, 2024, 'A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services', IEEE Transactions on Computers, 73, pp. 58 - 72, http://dx.doi.org/10.1109/TC.2023.3318403
    Journal articles | 2024
    Luo B; Li X; Liu X; Guo J; Ren Y; Ma S; Ma J, 2024, 'D2MTS: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 927 - 942, http://dx.doi.org/10.1109/TKDE.2023.3294503
    Journal articles | 2024
    Xi N; Zhang Y; Feng P; Ma S; Ma J; Shen Y; Yang Y, 2024, '<sc>GNNDroid</sc>: Graph-Learning based Malware Detection for Android Apps with Native Code', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3444913
    Journal articles | 2024
    Zhang M; Li X; Miao Y; Luo B; Ren Y; Ma S, 2024, 'PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS', IEEE Transactions on Knowledge and Data Engineering, 36, pp. 781 - 794, http://dx.doi.org/10.1109/TKDE.2023.3295451
    Journal articles | 2024
    Zhang Y; Ma S; Chen T; Li J; Deng RH; Bertino E, 2024, 'EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry', IEEE Transactions on Dependable and Secure Computing, 21, pp. 1544 - 1556, http://dx.doi.org/10.1109/TDSC.2023.3286182
    Journal articles | 2023
    Chang Y; Wang S; Xu J; Zhu T; Ma S; Zhou A; Song Y; Liu M; Tian C, 2023, 'Optimization of extraction process of Dioscorea nipponica Makino saponins and their UPLC-QTOF-MS profiling, antioxidant, antibacterial and anti- inflammatory activities', ARABIAN JOURNAL OF CHEMISTRY, 16, http://dx.doi.org/10.1016/j.arabjc.2023.104630
    Journal articles | 2023
    Chen J; Shen W; Luo S; Ma S; Xing C; Hanzo L, 2023, 'Estimation of Dispersive High-Doppler Channels in the RIS-Aided mmWave Internet of Vehicles', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2023.3286279
    Journal articles | 2023
    Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, 'Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization', IEEE Transactions on Multimedia, 26, pp. 5014 - 5025, http://dx.doi.org/10.1109/TMM.2023.3330089
    Journal articles | 2023
    Hu Y; Zhang F; Xia Y; Yao Z; Zeng L; Ding H; Wei Z; Zhang X; Zhai J; Du X; Ma S, 2023, 'Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms', IEEE Transactions on Parallel and Distributed Systems, 34, pp. 2699 - 2717, http://dx.doi.org/10.1109/TPDS.2023.3294341
    Journal articles | 2023
    Jia J; Luo M; Ma S; Wang L; Liu Y, 2023, 'Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis', IEEE Transactions on Knowledge and Data Engineering, 35, pp. 5665 - 5679, http://dx.doi.org/10.1109/TKDE.2022.3155924
    Journal articles | 2023
    Li X; Bai L; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2023, 'Privacy-Preserving Top- κ Spatial Keyword Queries in Fog-Based Cloud Computing', IEEE Transactions on Services Computing, 16, pp. 504 - 514, http://dx.doi.org/10.1109/TSC.2021.3130633
    Journal articles | 2023
    Li X; Tong Q; Zhao J; Miao Y; Ma S; Weng J; Ma J; Choo KKR, 2023, 'VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data', IEEE Transactions on Services Computing, 16, pp. 698 - 710, http://dx.doi.org/10.1109/TSC.2021.3140092
    Journal articles | 2023
    Liu J; Li X; Liu X; Tang J; Ma S; Weng J, 2023, 'A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network', IEEE Transactions on Cloud Computing, 11, pp. 3381 - 3395, http://dx.doi.org/10.1109/TCC.2023.3287552
    Journal articles | 2023
    Qiao H; Dong X; Jiang Q; Ma S; Liu C; Xi N; Shen Y, 2023, 'Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System', IEEE Internet of Things Journal, 10, pp. 16715 - 16726, http://dx.doi.org/10.1109/JIOT.2023.3270300
    Journal articles | 2023
    Ren Y; Li X; Miao Y; Deng RH; Weng J; Ma S; Ma J, 2023, 'DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services', IEEE Transactions on Mobile Computing, 22, pp. 3287 - 3302, http://dx.doi.org/10.1109/TMC.2022.3141398
    Journal articles | 2023
    Sun C; Ma Y; Zeng D; Tan G; Ma S; Wu Y, 2023, 'μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1461 - 1475, http://dx.doi.org/10.1109/TDSC.2022.3155693
