Shanqing Guo
Orcid: 0000-0003-3367-0951
According to our database1,
Shanqing Guo
authored at least 122 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024
ACM Trans. Priv. Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning.
Neural Networks, 2024
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps.
Proceedings of the ACM on Web Conference 2024, 2024
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations.
Proceedings of the IEEE International Conference on Software Analysis, 2024
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023
IEEE Trans. Knowl. Data Eng., September, 2023
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023
Pattern Recognit., April, 2023
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023
Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems.
Proceedings of the ACM Web Conference 2023, 2023
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023
2022
IEEE Trans. Software Eng., 2022
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur., 2022
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022
Comput. Secur., 2022
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
coxHE: A software-hardware co-design framework for FPGA acceleration of homomorphic computation.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
2020
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
2019
Psychological Gender Express via Mobile Social Network Activities: An Experimental Study on a Gay Network Data.
IEEE Access, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps.
World Wide Web, 2018
Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, 2018
Proceedings of the Knowledge Science, Engineering and Management, 2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
EAI Endorsed Trans. Security Safety, 2017
Neurocomputing, 2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017
2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016
Proceedings of the IEEE International Conference on Web Services, 2016
SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
SRConfig: An Empirical Method of Interdependent Soft Configurations for Improving Performance in n-Tier Application.
Proceedings of the IEEE International Conference on Services Computing, 2016
2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
IEEE J. Sel. Areas Commun., 2010
J. Networks, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Proceedings of the Neural Information Processing. Models and Applications, 2010
2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Efficient, Accurate Internet Traffic Classification using Discretization in Naive Bayes.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007