Siqi Ma

ORCID: 0000-0003-3479-5713
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Concrete and Cement Materials Research
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Advanced Neural Network Applications
  • Additive Manufacturing and 3D Printing Technologies
  • Nuclear materials and radiation effects
  • Digital Media Forensic Detection
  • Innovations in Concrete and Construction Materials
  • Internet Traffic Analysis and Secure E-voting
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Photocatalysis Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Software System Performance and Reliability
  • Digital and Cyber Forensics
  • Blockchain Technology Applications and Security
  • Chemical Synthesis and Characterization
  • Cloud Data Security Solutions
  • Software Testing and Debugging Techniques
  • Innovative concrete reinforcement materials
  • Software Engineering Research

UNSW Sydney
2022-2025

University of Canberra
2022-2025

Xidian University
2013-2025

Chinese Academy of Geological Sciences
2023-2024

The University of Queensland
2020-2024

Westlake University
2021-2024

Harbin Institute of Technology
2021-2024

Chinese Academy of Medical Sciences & Peking Union Medical College
2019-2024

Soochow University
2022-2024

Beijing Institute of Technology
2024

Video captioning is a challenging task as it needs to accurately transform visual understanding into natural language description. To date, state-of-the-art methods inadequately model global-local vision representation for sentence generation, leaving plenty of room improvement. In this work, we approach the video from new perspective and propose GLR framework, namely granularity. Our demonstrates three advantages over prior efforts. First, simple solution, which exploits extensive...

10.1109/tcsvt.2022.3177320 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-05-23

Optical flow is an indispensable building block for various important computer vision tasks, including motion estimation, object tracking, and disparity measurement. In this work, we propose TransFlow, a pure transformer architecture optical estimation. Compared to dominant CNN-based methods, TransFlow demonstrates three advantages. First, it provides more accurate correlation trustworthy matching in estimation by utilizing spatial self-attention crossattention mechanisms between adjacent...

10.1109/cvpr52729.2023.01732 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms ciphertext size and cost) standard ABE schemes. In particular, an scheme allows a third party (e.g., cloud server) to transform into (short) El Gamal-type using public transformation key provided by user so that latter can be decrypted much more efficiently than former user. However, shortcoming original is correctness...

10.1109/tifs.2015.2410137 article EN IEEE Transactions on Information Forensics and Security 2015-03-04

As cloud computing becomes prevalent, more and sensitive data is being centralized into the by users. To maintain confidentiality of user against untrusted servers, should be encrypted before they are uploaded. However, this raises a new challenge for performing search over efficiently. Although existing searchable encryption schemes allow to with confidentiality, these solutions cannot support verifiability searching result. We argue that server may selfish in order save its computation...

10.2298/csis121104028w article EN cc-by-nc-nd Computer Science and Information Systems 2013-01-01

In this paper, we propose a lightweight privacy-preserving Faster R-CNN framework (SecRCNN) for object detection in medical images. is one of the most outstanding deep learning models detection. Using SecRCNN, healthcare centers can efficiently complete computations via additive secret sharing technique and edge computing. To implement design series interactive protocols to perform three stages R-CNN, namely feature map extraction, region proposal regression classification. improve...

10.1109/tifs.2019.2946476 article EN IEEE Transactions on Information Forensics and Security 2019-10-10

Abstract Applying intelligence algorithms to conceive nanoscale meta-devices becomes a flourishing and extremely active scientific topic over the past few years. Inverse design of functional nanostructures is at heart this topic, in which artificial (AI) furnishes various optimization toolboxes speed up prototyping photonic layouts with enhanced performance. In review, we offer systemic view on recent advancements nanophotonic components designed by algorithms, manifesting development trend...

10.1186/s43074-021-00044-y article EN cc-by PhotoniX 2021-10-23

Instance segmentation in videos, which aims to segment and track multiple objects video frames, has garnered a flurry of research attention recent years. In this paper, we present novel weakly supervised framework with \textbf{S}patio-\textbf{T}emporal \textbf{C}ollaboration for instance \textbf{Seg}mentation namely \textbf{STC-Seg}. Concretely, STC-Seg demonstrates four contributions. First, leverage the complementary representations from unsupervised depth estimation optical flow produce...

10.1109/tcsvt.2022.3202574 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-08-29

Over time, natural materials have evolved to be lightweight, high-strength, tough, and damage-tolerant due their unique biological structures. Therefore, combining inspiration structural design would provide traditional with a broader range of performance applications. Here, the application an ink-based three-dimensional (3D) printing strategy Lunar regolith simulant-based geopolymer (HIT-LRS-1 GP) was first reported, high-precision carbon fiber/quartz sand-reinforced biomimetic patterns...

