Shanqing Guo

Orcid: 0000-0003-3367-0951

According to our database1, Shanqing Guo authored at least 111 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024

Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
ACM Trans. Priv. Secur., 2024

DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

Multi-Party Sequential Data Publishing Under Differential Privacy.
IEEE Trans. Knowl. Data Eng., September, 2023

Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023

A multi-layer memory sharing network for video captioning.
Pattern Recognit., April, 2023

AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
CoRR, 2023

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023

Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems.
Proceedings of the ACM Web Conference 2023, 2023

Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

An Empirical Study of Storj DCS: Ecosystem, Performance, and Security.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Demystifying Decentralized Matrix Communication Network: Ecosystem and Security.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications.
Proceedings of the IEEE International Conference on Communications, 2023

FxHENN: FPGA-based acceleration framework for homomorphic encrypted CNN inference.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

Multi-Dimensional Data Publishing With Local Differential Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

2022
Android Custom Permissions Demystified: A Comprehensive Security Evaluation.
IEEE Trans. Software Eng., 2022

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur., 2022

Fine-Grained Hashing With Double Filtering.
IEEE Trans. Image Process., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

KPointer: Keep the code pointers on the stack point to the right code.
Comput. Secur., 2022

PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Marginal Release Under Multi-party Personalized Differential Privacy.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Demystifying Android Non-SDK APls: Measurement and Understanding.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Large-scale Security Measurements on the Android Firmware Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Secure and Efficient Cloud Ciphertext Deduplication Based on SGX.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

coxHE: A software-hardware co-design framework for FPGA acceleration of homomorphic computation.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

An Extensive Study of Residential Proxies in China.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Differentially Private Publication of Multi-Party Sequential Data.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
DSM: Delayed Signature Matching in Deep Packet Inspection.
Symmetry, 2020

MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

An empirical study of potentially malicious third-party libraries in Android apps.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
Psychological Gender Express via Mobile Social Network Activities: An Experimental Study on a Gay Network Data.
IEEE Access, 2019

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps.
World Wide Web, 2018

Dictionary Learning based Supervised Discrete Hashing for Cross-Media Retrieval.
Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, 2018

WalkToTopics: Inferring Topic Relations from a Feature Learning Perspective.
Proceedings of the Knowledge Science, Engineering and Management, 2018

You Are Where You App: An Assessment on Location Privacy of Social Applications.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Deep Packet Inspection with Delayed Signature Matching in Network Auditing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Mapping to Bits: Efficiently Detecting Type Confusion Errors.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
EAI Endorsed Trans. Security Safety, 2017

SOMH: A self-organizing map based topology preserving hashing method.
Neurocomputing, 2017

Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017

M3LH: Multi-modal Multi-label Hashing for Large Scale Data Search.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017

Supervised Class Graph Preserving Hashing for Image Retrieval and Classification.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Supervised cross-modal hashing without relaxation.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017

2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016

Linear unsupervised hashing for ANN search in Euclidean space.
Neurocomputing, 2016

Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling.
Proceedings of the Security and Privacy in Communication Networks, 2016

SOMH: A Self-Organizing Map Based Topology Preserving Hashing Method.
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016

Toward Discovering and Exploiting Private Server-Side Web APIs.
Proceedings of the IEEE International Conference on Web Services, 2016

SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Supervised Robust Discrete Multimodal Hashing for Cross-Media Retrieval.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

SRConfig: An Empirical Method of Interdependent Soft Configurations for Improving Performance in n-Tier Application.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

Hashing Multi-Instance Data from Bag and Instance Level.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

A Fine-Grained Classification Approach for the Packed Malicious Code.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Practical network traffic analysis in P2P environment.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Network Flow Classification Based on the Rhythm of Packets.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Fast Protocol Recognition by Network Packet Inspection.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Identification of Network Applications with Co-training.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
Random-walk based approach to detect clone attacks in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings.
J. Networks, 2010

Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010

A Malware Detection Algorithm Based on Multi-view Fusion.
Proceedings of the Neural Information Processing. Models and Applications, 2010

2009
Pollution attack: a new attack against localization in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

SWCA: a secure weighted clustering algorithm in wireless ad hoc networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
Identity-based Broadcast Encryption Scheme with Untrusted PKG.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

G-Means: A Clustering Algorithm for Intrusion Detection.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Efficient, Accurate Internet Traffic Classification using Discretization in Naive Bayes.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Secure Hop-Count Based Localization in Wireless Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...