    Journal articles | 2023
    Sun C; Xu X; Wu Y; Zeng D; Tan G; Ma S; Wang P, 2023, 'CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis', IET Information Security, 17, pp. 582 - 597, http://dx.doi.org/10.1049/ise2.12117
    Journal articles | 2022
    Cheng Q; Chen T; Ma S; Li X, 2022, 'Improvement on a batch authenticated key agreement scheme', Frontiers of Computer Science, 16, http://dx.doi.org/10.1007/s11704-020-0194-7
    Journal articles | 2022
    Jia J; Luo M; Ma S; Wang L, 2022, 'Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning', IEEE Transactions on Industrial Informatics, 18, pp. 7463 - 7474, http://dx.doi.org/10.1109/TII.2022.3168029
    Journal articles | 2022
    Jia J; Wu Y; Li A; Ma S; Liu Y, 2022, 'Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3194704
    Journal articles | 2022
    Li H; Cheng Q; Li X; Ma S; Ma J, 2022, 'Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing', IEEE Systems Journal, 16, pp. 1832 - 1841, http://dx.doi.org/10.1109/JSYST.2021.3112581
    Journal articles | 2022
    Li X; Zhang H; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2022, 'CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles', IEEE Internet of Things Journal, 9, pp. 3359 - 3371, http://dx.doi.org/10.1109/JIOT.2021.3098221
    Journal articles | 2022
    Liu Y; Ma Z; Liu X; Ma S; Ren K, 2022, 'Privacy-Preserving Object Detection for Medical Images with Faster R-CNN', IEEE Transactions on Information Forensics and Security, 17, pp. 69 - 84, http://dx.doi.org/10.1109/TIFS.2019.2946476
    Journal articles | 2022
    Ma Q; Chu W; Wu S; Wei Q; Cheng Z; Wu J; Liu W; Ma S; Ma X; Chen J; Dong J, 2022, 'Design and performance optimization of carbon-based all-inorganic CsPbIBr2 perovskite battery with C60 buffer layer', SOLAR ENERGY, 246, pp. 245 - 255, http://dx.doi.org/10.1016/j.solener.2022.10.002
    Journal articles | 2022
    Ma S; Aloysius J, 2022, 'Inventory control under different forms of uncertainty: Ambiguity and stochastic variability', DECISION SCIENCES, http://dx.doi.org/10.1111/deci.12566
    Journal articles | 2022
    Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
    Journal articles | 2022
    Ma S; Shen W; Gao X; An J, 2022, 'Robust Channel Estimation for RIS-Aided Millimeter-Wave System with RIS Blockage', IEEE Transactions on Vehicular Technology, 71, pp. 5621 - 5626, http://dx.doi.org/10.1109/TVT.2022.3153966
    Journal articles | 2022
    Zhang X; Li X; Miao Y; Luo X; Wang Y; Ma S; Weng J, 2022, 'A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT', IEEE Transactions on Industrial Informatics, 18, pp. 4456 - 4465, http://dx.doi.org/10.1109/TII.2021.3123312
    Journal articles | 2021
    Li J; Ye N; Ma S; Bu X; An J, 2021, 'Multi-user hybrid beamforming design for physical layer secured mmwave los communications', Electronics (Switzerland), 10, http://dx.doi.org/10.3390/electronics10212635
    Journal articles | 2021
    Li X; Chen T; Cheng Q; Ma S; Ma J, 2021, 'Smart Applications in Edge Computing: Overview on Authentication and Data Security', IEEE Internet of Things Journal, 8, pp. 4063 - 4080, http://dx.doi.org/10.1109/JIOT.2020.3019297
    Journal articles | 2021
    Ma S; Li J; Bu X; An J, 2021, 'Joint diagnosis of RIS and BS for RIS-aided millimeter-wave system', Electronics (Switzerland), 10, http://dx.doi.org/10.3390/electronics10202556
    Journal articles | 2021
    Ma S; Shen W; An J; Hanzo L, 2021, 'Wideband Channel Estimation for IRS-Aided Systems in the Face of Beam Squint', IEEE Transactions on Wireless Communications, 20, pp. 6240 - 6253, http://dx.doi.org/10.1109/TWC.2021.3072694
    Journal articles | 2021
    Sun R; Yang B; Ma S; Shen Y; Jiang X, 2021, 'Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control', IEEE Transactions on Communications, 69, pp. 6198 - 6212, http://dx.doi.org/10.1109/TCOMM.2021.3089694
    Journal articles | 2021
