Senior Lecturer

Dr Siqi Ma

UNSW Canberra
School of Engineering & IT

I am a senior lecturer of the UNSW Institute for Cyber Security (IFCYBER) in the School of Engineering and Information System (SEIT) at the University of New South Wales (UNSW). Currently, I am also the postgraduate program coordinator of Cyber Security Operations in UNSW.

Before joining UNSW, I was a lectuer in the School of Information Technology and Electrical Engineering (ITEE) at the University of Queensland (UQ). I received my Ph.D. degree in the School of Information System (SIS) from Singapore Management University (SMU) in 2018 and became a postdoctoral research fellow in Data61, CSIRO. I visited Carnegie Mellon University (CMU) in 2015.

 

To know more about my current and past research works, please visit my homepage: https://siqima.me/

  • Book Chapters | 2022
    2022, 'Vulnerability Detection Using Deep Learning Based Function Classification', in Network and System Security, Springer Nature Switzerland, pp. 3 - 22, http://dx.doi.org/10.1007/978-3-031-23020-2_1
    Book Chapters | 2020
    Han RD; Yang C; Ma JF; Ma S; Wang YB; Li F, 2020, 'IMShell-Dec: Pay More Attention to External Links in PowerShell', in , pp. 189 - 202, http://dx.doi.org/10.1007/978-3-030-58201-2_13
    Book Chapters | 2020
    Mai L; Yan Y; Jia S; Wang S; Wang J; Li J; Ma S; Gu D, 2020, 'Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features', in , pp. 430 - 446, http://dx.doi.org/10.1007/978-3-030-41579-2_25
    Book Chapters | 2017
    Ma S; Thung F; Lo D; Sun C; Deng RH, 2017, 'VuRLE: Automatic vulnerability detection and repair by learning from examples', in , pp. 229 - 246, http://dx.doi.org/10.1007/978-3-319-66399-9_13
  • Journal articles | 2023
    Li X; Bai L; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2023, 'Privacy-Preserving Top- κ Spatial Keyword Queries in Fog-Based Cloud Computing', IEEE Transactions on Services Computing, 16, pp. 504 - 514, http://dx.doi.org/10.1109/TSC.2021.3130633
    Journal articles | 2023
    Li X; Tong Q; Zhao J; Miao Y; Ma S; Weng J; Ma J; Choo KKR, 2023, 'VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data', IEEE Transactions on Services Computing, 16, pp. 698 - 710, http://dx.doi.org/10.1109/TSC.2021.3140092
    Journal articles | 2023
    2023, 'μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1461 - 1475, http://dx.doi.org/10.1109/TDSC.2022.3155693
    Journal articles | 2022
    Cheng Q; Chen T; Ma S; Li X, 2022, 'Improvement on a batch authenticated key agreement scheme', Frontiers of Computer Science, 16, http://dx.doi.org/10.1007/s11704-020-0194-7
    Journal articles | 2022
    Jia J; Luo M; Ma S; Wang L, 2022, 'Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning', IEEE Transactions on Industrial Informatics, 18, pp. 7463 - 7474, http://dx.doi.org/10.1109/TII.2022.3168029
    Journal articles | 2022
    Li H; Cheng Q; Li X; Ma S; Ma J, 2022, 'Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing', IEEE Systems Journal, 16, pp. 1832 - 1841, http://dx.doi.org/10.1109/JSYST.2021.3112581
    Journal articles | 2022
    Li X; Zhang H; Miao Y; Ma S; Ma J; Liu X; Choo KKR, 2022, 'CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles', IEEE Internet of Things Journal, 9, pp. 3359 - 3371, http://dx.doi.org/10.1109/JIOT.2021.3098221
    Journal articles | 2022
    Liu Y; Ma Z; Liu X; Ma S; Ren K, 2022, 'Privacy-Preserving Object Detection for Medical Images with Faster R-CNN', IEEE Transactions on Information Forensics and Security, 17, pp. 69 - 84, http://dx.doi.org/10.1109/TIFS.2019.2946476
    Journal articles | 2022
    Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
    Journal articles | 2022
    Ma S; Shen W; Gao X; An J, 2022, 'Robust Channel Estimation for RIS-Aided Millimeter-Wave System with RIS Blockage', IEEE Transactions on Vehicular Technology, 71, pp. 5621 - 5626, http://dx.doi.org/10.1109/TVT.2022.3153966
    Journal articles | 2022
    Ren Y; Li X; Miao Y; Deng R; Weng J; Ma S; Ma J, 2022, 'DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2022.3141398
    Journal articles | 2022
    Zhang X; Li X; Miao Y; Luo X; Wang Y; Ma S; Weng J, 2022, 'A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT', IEEE Transactions on Industrial Informatics, 18, pp. 4456 - 4465, http://dx.doi.org/10.1109/TII.2021.3123312
    Journal articles | 2022
    2022, 'Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis', IEEE Transactions on Knowledge and Data Engineering, http://dx.doi.org/10.1109/TKDE.2022.3155924
    Journal articles | 2022
    2022, 'Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3194704
