What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shanqing Guo
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-to-Image Generation Models.
Yingkai Dong
Xiangtao Meng
Ning Yu
Zheng Li
Shanqing Guo
2025
journals/compsec
CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback.
Xiangpu Song
Yingpei Zeng
Jianliang Wu
Hao Li
Chaoshun Zuo
Qingchuan Zhao
Shanqing Guo
2025
conf/uss
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers.
Xiangpu Song
Jianliang Wu
Yingpei Zeng
Hao Pan
Chaoshun Zuo
Qingchuan Zhao
Shanqing Guo
2025
conf/uss
A Thorough Security Analysis of BLE Proximity Tracking Protocols.
Xiaofeng Liu
Chaoshun Zuo
Qinsheng Hou
Pengcheng Ren
Jianliang Wu
Qingchuan Zhao
Shanqing Guo
2024
conf/ccs
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Zidong Zhang
Qinsheng Hou
Lingyun Ying
Wenrui Diao
Yacong Gu
Rui Li
Shanqing Guo
Haixin Duan
2024
conf/acisp
Security Research for Android Remote Assistance Apps.
Liwei Wang
Xiaofeng Liu
Ting Lei
Wenna Song
Shanqing Guo
Pengcheng Ren
2024
conf/sp
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
Xiangtao Meng
Li Wang
Shanqing Guo
Lei Ju
Qingchuan Zhao
2024
conf/acsac
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
Yu Bi
Mingshuo Yang
Yong Fang
Xianghang Mi
Shanqing Guo
Shujun Tang
Haixin Duan
2023
conf/uss
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Rui Li
Wenrui Diao
Shishuai Yang
Xiangyu Liu
Shanqing Guo
Kehuan Zhang
2022
journals/compsec
KPointer: Keep the code pointers on the stack point to the right code.
Yong-Gang Li
Yeh-Ching Chung
Yu Bao
Yi Lu
Shanqing Guo
Guoyuan Lin
2022
conf/ccs
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Libo Chen
Quanpu Cai
Zhenbang Ma
Yanhao Wang
Hong Hu
Minghang Shen
Yue Liu
Shanqing Guo
Haixin Duan
Kaida Jiang
Zhi Xue
2022
conf/ccs
An Extensive Study of Residential Proxies in China.
Mingshuo Yang
Yunnan Yu
Xianghang Mi
Shujun Tang
Shanqing Guo
Yilin Li
Xiaofeng Zheng
Haixin Duan
2022
conf/uss
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Changjiang Li
Li Wang
Shouling Ji
Xuhong Zhang
Zhaohan Xi
Shanqing Guo
Ting Wang
2022
conf/uss
Label Inference Attacks Against Vertical Federated Learning.
Chong Fu
Xuhong Zhang
Shouling Ji
Jinyin Chen
Jingzheng Wu
Shanqing Guo
Jun Zhou
Alex X. Liu
Ting Wang
2022
conf/wisec
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
Chennan Zhang
Shuang Li
Wenrui Diao
Shanqing Guo
2021
conf/sp
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Rui Li
Wenrui Diao
Zhou Li
Jianqi Du
Shanqing Guo
2021
conf/icics
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Hao Li
Shanqing Guo
Peng Tang
Chengyu Hu
Zhenxiang Chen
2020
conf/wisec
An empirical study of potentially malicious third-party libraries in Android apps.
Zicheng Zhang
Wenrui Diao
Chengyu Hu
Shanqing Guo
Chaoshun Zuo
Li Li
2019
conf/acsac
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Zheng Li
Chengyu Hu
Yang Zhang
Shanqing Guo
2018
conf/icics
Deep Packet Inspection with Delayed Signature Matching in Network Auditing.
Yingpei Zeng
Shanqing Guo
2018
conf/dsn
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Jia Chen
Ge Han
Shanqing Guo
Wenrui Diao
2018
conf/acsac
Mapping to Bits: Efficiently Detecting Type Confusion Errors.
Chengbin Pang
Yunlan Du
Bing Mao
Shanqing Guo
2016
conf/asiajcis
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Tao Ban
Takeshi Takahashi
Shanqing Guo
Daisuke Inoue
Koji Nakao
2015
conf/ccs
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Chaoshun Zuo
Jianliang Wu
Shanqing Guo
2013
conf/asiajcis
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Tao Ban
Ryoichi Isawa
Shanqing Guo
Daisuke Inoue
Koji Nakao
2012
conf/icics
A Fine-Grained Classification Approach for the Packed Malicious Code.
Shanqing Guo
Shuangshuang Li
Yan Yu
Anlei Hu
Tao Ban
Coauthors
Alex X. Liu
(1)
Anlei Hu
(1)
Bing Mao
(1)
Changjiang Li
(1)
Chaoshun Zuo
(5)
Chengbin Pang
(1)
Chengyu Hu
(3)
Chennan Zhang
(1)
Chong Fu
(1)
Daisuke Inoue
(2)
Ge Han
(1)
Guoyuan Lin
(1)
Haixin Duan
(4)
Hao Li
(1)
Hao Li
(1)
Hao Pan
(1)
Hong Hu
(1)
Jia Chen
(1)
Jianliang Wu
(4)
Jianqi Du
(1)
Jingzheng Wu
(1)
Jinyin Chen
(1)
Jun Zhou
(1)
Kaida Jiang
(1)
Kehuan Zhang
(1)
Koji Nakao
(2)
Lei Ju
(1)
Li Li
(1)
Li Wang
(2)
Libo Chen
(1)
Lingyun Ying
(1)
Liwei Wang
(1)
Minghang Shen
(1)
Mingshuo Yang
(2)
Ning Yu
(1)
Peng Tang
(1)
Pengcheng Ren
(2)
Qingchuan Zhao
(4)
Qinsheng Hou
(2)
Quanpu Cai
(1)
Rui Li
(3)
Ryoichi Isawa
(1)
Shanqing Guo
(26)
Shishuai Yang
(1)
Shouling Ji
(2)
Shuang Li
(1)
Shuangshuang Li
(1)
Shujun Tang
(2)
Takeshi Takahashi
(1)
Tao Ban
(3)
Ting Lei
(1)
Ting Wang
(2)
Wenna Song
(1)
Wenrui Diao
(6)
Xianghang Mi
(2)
Xiangpu Song
(2)
Xiangtao Meng
(2)
Xiangyu Liu
(1)
Xiaofeng Liu
(2)
Xiaofeng Zheng
(1)
Xuhong Zhang
(2)
Yacong Gu
(1)
Yan Yu
(1)
Yang Zhang
(1)
Yanhao Wang
(1)
Yeh-Ching Chung
(1)
Yi Lu
(1)
Yilin Li
(1)
Yingkai Dong
(1)
Yingpei Zeng
(3)
Yong Fang
(1)
Yong-Gang Li
(1)
Yu Bao
(1)
Yu Bi
(1)
Yue Liu
(1)
Yunlan Du
(1)
Yunnan Yu
(1)
Zhaohan Xi
(1)
Zhenbang Ma
(1)
Zheng Li
(2)
Zhenxiang Chen
(1)
Zhi Xue
(1)
Zhou Li
(1)
Zicheng Zhang
(1)
Zidong Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to