    Zha J; Dai J; Ma S; Chen Y; Wang X, 2021, 'How to decouple tourism growth from carbon emissions? A case study of Chengdu, China', TOURISM MANAGEMENT PERSPECTIVES, 39, http://dx.doi.org/10.1016/j.tmp.2021.100849
    Journal articles | 2021
    Zha J; Tan T; Ma S; He L; Filimonau V, 2021, 'Exploring tourist opinion expression on COVID-19 and policy response to the pandemic's occurrence through a content analysis of an online petition platform', CURRENT ISSUES IN TOURISM, 25, pp. 261 - 286, http://dx.doi.org/10.1080/13683500.2021.1947992
    Journal articles | 2020
    Huang R; Wang Z; Yuan X; Zhang T; Ma S; Chen X; Xu J, 2020, 'Tribological performance of nano-diamond composites-dispersed lubricants on commercial cylinder liner mating with CrN piston ring', NANOTECHNOLOGY REVIEWS, 9, pp. 455 - 464, http://dx.doi.org/10.1515/ntrev-2020-0035
    Journal articles | 2020
    Li X; Zhang H; Ren Y; Ma S; Luo B; Weng J; Ma J; Huang X, 2020, 'PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs', IEEE Internet of Things Journal, 7, pp. 11789 - 11802, http://dx.doi.org/10.1109/JIOT.2020.3001381
    Journal articles | 2020
    Ma S; Liu Y; Nepal S, 2020, 'Are android apps being protected well against attacks?', IEEE Wireless Communications, 27, pp. 66 - 71, http://dx.doi.org/10.1109/MWC.001.1900432
    Journal articles | 2020
    Ma S; Shen W; An J; Hanzo L, 2020, 'Antenna Array Diagnosis for Millimeter-Wave MIMO Systems', IEEE Transactions on Vehicular Technology, 69, pp. 4585 - 4589, http://dx.doi.org/10.1109/TVT.2020.2977733
    Journal articles | 2020
    Ma Z; Yang Y; Liu X; Liu Y; Ma S; Ren K; Yao C, 2020, 'EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid', IEEE Transactions on Industrial Informatics, 16, pp. 6597 - 6606, http://dx.doi.org/10.1109/TII.2019.2946047
    Journal articles | 2020
    Zha J; Tan T; Fan R; Xu H; Ma S, 2020, 'How to reduce energy intensity to achieve sustainable development of China?s transport sector? A cross -regional comparison analysis', SOCIO-ECONOMIC PLANNING SCIENCES, 71, http://dx.doi.org/10.1016/j.seps.2019.100772
    Journal articles | 2019
    Chen D; Li X; Zhu X; Wu L; Ma S; Yan J; Yan D, 2019, 'Diffusion Tensor Imaging with Fluorescein Sodium Staining in the Resection of High-Grade Gliomas in Functional Brain Areas', WORLD NEUROSURGERY, 124, pp. E595 - E603, http://dx.doi.org/10.1016/j.wneu.2018.12.160
    Journal articles | 2019
    Chen Y; Ma S; Li X; Zhao X; Cheng X; Liu J, 2019, 'Preparation and microwave absorption properties of microsheets VO2(M)', Journal of Alloys and Compounds, 791, pp. 307 - 315, http://dx.doi.org/10.1016/j.jallcom.2019.03.338
    Journal articles | 2019
    Huang R; Ma S; Zhang M; Xu J; Wang Z, 2019, 'Dynamic deformation and failure process of quasi-closed-cell aluminum foam manufactured by direct foaming technique', MATERIALS SCIENCE AND ENGINEERING A-STRUCTURAL MATERIALS PROPERTIES MICROSTRUCTURE AND PROCESSING, 756, pp. 302 - 311, http://dx.doi.org/10.1016/j.msea.2019.04.050
    Journal articles | 2019
    Huang R; Ma S; Zhang M; Yang J; Wang D; Zhang L; Xu J, 2019, 'Wear Evolution of the Glass Fiber-Reinforced PTFE under Dry Sliding and Elevated Temperature', MATERIALS, 12, http://dx.doi.org/10.3390/ma12071082
    Journal articles | 2019
    Ma S; Chen W; Li C; Jin M; Huang R; Xu J, 2019, 'Wear Properties and Scuffing Resistance of the Cr-Al2O3 Coated Piston Rings: The Effect of Convexity Position on Barrel Surface', JOURNAL OF TRIBOLOGY-TRANSACTIONS OF THE ASME, 141, http://dx.doi.org/10.1115/1.4041215
    Journal articles | 2019
    Ma S; Liu Y; Wang Z; Wang Z; Huang R; Xu J, 2019, 'The Effect of Honing Angle and Roughness Height on the Tribological Performance of CuNiCr Iron Liner', METALS, 9, http://dx.doi.org/10.3390/met9050487
    Journal articles | 2017
    Ma S; Lai J; Deng RH; Ding X, 2017, 'Adaptable key-policy attribute-based encryption with time interval', Soft Computing, 21, pp. 6191 - 6200, http://dx.doi.org/10.1007/s00500-016-2177-z
