What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Qingni Shen
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Practical Opcode-based Fault Attack on AES-NI.
Xue Gong
Xin Zhang
Qianmei Wu
Fan Zhang
Junge Xu
Qingni Shen
Zhi Zhang
2025
journals/tifs
Fantastic Interrupts and Where to Find Them: Exploiting Non-Movable Interrupts on x86.
Xin Zhang
Qingni Shen
Zhi Zhang
Yansong Gao
Jiajun Zou
Yi Yang
Zhonghai Wu
2025
journals/tifs
Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices.
Cong Li
Xiaoyu Jiao
Xinyu Feng
Anyang Hu
Qingni Shen
Zhonghai Wu
2025
journals/tifs
PERM: Streamlining Cloud Authorization With Flexible and Scalable Policy Enforcement.
Yang Luo
Qingni Shen
Zhonghai Wu
2025
conf/uss
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer.
Junkai Liang
Zhi Zhang
Xin Zhang
Qingni Shen
Yansong Gao
Xingliang Yuan
Haiyang Xue
Pengfei Wu
Zhonghai Wu
2025
conf/uss
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice.
Junkai Liang
Daqi Hu
Pengfei Wu
Yunbo Yang
Qingni Shen
Zhonghai Wu
2022
conf/esorics
Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
Xiaoyi Chen
Yinpeng Dong
Zeyu Sun
Shengfang Zhai
Qingni Shen
Zhonghai Wu
2022
conf/ndss
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Wu Luo
Xuhua Ding
Pengfei Wu
Xiaolei Zhang
Qingni Shen
Zhonghai Wu
2021
conf/acsac
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Xiaoyi Chen
Ahmed Salem
Dingfan Chen
Michael Backes
Shiqing Ma
Qingni Shen
Zhonghai Wu
Yang Zhang
2019
conf/ccs
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Pengfei Wu
Qingni Shen
Robert H. Deng
Ximeng Liu
Yinghui Zhang
Zhonghai Wu
2019
conf/icics
CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework.
Zhenyu Zhao
Qingni Shen
Wu Luo
Anbang Ruan
2017
conf/icics
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Wenjun Qian
Qingni Shen
Yizhe Yang
Yahui Yang
Zhonghai Wu
2017
conf/icics
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Xinyu Feng
Cong Li
Dan Li
Yuejian Fang
Qingni Shen
2017
conf/icics
Practical Large Universe Attribute-Set Based Encryption in the Standard Model.
Xinyu Feng
Cancan Jin
Cong Li
Yuejian Fang
Qingni Shen
Zhonghai Wu
2016
conf/icics
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud.
Yang Luo
Tian Puyang
Wu Luo
Qingni Shen
Anbang Ruan
Zhonghai Wu
2016
conf/icics
SECapacity: A Secure Capacity Scheduler in YARN.
Chuntao Dong
Qingni Shen
Lijing Cheng
Yahui Yang
Zhonghai Wu
2015
conf/icics
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Chuntao Dong
Qingni Shen
Wenting Li
Yahui Yang
Zhonghai Wu
Xiang Wan
2015
conf/icics
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Zizhou Sun
Yahui Yang
Qingni Shen
Zhonghai Wu
Xiaochen Li
2013
conf/icics
A Covert Channel Using Event Channel State on Xen Hypervisor.
Qingni Shen
Mian Wan
Zhuangzhuang Zhang
Zhi Zhang
Sihan Qing
Zhonghai Wu
2011
conf/ccs
Poster: LBMS: load balancing based on multilateral security in cloud.
Pengfei Sun
Qingni Shen
Ying Chen
Zhonghai Wu
Cong Zhang
Anbang Ruan
Liang Gu
2011
conf/icisc
Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
Song Luo
Qingni Shen
Zhong Chen
2011
conf/icics
A Variant of Boyen-Waters Anonymous IBE Scheme.
Song Luo
Qingni Shen
Yongming Jin
Yu Chen
Zhong Chen
Sihan Qing
2010
conf/acsac
SCOBA: source code based attestation on custom software.
Liang Gu
Yao Guo
Anbang Ruan
Qingni Shen
Hong Mei
2009
conf/icics
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Anbang Ruan
Qingni Shen
Liang Gu
Li Wang
Lei Shi
Yahui Yang
Zhong Chen
Coauthors
Ahmed Salem
(1)
Anbang Ruan
(5)
Anyang Hu
(1)
Cancan Jin
(1)
Chuntao Dong
(2)
Cong Li
(3)
Cong Zhang
(1)
Dan Li
(1)
Daqi Hu
(1)
Dingfan Chen
(1)
Fan Zhang
(1)
Haiyang Xue
(1)
Hong Mei
(1)
Jiajun Zou
(1)
Junge Xu
(1)
Junkai Liang
(2)
Lei Shi
(1)
Li Wang
(1)
Liang Gu
(3)
Lijing Cheng
(1)
Mian Wan
(1)
Michael Backes
(1)
Pengfei Sun
(1)
Pengfei Wu
(4)
Qianmei Wu
(1)
Qingni Shen
(24)
Robert H. Deng
(1)
Shengfang Zhai
(1)
Shiqing Ma
(1)
Sihan Qing
(2)
Song Luo
(2)
Tian Puyang
(1)
Wenjun Qian
(1)
Wenting Li
(1)
Wu Luo
(3)
Xiang Wan
(1)
Xiaochen Li
(1)
Xiaolei Zhang
(1)
Xiaoyi Chen
(2)
Xiaoyu Jiao
(1)
Ximeng Liu
(1)
Xin Zhang
(1)
Xin Zhang
(2)
Xingliang Yuan
(1)
Xinyu Feng
(3)
Xue Gong
(1)
Xuhua Ding
(1)
Yahui Yang
(5)
Yang Luo
(2)
Yang Zhang
(1)
Yansong Gao
(2)
Yao Guo
(1)
Yi Yang
(1)
Ying Chen
(1)
Yinghui Zhang
(1)
Yinpeng Dong
(1)
Yizhe Yang
(1)
Yongming Jin
(1)
Yu Chen
(1)
Yuejian Fang
(2)
Yunbo Yang
(1)
Zeyu Sun
(1)
Zhenyu Zhao
(1)
Zhi Zhang
(4)
Zhong Chen
(3)
Zhonghai Wu
(17)
Zhuangzhuang Zhang
(1)
Zizhou Sun
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to