10.26599/jac.2023.9220700 article EN cc-by Journal of Advanced Ceramics 2023-02-17

The immutable feature of blockchain determines that traditional security response mechanisms (e.g., code patching) must change to remedy insecure smart contracts. only proper way protect a contract is fix potential risks in its before it deployed the blockchain. However, existing tools for analysis focus on detection bugs but seldom consider issues. Meanwhile, often time-consuming and error-prone developer understand flawed manually. In this paper we propose SMARTSHIELD, bytecode...

10.1109/saner48275.2020.9054825 article EN 2020-02-01

Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion homomorphic encryption (HE). The former aims to expand the applicable machine models FL. latter focuses on who holds secret key when applying HE For naive scheme, server is set master key. Such setting causes serious problem that if does not conduct aggregation before decryption, chance left for access user's update. Inspired by two challenges,...

10.1109/icdcs47774.2020.00017 article EN 2020-11-01

Cryptography is increasingly being used in mobile applications to provide various security services; from user authentication, data privacy, secure communications. However, there are plenty of mistakes that developers could accidentally make when using cryptography their apps and such can lead a false sense security. Recent research efforts indeed show significant portion both Android iOS platforms misused cryptographic APIs. In this paper, we present CDRep, tool for automatically repairing...

10.1145/2897845.2897896 article EN 2016-05-27

Smart contracts, programs running on blockchain systems, leverage diverse decentralized applications (DApps). Unfortunately, well-known smart contract platforms, Ethereum for example, face serious security problems. Exploits to contracts may cause enormous financial losses, which emphasize the importance of testing. However, current exploit generation tools have difficulty solve hard constraints in execution paths and cannot simulate behaviors very well. These problems a loss coverage...

10.1109/saner48275.2020.9054822 article EN 2020-02-01

Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion homomorphic encryption (HE). The former aims to expand the applicable machine models FL. latter focuses on who holds secret key when applying HE For naive scheme, server is set master key. Such setting causes serious problem that if does not conduct aggregation before decryption, chance left for access user's update. Inspired by two challenges,...

10.48550/arxiv.1907.10218 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Nowadays, the pseudonym swap has become mainstream technology for protecting vehicles' trajectory privacy in vehicle ad hoc networks. However, existing methods cannot strictly provide unlinkability between new and old of due to lack theoretical guarantee, resulting severe leakages privacy. Our experiment also proves this point we find that works may cause vehicle's pseudonyms be linked with a probability higher than 60% because they always choose two vehicles very different driving states...

10.1109/jiot.2020.3001381 article EN IEEE Internet of Things Journal 2020-06-10

Searchable encryption(SE) allows users to efficiently retrieve data over encrypted cloud data, but most existing SE schemes only support exact keyword search, resulting in false results due minor typos or format inconsistencies of queried keywords. The fuzzy search can avoid this limitation, still incurs low accuracy and efficiency. Besides, do not consider malicious servers which may execute a fraction operations forge some various interest incentives such as saving computation storage...

10.1109/tsc.2021.3140092 article EN publisher-specific-oa IEEE Transactions on Services Computing 2022-01-01

Abstract In this study, we report that geopolymer materials containing different amounts of graphitic carbon nitride (g‐C 3 N 4 ) (C /GP) can remove methylene blue (MB) using the synergistic effects adsorption and photodegradation. A wt% g‐C (3 wt%C had best MB removal efficiency 94.62% within 60 min, under visible light. The results showed geopolymers act as carriers for , relative amount adsorbent photocatalyst influences MB. /GP was also used additive manufacturing by direct ink writing...

10.1111/jace.19654 article EN Journal of the American Ceramic Society 2024-01-05

Developers and manufacturers provide configurable control parameters for flight programs to support various environments missions, along with suggested ranges these ensure safety. However, this flexible mechanism can also introduce a vulnerability known as range specification bugs. The originates from the evidence that certain combinations of parameter values may affect drone's physical stability even though its are within range. paper introduces novel system called <small>icsearcher</small>...

10.1109/tse.2024.3354739 article EN IEEE Transactions on Software Engineering 2024-01-17

In this study, new metal-organic frameworks (MOFs) nanocrystals modified SiO2 core-shell microspheres were designed with cationic ionic liquids (ILs) 1,3-bis(4-carboxybutyl)imidazolium bromide (ILI) as organic ligands. By further adjustment the growth cycles, ILI-01@SiO2 stationary phase was facilely fabricated. The developed respectively characterized via element analysis, thermogravimetric scanning electron microscopy, X-ray diffraction, and Fourier transform infrared spectrometry. Because...

10.1021/acsami.6b04756 article EN ACS Applied Materials & Interfaces 2016-08-02
Coming Soon ...