    Journal articles | 2017
    Ma S, 2017, 'Fast or free shipping options in online and Omni-channel retail? The mediating role of uncertainty on satisfaction and purchase intentions', INTERNATIONAL JOURNAL OF LOGISTICS MANAGEMENT, 28, pp. 1099 - 1122, http://dx.doi.org/10.1108/IJLM-05-2016-0130
    Journal articles | 2016
    Ma S; Lo D; Xi N, 2016, 'Collaborative 'many to many' DDoS detection in cloud', International Journal of Ad Hoc and Ubiquitous Computing, 23, pp. 192 - 202, http://dx.doi.org/10.1504/IJAHUC.2016.10000397
    Journal articles | 2015
    Ma S; Pang C; Song L; Guo F; Sun H, 2015, 'Activating transcription factor 3 is overexpressed in human glioma and its knockdown in glioblastoma cells causes growth inhibition both in vitro and in vivo', INTERNATIONAL JOURNAL OF MOLECULAR MEDICINE, 35, pp. 1561 - 1573, http://dx.doi.org/10.3892/ijmm.2015.2173
    Journal articles | 2015
    Ma S; Pang C; Song L; Guo F; Sun H, 2015, 'The expression of ATF3, MMP-2 and maspin in tissue chip of glioma', PAKISTAN JOURNAL OF PHARMACEUTICAL SCIENCES, 28, pp. 1059 - 1063, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000358108900005&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Journal articles | 2015
    Qin B; Deng RH; Liu S; Ma S, 2015, 'Attribute-based encryption with efficient verifiable outsourced decryption', IEEE Transactions on Information Forensics and Security, 10, pp. 1384 - 1393, http://dx.doi.org/10.1109/TIFS.2015.2410137
    Journal articles | 2015
    Xie Z; Qu Y; Leng Y; Sun W; Ma S; Wei J; Hu J; Zhang X, 2015, 'Human colon carcinogenesis is associated with increased interleukin-17-driven inflammatory responses', DRUG DESIGN DEVELOPMENT AND THERAPY, 9, pp. 1679 - 1689, http://dx.doi.org/10.2147/DDDT.S79431
    Journal articles | 2013
    Song L; Guo F; Ma S; Song Z; Wu L; Sun H, 2013, 'A rare presentation of intracranial cysticercosis involving the cerebellopontine angle', JOURNAL OF CLINICAL NEUROSCIENCE, 20, pp. 892 - 894, http://dx.doi.org/10.1016/j.jocn.2012.05.046
    Journal articles | 2013
    Wang J; Ma H; Tang Q; Li J; Zhu H; Ma S; Chen X, 2013, 'Efficient verifiable fuzzy keyword search over encrypted data in cloud computing', Computer Science and Information Systems, 10, pp. 667 - 684, http://dx.doi.org/10.2298/CSIS121104028W
    Journal articles | 2012
    Wang J; Ma H; Tang Q; Li J; Zhu H; Ma S; Chen X, 2012, 'A new efficient verifiable fuzzy keyword search scheme', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3, pp. 61 - 71
  • Conference Papers | 2023
    Chen C; Liu D; Ma S; Nepal S; Xu C, 2023, 'Private Image Generation with Dual-Purpose Auxiliary Classifier', in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, pp. 20361 - 20370, presented at 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 17 June 2023 - 24 June 2023, http://dx.doi.org/10.1109/cvpr52729.2023.01950
    Preprints | 2023
    Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks, , http://dx.doi.org/10.48550/arxiv.2309.16207
    Preprints | 2023
    Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization, http://dx.doi.org/10.48550/arxiv.2309.09480
    Conference Papers | 2023
    Han X; Zhang Y; Zhang X; Chen Z; Wang M; Zhang Y; Ma S; Yu Y; Bertino E; Li J, 2023, 'Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning', in 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, pp. 4607 - 4624, presented at 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620495
    Conference Papers | 2023
    Liang J; Yuan M; Ding Z; Ma S; Han X; Zhang C, 2023, 'RaceBench: A Triggerable and Observable Concurrency Bug Benchmark', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 415 - 428, http://dx.doi.org/10.1145/3579856.3595787
    Conference Papers | 2023
    Wang D; Zou Y; Ma S; Xiao YA; Chen X, 2023, 'PASS2EDIT: A Multi-Step Generative Model for Guessing Edited Passwords', in SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, USENIX Association, Anaheim, CA, pp. 983 - 1000, presented at 32nd USENIX Security Symposium, Anaheim, CA, 09 August 2023 - 11 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620293