    Journal articles | 2021
    Li X; Chen T; Cheng Q; Ma S; Ma J, 2021, 'Smart Applications in Edge Computing: Overview on Authentication and Data Security', IEEE Internet of Things Journal, 8, pp. 4063 - 4080, http://dx.doi.org/10.1109/JIOT.2020.3019297
    Journal articles | 2021
    Ma S; Shen W; An J; Hanzo L, 2021, 'Wideband Channel Estimation for IRS-Aided Systems in the Face of Beam Squint', IEEE Transactions on Wireless Communications, 20, pp. 6240 - 6253, http://dx.doi.org/10.1109/TWC.2021.3072694
    Journal articles | 2021
    Sun R; Yang B; Ma S; Shen Y; Jiang X, 2021, 'Covert Rate Maximization in Wireless Full-Duplex Relaying Systems with Power Control', IEEE Transactions on Communications, 69, pp. 6198 - 6212, http://dx.doi.org/10.1109/TCOMM.2021.3089694
    Journal articles | 2020
    Li X; Zhang H; Ren Y; Ma S; Luo B; Weng J; Ma J; Huang X, 2020, 'PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs', IEEE Internet of Things Journal, 7, pp. 11789 - 11802, http://dx.doi.org/10.1109/JIOT.2020.3001381
    Journal articles | 2020
    Ma S; Shen W; An J; Hanzo L, 2020, 'Antenna Array Diagnosis for Millimeter-Wave MIMO Systems', IEEE Transactions on Vehicular Technology, 69, pp. 4585 - 4589, http://dx.doi.org/10.1109/TVT.2020.2977733
    Journal articles | 2020
    Ma Z; Yang Y; Liu X; Liu Y; Ma S; Ren K; Yao C, 2020, 'EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid', IEEE Transactions on Industrial Informatics, 16, pp. 6597 - 6606, http://dx.doi.org/10.1109/TII.2019.2946047
    Journal articles | 2020
    2020, 'Are android apps being protected well against attacks?', IEEE Wireless Communications, 27, pp. 66 - 71, http://dx.doi.org/10.1109/MWC.001.1900432
    Journal articles | 2017
    Ma S; Lai J; Deng RH; Ding X, 2017, 'Adaptable key-policy attribute-based encryption with time interval', Soft Computing, 21, pp. 6191 - 6200, http://dx.doi.org/10.1007/s00500-016-2177-z
    Journal articles | 2016
    Ma S; Lo D; Xi N, 2016, 'Collaborative 'many to many' DDoS detection in cloud', International Journal of Ad Hoc and Ubiquitous Computing, 23, pp. 192 - 202, http://dx.doi.org/10.1504/IJAHUC.2016.10000397
    Journal articles | 2015
    Qin B; Deng RH; Liu S; Ma S, 2015, 'Attribute-based encryption with efficient verifiable outsourced decryption', IEEE Transactions on Information Forensics and Security, 10, pp. 1384 - 1393, http://dx.doi.org/10.1109/TIFS.2015.2410137
    Journal articles | 2013
    Wang J; Ma H; Tang Q; Li J; Zhu H; Ma S; Chen X, 2013, 'Efficient verifiable fuzzy keyword search over encrypted data in cloud computing', Computer Science and Information Systems, 10, pp. 667 - 684, http://dx.doi.org/10.2298/CSIS121104028W
    Journal articles | 2012
    Wang J; Ma H; Tang Q; Li J; Zhu H; Ma S; Chen X, 2012, 'A new efficient verifiable fuzzy keyword search scheme', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3, pp. 61 - 71
  • Conference Papers | 2022
    Han R; Yang C; Ma S; Ma JF; Sun C; Li J; Bertino E, 2022, 'Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search', in Proceedings - International Conference on Software Engineering, pp. 462 - 473, http://dx.doi.org/10.1145/3510003.3510084
    Conference Papers | 2022
    Jin X; Xiao X; Jia S; Gao W; Gu D; Zhang H; Ma S; Qian Z; Li J, 2022, 'Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK', in 2022 IEEE Symposium on Security and Privacy (SP), IEEE, presented at 2022 IEEE Symposium on Security and Privacy (SP), 22 May 2022 - 26 May 2022, http://dx.doi.org/10.1109/sp46214.2022.9833650
    Conference Papers | 2022
    Wang X; Huang J; Ma S; Nepal S; Xu C, 2022, 'DeepFake Disrupter: The Detector of DeepFake Is My Friend', in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, pp. 14900 - 14909, presented at 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 18 June 2022 - 24 June 2022, http://dx.doi.org/10.1109/CVPR52688.2022.01450
    Conference Papers | 2022
    2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), IEEE COMPUTER SOC, CA, San Francisco, pp. 2096 - 2113, presented at 43rd IEEE Symposium on Security and Privacy (SP), CA, San Francisco, 23 May 2022 - 26 May 2022, http://dx.doi.org/10.1109/SP46214.2022.00137
    Conference Papers | 2022
    2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2096 - 2113, http://dx.doi.org/10.1109/SP46214.2022.9833613
    Conference Papers | 2022
    2022, 'KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications', in Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, pp. 488 - 500, http://dx.doi.org/10.1109/DSN53405.2022.00055
    Conference Papers | 2022
