Shiqing Ma

Google Scholar
31 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Repurposing Neural Networks for Efficient Cryptographic Computation.
Xin Jin Shiqing Ma Zhiqiang Lin
2024
conf/ndss
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
2023
conf/uss
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
2023
conf/uss
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
2023
conf/uss
The Case for Learned Provenance Graph Storage Systems.
2023
conf/ndss
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
2021
conf/uss
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning.
2021
conf/uss
ATLAS: A Sequence-based Learning Approach for Attack Investigation.
2021
conf/ndss
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
2020
conf/ndss
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
2019
conf/ndss
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
2018
conf/ndss
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
2018
conf/ndss
Trojaning Attack on Neural Networks.
2017
conf/uss
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
2016
conf/ndss
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
2016
conf/acsac
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Filters
Years:  to