    Conference Papers | 2023
    Wu Y; Sun C; Zeng D; Tan G; Ma S; Wang P, 2023, 'LibScan: Towards More Precise Third-Party Library Identification for Android Applications', in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, pp. 3385 - 3402, presented at SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, Anaheim, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620427
    Conference Papers | 2022
    Han R; Yang C; Ma S; Ma JF; Sun C; Li J; Bertino E, 2022, 'Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search', in Proceedings - International Conference on Software Engineering, pp. 462 - 473, http://dx.doi.org/10.1145/3510003.3510084
    Conference Papers | 2022
    Jin X; Xiao X; Jia S; Gao W; Gu D; Zhang H; Ma S; Qian Z; Li J, 2022, 'Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK', in Proceedings - IEEE Symposium on Security and Privacy, pp. 650 - 665, http://dx.doi.org/10.1109/SP46214.2022.9833650
    Conference Papers | 2022
    Lyu Y; Fang Y; Zhang Y; Sun Q; Ma S; Bertino E; Lu K; Li J, 2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), IEEE COMPUTER SOC, CA, San Francisco, pp. 2096 - 2113, presented at 43rd IEEE Symposium on Security and Privacy (SP), CA, San Francisco, 23 May 2022 - 26 May 2022, http://dx.doi.org/10.1109/SP46214.2022.00137
    Conference Papers | 2022
    Lyu Y; Fang Y; Zhang Y; Sun Q; Ma S; Bertino E; Lu K; Li J, 2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2096 - 2113, http://dx.doi.org/10.1109/SP46214.2022.9833613
    Conference Papers | 2022
    Ma Z; Zhao B; Ren L; Li Z; Ma S; Luo X; Zhang C, 2022, 'PrIntFuzz: Fuzzing Linux drivers via automated virtual device simulation', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 404 - 416, http://dx.doi.org/10.1145/3533767.3534226
    Conference Papers | 2022
    Wang X; Huang J; Ma S; Nepal S; Xu C, 2022, 'DeepFake Disrupter: The Detector of DeepFake Is My Friend', in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 14900 - 14909, http://dx.doi.org/10.1109/CVPR52688.2022.01450
    Conference Papers | 2022
    Zhang Y; Ma S; Li J; Gu D; Bertino E, 2022, 'KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications', in Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, pp. 488 - 500, http://dx.doi.org/10.1109/DSN53405.2022.00055
    Conference Papers | 2021
    Kan X; Sun C; Liu S; Huang Y; Tan G; Ma S; Zhang Y, 2021, 'Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 702 - 713, http://dx.doi.org/10.1109/QRS54544.2021.00080
    Conference Papers | 2021
    Lyu Y; Gao W; Ma S; Sun Q; Li J, 2021, 'SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 129 - 148, http://dx.doi.org/10.1007/978-3-030-88323-2_7
    Conference Papers | 2021
    Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, 'Fine with '1234'? An analysis of SMS one-time password randomness in android apps', in Proceedings - International Conference on Software Engineering, pp. 1671 - 1682, http://dx.doi.org/10.1109/ICSE43902.2021.00148
    Preprints | 2021
    Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps, , http://dx.doi.org/10.48550/arxiv.2103.05758
    Conference Papers | 2021
    Xu C; Ma S; Lo D, 2021, 'PLP 2021: Workshop on Programming Language Processing', in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4171 - 4172, http://dx.doi.org/10.1145/3447548.3469460
    Conference Papers | 2021
    Zhang Y; Liu X; Sun C; Zeng D; Tan G; Kan X; Ma S, 2021, 'ReCFA: Resilient Control-Flow Attestation', in ACM International Conference Proceeding Series, pp. 311 - 322, http://dx.doi.org/10.1145/3485832.3485900
    Preprints | 2020
    Gao Y; Doan BG; Zhang Z; Ma S; Zhang J; Fu A; Nepal S; Kim H, 2020, Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review, http://dx.doi.org/10.48550/arxiv.2007.10760
    Conference Papers | 2020