    2022, 'PrIntFuzz: Fuzzing Linux drivers via automated virtual device simulation', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 404 - 416, http://dx.doi.org/10.1145/3533767.3534226
    Conference Papers | 2021
    Kan X; Sun C; Liu S; Huang Y; Tan G; Ma S; Zhang Y, 2021, 'Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 702 - 713, http://dx.doi.org/10.1109/QRS54544.2021.00080
    Conference Papers | 2021
    Lyu Y; Gao W; Ma S; Sun Q; Li J, 2021, 'SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 129 - 148, http://dx.doi.org/10.1007/978-3-030-88323-2_7
    Conference Papers | 2021
    Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, 'Fine with '1234'? An analysis of SMS one-time password randomness in android apps', in Proceedings - International Conference on Software Engineering, IEEE, pp. 1671 - 1682, presented at 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 22 May 2021 - 30 May 2021, http://dx.doi.org/10.1109/ICSE43902.2021.00148
    Conference Papers | 2021
    Zhang Y; Liu X; Sun C; Zeng D; Tan G; Kan X; Ma S, 2021, 'ReCFA: Resilient Control-Flow Attestation', in ACM International Conference Proceeding Series, pp. 311 - 322, http://dx.doi.org/10.1145/3485832.3485900
    Conference Papers | 2021
    2021, 'PLP 2021: Workshop on Programming Language Processing', in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4171 - 4172, http://dx.doi.org/10.1145/3447548.3469460
    Preprints | 2021
    2021, Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps, , http://dx.doi.org/10.48550/arxiv.2103.05758
    Conference Papers | 2020
    Liu Y; Ma Z; Liu X; Ma S; Nepal S; Deng RH; Ren K, 2020, 'Boosting privately: Federated extreme gradient boosting for mobile crowdsensing', in Proceedings - International Conference on Distributed Computing Systems, pp. 1 - 11, http://dx.doi.org/10.1109/ICDCS47774.2020.00017
    Conference Papers | 2020
    Liu Y; Yang Y; Ma Z; Liu X; Wang Z; Ma S, 2020, 'PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication', in 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020, http://dx.doi.org/10.1109/IWQoS49365.2020.9212822
    Conference Papers | 2020
    Ma S; Li H; Yang W; Li J; Nepal S; Bertino E, 2020, 'Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services', in ACM International Conference Proceeding Series, pp. 320 - 331, http://dx.doi.org/10.1145/3427228.3427263
    Conference Papers | 2020
    Zhang Q; Wang Y; Li J; Ma S, 2020, 'EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 116 - 126, http://dx.doi.org/10.1109/SANER48275.2020.9054822
    Conference Papers | 2020
    Zhang Y; Ma S; Li J; Li K; Nepal S; Gu D, 2020, 'SMARTSHIELD: Automatic Smart Contract Protection Made Easy', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 23 - 34, http://dx.doi.org/10.1109/SANER48275.2020.9054825
    Preprints | 2020
    2020, Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review, , http://dx.doi.org/10.48550/arxiv.2007.10760
    Conference Papers | 2019
    Li T; Ma J; Pei Q; Shen Y; Lin C; Ma S; Obaidat MS, 2019, 'AClog: Attack chain construction based on log correlation', in 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings, http://dx.doi.org/10.1109/GLOBECOM38437.2019.9013518
    Conference Papers | 2019
    Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30
    Conference Papers | 2019
    Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, ACM Press, pp. 339 - 354, presented at the 35th Annual Computer Security Applications Conference, 09 December 2019 - 13 December 2019, http://dx.doi.org/10.1145/3359789.3359828
    Conference Papers | 2019
    Wang J; Ma S; Zhang Y; Li J; Ma Z; Mai L; Chen T; Gu D, 2019, 'NLP-EYE: Detecting memory corruptions via semantic-aware memory operation function identification', in RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses, pp. 309 - 321
    Conference Papers | 2016
    Ma S; Lo D; Li T; Deng RH, 2016, 'CDRep: Automatic repair of cryptographic misuses in android applications', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 711 - 722, http://dx.doi.org/10.1145/2897845.2897896
    Conference Papers | 2015
    Ma S; Wang S; Lo D; Deng RH; Sun C, 2015, 'Active Semi-supervised Approach for Checking App Behavior against Its Description', in Proceedings - International Computer Software and Applications Conference, pp. 179 - 184, http://dx.doi.org/10.1109/COMPSAC.2015.93
    Conference Papers | 2014
    Liu X; Zhu H; Ma J; Ma J; Ma S, 2014, 'Key-Policy Weighted Attribute based Encryption for fine-grained access control', in 2014 IEEE International Conference on Communications Workshops, ICC 2014, pp. 694 - 699, http://dx.doi.org/10.1109/ICCW.2014.6881280