Qingni Shen
Orcid: 0000-0002-0605-6043
According to our database1,
Qingni Shen
authored at least 98 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2024
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts.
J. Syst. Softw., 2024
Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy.
CoRR, 2024
Comput. J., 2024
MH-pFLGB: Model Heterogeneous Personalized Federated Learning via Global Bypass for Medical Image Analysis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
pFLFE: Cross-silo Personalized Federated Learning via Feature Enhancement on Medical Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
MH-pFLID: Model Heterogeneous personalized Federated Learning via Injection and Distillation for Medical Data Analysis.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
TRLS: A Time Series Representation Learning Framework Via Spectrogram for Medical Signal Processing.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
DROPFL: Client Dropout Attacks Against Federated Learning Under Communication Constraints.
Proceedings of the IEEE International Conference on Acoustics, 2024
Privacy Preserving Federated Learning from Multi-Input Functional Proxy Re-Encryption.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
SHISRCNet: Super-Resolution and Classification Network for Low-Resolution Breast Cancer Histopathology Image.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
CL-BOSIC: A Distributed Agent-Oriented Scheme for Remote Data Integrity Check and Forensics in Public Cloud.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
2022
Hierarchical and non-monotonic key-policy attribute-based encryption and its application.
Inf. Sci., 2022
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning.
CoRR, 2022
Personalized User Profiles-based Insider Threat Detection for Distributed File System.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
RuleCache: Accelerating Web Application Firewalls by On-line Learning Traffic Patterns.
Proceedings of the IEEE International Conference on Web Services, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Comput. J., 2021
Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet.
Proceedings of the ICC 2021, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
CoRR, 2019
Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the Web Services - ICWS 2018, 2018
Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the Information Systems Security and Privacy, 2016
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size.
Proceedings of the 6th International Conference on Communication and Network Security, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Proceedings of the Security and Privacy in Communication Networks, 2015
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Proceedings of the Security and Privacy in Communication Networks, 2015
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2013
Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2005
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005