    Liu Y; Ma Z; Liu X; Ma S; Nepal S; Deng RH; Ren K, 2020, 'Boosting privately: Federated extreme gradient boosting for mobile crowdsensing', in Proceedings - International Conference on Distributed Computing Systems, pp. 1 - 11, http://dx.doi.org/10.1109/ICDCS47774.2020.00017
    Conference Papers | 2020
    Liu Y; Yang Y; Ma Z; Liu X; Wang Z; Ma S, 2020, 'PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication', in 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020, http://dx.doi.org/10.1109/IWQoS49365.2020.9212822
    Conference Papers | 2020
    Ma S; Li H; Yang W; Li J; Nepal S; Bertino E, 2020, 'Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services', in ACM International Conference Proceeding Series, pp. 320 - 331, http://dx.doi.org/10.1145/3427228.3427263
    Conference Papers | 2020
    Wang W; Ma Y; Ma S; Li J; Li X, 2020, 'A Pre-restructured Learning-ISTA Deep Network for Millimeter Wave Antenna Array Diagnosis', in 2020 International Wireless Communications and Mobile Computing, IWCMC 2020, pp. 183 - 187, http://dx.doi.org/10.1109/IWCMC48107.2020.9148387
    Conference Papers | 2020
    Zhang Q; Wang Y; Li J; Ma S, 2020, 'EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 116 - 126, http://dx.doi.org/10.1109/SANER48275.2020.9054822
    Conference Papers | 2020
    Zhang Y; Ma S; Li J; Li K; Nepal S; Gu D, 2020, 'SMARTSHIELD: Automatic Smart Contract Protection Made Easy', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 23 - 34, http://dx.doi.org/10.1109/SANER48275.2020.9054825
    Conference Papers | 2019
    Li T; Ma J; Pei Q; Shen Y; Lin C; Ma S; Obaidat MS, 2019, 'AClog: Attack chain construction based on log correlation', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOBECOM38437.2019.9013518
    Conference Papers | 2019
    Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30
    Conference Papers | 2019
    Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828
    Conference Papers | 2019
    Wang J; Ma S; Zhang Y; Li J; Ma Z; Mai L; Chen T; Gu D, 2019, 'NLP-EYE: Detecting memory corruptions via semantic-aware memory operation function identification', in RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses, pp. 309 - 321
    Conference Papers | 2017
    Ma S; Liu C; Wang J, 2017, 'Improved Method of Aperiodic Spread Spectrum Acquisition', in PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2017), ASSOC COMPUTING MACHINERY, INDONESIA, Jakarta, pp. 188 - 192, presented at International Conference on Computer Science and Artificial Intelligence (CSAI), INDONESIA, Jakarta, 05 December 2017 - 07 December 2017, http://dx.doi.org/10.1145/3168390.3168441
    Conference Papers | 2017
    Wang J; Liu C; Ma S, 2017, 'Carrier Synchronization Based on Maximum Likelihood Criterion under High Dynamic', in PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2017), ASSOC COMPUTING MACHINERY, INDONESIA, Jakarta, pp. 193 - 198, presented at International Conference on Computer Science and Artificial Intelligence (CSAI), INDONESIA, Jakarta, 05 December 2017 - 07 December 2017, http://dx.doi.org/10.1145/3168390.3168442
    Conference Papers | 2016
    Ma S; Lo D; Li T; Deng RH, 2016, 'CDRep: Automatic repair of cryptographic misuses in android applications', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 711 - 722, http://dx.doi.org/10.1145/2897845.2897896
    Conference Papers | 2015
    Ma S; Wang S; Lo D; Deng RH; Sun C, 2015, 'Active Semi-supervised Approach for Checking App Behavior against Its Description', in Proceedings - International Computer Software and Applications Conference, pp. 179 - 184, http://dx.doi.org/10.1109/COMPSAC.2015.93
    Conference Papers | 2014
    Liu X; Zhu H; Ma J; Ma J; Ma S, 2014, 'Key-Policy Weighted Attribute based Encryption for fine-grained access control', in 2014 IEEE International Conference on Communications Workshops, ICC 2014, pp. 694 - 699, http://dx.doi.org/10.1109/ICCW.2014.6881280