Attribute-based encryption with efficient verifiable outsourced decryption B Qin, RH Deng, S Liu, S Ma IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015 | 243 | 2015 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 236 | 2020 |
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen Computer Science and Information Systems 10 (2), 667-684, 2013 | 141 | 2013 |
Cdrep: Automatic repair of cryptographic misuses in android applications S Ma, D Lo, T Li, RH Deng Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 112 | 2016 |
Privacy-Preserving Object Detection for Medical Images with Faster R-CNN Y Liu, Z Ma, X Liu, S Ma, K Ren IEEE Transactions on Information Forensics and Security, 2019 | 109 | 2019 |
Smartshield: Automatic smart contract protection made easy Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 103 | 2020 |
Vurle: Automatic vulnerability detection and repair by learning from examples S Ma, F Thung, D Lo, C Sun, RH Deng Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 99 | 2017 |
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing Y Liu, Z Ma, X Liu, S Ma, S Nepal, RH Deng, K Ren 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 82 | 2020 |
Ethploit: From fuzzing to efficient exploit generation against smart contracts Q Zhang, Y Wang, J Li, S Ma 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 75 | 2020 |
Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing Y Liu, Z Ma, X Liu, S Ma, S Nepal, R Deng arXiv preprint arXiv:1907.10218, 2019 | 67 | 2019 |
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs X Li, H Zhang, Y Ren, S Ma, B Luo, J Weng, J Ma, X Huang IEEE Internet of Things Journal 7 (12), 11789-11802, 2020 | 63 | 2020 |
Smart Applications in Edge Computing: Overview on Authentication and Data Security X Li, T Chen, Q Cheng, S Ma, J Ma IEEE Internet of Things Journal 8 (6), 4063-4080, 2020 | 53 | 2020 |
Active semi-supervised approach for checking app behavior against its description S Ma, S Wang, D Lo, RH Deng, C Sun 2015 IEEE 39Th annual computer software and applications conference 2, 179-184, 2015 | 49 | 2015 |
DeepFake Disrupter: The Detector of DeepFake Is My Friend X Wang, J Huang, S Ma, S Nepal, C Xu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 42 | 2022 |
An empirical study of sms one-time password authentication in android apps S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ... Proceedings of the 35th annual computer security applications conference …, 2019 | 42 | 2019 |
EmIr-Auth: Eye-movement and Iris Based Portable Remote Authentication for Smart Grid Z Ma, Y Yang, X Liu, Y Liu, S Ma, K Ren, C Yao IEEE Transactions on Industrial Informatics, 2019 | 42 | 2019 |
VRFMS: Verifiable Ranked Fuzzy Multi-keyword Search over Encrypted Data X Li, Q Tong, J Zhao, Y Miao, S Ma, J Weng, J Ma, KKR Choo IEEE Transactions on Services Computing, 2022 | 35 | 2022 |
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012 | 33 | 2012 |
ReCFA: Resilient Control-Flow Attestation Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma Annual Computer Security Applications Conference, 311-322, 2021 | 30 | 2021 |
Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search R Han, C Yang, S Ma, JF Ma, C Sun, J Li, E Bertino Proceedings of the 44th International Conference on Software Engineering …, 2022 | 28 | 2022 |