MA, Siqi
85  results:
Search for persons X
?
1

A Domain Knowledge-Based Semi-supervised Pancreas Segmentat..:

, In: Neural Information Processing; Lecture Notes in Computer Science,
Ma, Siqi ; Liu, Zhe ; Song, Yuqing... - p. 69-82 , 2023
 
?
2

Research on Mental Robot Based on Knowledge Graph:

, In: 2023 6th International Conference on Computer Network, Electronic and Automation (ICCNEA),
Han, Mingxu ; Wei, Huimei ; Li, Yao.. - p. 395-400 , 2023
 
?
3

Private Image Generation with Dual-Purpose Auxiliary Classi..:

, In: 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR),
Chen, Chen ; Liu, Daochang ; Ma, Siqi.. - p. 20361-20370 , 2023
 
?
4

TransFlow: Transformer as Flow Learner:

, In: 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR),
Lu, Yawen ; Wang, Qifan ; Ma, Siqi... - p. 18063-18073 , 2023
 
?
5

3D printing of the fiber-reinforced alkali-activated compos..:

, In: Advanced Fiber-Reinforced Alkali-Activated Composites,
Fu, Shuai ; Ma, Siqi ; He, Peigang - p. 113-133 , 2023
 
?
6

List of contributors:

, In: Advanced Fiber-Reinforced Alkali-Activated Composites,
 
?
7

RaceBench: A Triggerable and Observable Concurrency Bug Ben..:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
Liang, Jiashuo ; Yuan, Ming ; Ding, Zhanzhao... - p. 415-428 , 2023
 
?
8

Annotating, Tracking, and Protecting Cryptographic Secrets ..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Jin, Xuancheng ; Xiao, Xuangan ; Jia, Songlin... - p. 650-665 , 2022
 
?
9

Control parameters considered harmful : detecting range ..:

, In: Proceedings of the 44th International Conference on Software Engineering,
Han, Ruidong ; Yang, Chao ; Ma, Siqi... - p. 462-473 , 2022
 
?
10

PrIntFuzz: fuzzing Linux drivers via automated virtual devi..:

, In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis,
Ma, Zheyu ; Zhao, Bodong ; Ren, Letu... - p. 404-416 , 2022
 
?
11

Goshawk: Hunting Memory Corruptions via Structure-Aware and..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Lyu, Yunlong ; Fang, Yi ; Zhang, Yiwei... - p. 2096-2113 , 2022
 
?
12

DeepFake Disrupter: The Detector of DeepFake Is My Friend:

, In: 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR),
Wang, Xueyu ; Huang, Jiajun ; Ma, Siqi.. - p. 14900-14909 , 2022
 
?
13

KingFisher: Unveiling Insecurely Used Credentials in IoT-to..:

, In: 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Zhang, Yiwei ; Ma, Siqi ; Li, Juanru.. - p. 488-500 , 2022
 
?
14

Control Parameters Considered Harmful: Detecting Range Spec..:

, In: 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE),
Han, Ruidong ; Yang, Chao ; Ma, Siqi... - p. 462-473 , 2022
 
?
15

Vulnerability Detection Using Deep Learning Based Function ..:

, In: Network and System Security; Lecture Notes in Computer Science,
Gong, Huihui ; Ma, Siqi ; Camtepe, Seyit.. - p. 3-22 , 2022
 
1-15