Qingni Shen

Orcid: 0000-0002-0605-6043

According to our database1, Qingni Shen authored at least 86 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Discovering Universal Semantic Triggers for Text-to-Image Synthesis.
CoRR, 2024

TRLS: A Time Series Representation Learning Framework via Spectrogram for Medical Signal Processing.
CoRR, 2024

SegScope: Probing Fine-grained Interrupts via Architectural Footprints.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

2023
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SHISRCNet: Super-Resolution and Classification Network for Low-Resolution Breast Cancer Histopathology Image.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

CL-BOSIC: A Distributed Agent-Oriented Scheme for Remote Data Integrity Check and Forensics in Public Cloud.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023

Detecting Malicious Migration on Edge to Prevent Running Data Leakage.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Hierarchical and non-monotonic key-policy attribute-based encryption and its application.
Inf. Sci., 2022

Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning.
CoRR, 2022

Personalized User Profiles-based Insider Threat Detection for Distributed File System.
Proceedings of the IEEE International Conference on Trust, 2022

ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

RuleCache: Accelerating Web Application Firewalls by On-line Learning Traffic Patterns.
Proceedings of the IEEE International Conference on Web Services, 2022

Efficient Identity-Based Chameleon Hash for Mobile Devices.
Proceedings of the IEEE International Conference on Acoustics, 2022

Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
ObliComm: Towards Building an Efficient Oblivious Communication System.
IEEE Trans. Dependable Secur. Comput., 2021

Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model.
Comput. J., 2021

Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet.
Proceedings of the ICC 2021, 2021

BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
PML: An Interpreter-Based Access Control Policy Language for Web Services.
CoRR, 2019

Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

PTAD: Provable and Traceable Assured Deletion in Cloud Storage.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Memory Cache Attacks on Alluxio Impede High Performance Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing.
Proceedings of the Web Services - ICWS 2018, 2018

Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Invader Job: A Kind of Malicious Failure Job on Hadoop YARN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Android Multi-Level System Permission Management Approach.
CoRR, 2017

A practical construction for large universe hierarchical attribute-based encryption.
Concurr. Comput. Pract. Exp., 2017

A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

MCS: Memory Constraint Strategy for Unified Memory Manager in Spark.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Practical Large Universe Attribute-Set Based Encryption in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Making least privilege the low-hanging fruit in clouds.
Proceedings of the IEEE International Conference on Communications, 2017

2016
SeLance: Secure Load Balancing of Virtual Machines in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs.
Proceedings of the IEEE International Conference on Web Services, 2016

SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

SECapacity: A Secure Capacity Scheduler in YARN.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability.
Proceedings of the Security and Privacy in Communication Networks, 2015

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Proceedings of the Security and Privacy in Communication Networks, 2015

SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015

MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Attribute-Based Encryption Without Key Escrow.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Probing the Scheduling Algorithms in the Cloud Based on OpenStack.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2013
Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013

A Covert Channel Using Event Channel State on Xen Hypervisor.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

SAPSC: Security Architecture of Private Storage Cloud Based on HDFS.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Covert Channel Using Core Alternation.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A Way of Key Management in Cloud Storage Based on Trusted Computing.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

A Variant of Boyen-Waters Anonymous IBE Scheme.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

SecDM: Securing Data Migration between Cloud Storage Systems.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Poster: LBMS: load balancing based on multilateral security in cloud.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

SecGuard: Secure and Practical Integrity Protection Model for Operating Systems.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Towards Data Isolation & Collaboration in Storage Cloud.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
SCOBA: source code based attestation on custom software.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
A Generalized Trusted Virtualized Platform Architecture.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2005
Optimization of Covert Channel Identification.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Covert Channel Identification Founded on Information Flow Analysis.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...