微电子学与计算机基金,沈晴霓 - 北京大学软件与微电子学院

1.Pengfei Wu, Qingni Shen*, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu*: ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. The 14th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2019) : 86-99, Auckland, New Zealand, July 09-12

2.Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen, PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications (ISCC2019). Barcelona, Spain. June 2019.

3.Lijing Cheng, Qingni Shen*, Chuntao Dong: Invader Job: A Kind of Malicious Failure Job on Hadoop YARN. The 54th IEEE International Conference on Communications (ICC 2018),20-24 May 2018 // Kansas City, MO, USA

4.Tong Hui, Yahui Yang, Qingni Shen, Zhonghai Wu: Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework. The 54th IEEE International Conference on Communications (ICC 2018),20-24 May 2018 // Kansas City, MO, USA

5.Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu: Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming. IEEE Symposium on Computers and communications (ISCC 2018): 783-786, 25-28 June, 2018, Natal, Brazil

6.Yizhe Yang, Qingni Shen*, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 407-414, Melbourne, Australia, December 11-13, 2018.

7.Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu*. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful API. The 24rd International Conference on Web Services (ICWS 2017), June 25 - June 30, 2017, Honolulu, Hawaii, USA.

8.Tian Puyang, Qingni Shen*, Yang Luo, Wu Luo, Zhonghai Wu. Making Least Privilege the Low-Hanging Fruit in Clouds, 53th IEEE International Conference on Communications (ICC 2017), Paris, France, 21-25 May, 2017.

9.Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*, Zhonghai Wu. Practical Large Universe Attribute-Set Based Encryption in the Standard Model,the 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.

10.Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*. Fully Secure Hidden Ciphertext-Policy Attribute-based Proxy Re-encryption, the 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.

11.Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm, the 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.

12.Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark, The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China.

13.Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017),October 9-11 2017, Prague, Czech Republic, pp: 221-227

14.Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruany, Zhonghai Wu*. RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs, The 23rd International Conference on Web Services (ICWS 2016), June 27 - July 2, 2016, San Francisco, USA.

15.Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu: OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud. 9th IEEE International Conference on Cloud Computing (CLOUD 2016): 51-58, San Francisco, CA, USA, June 27 - July 2, 2016.

16.Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu*. MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud, the 18th International Conference on Information and Communications Security (ICICS 2016):214-226, Singapore, Singapore, Nov. 29–Dec. 2, 2016.

17.Chuntao Dong, Qingni Shen*, Lijin Cheng, Yahui Yang, Zhonghai Wu. SECapacity: A Secure Capacity Scheduler in YARN, the 18th International Conference on Information and Communications Security (ICICS 2016) :184-194, Singapore, Singapore, Nov. 29–Dec. 2, 2016.

18.Wenjun Qian, Qingni Shen*, Jia Qin, Dong Yang, Yahui Yang, Zhonghai Wu. S-Storm: A Slot-aware Scheduling Strategy for Even Scheduler in Storm, The 18th IEEE International Conference on High Performance Computing and Communications(HPCC 2016), Sydney, Australia, December 12 - 14, 2016. IEEE, pp.623-630, 2016.

19.Jin Cancan, Feng Xinyu, Shen Qingni. Fully secure hidden ciphertext policy attribute-Based Encryption with short ciphertext size, The 6th International Conference on Communication and Network Security (ICCNS 2016), Singapore, 2016.

20.Wenting Li, Qingni Shen*, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roman, Italy. 2016: 146-156.

21.Zhang X, Jin C, Li C, Wen Z, Shen Q, Fang Y, Wu Z. Ciphertext-policy attribute-based encryption with user and authority accountability, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15) :500-518, Oct 26-29, 2015, Dallas, USA.

22.Fang Y, Wen Z, Shen Q, et al. POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 585-589, Oct 26-29, 2015, Dallas, USA.

23.Chang Guo, Qingni Shen, Zhonghai Wu. UserRank: A User Influence-based Data Distribution Optimization Method, Chang Guo, 39th Annual International Computers, Software & Applications Conference Workshops(COMPSAC 2015) , pp.104-109, July 1-5, 2015, Tai chung, Tai wan.

24.Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS 2015): 312-318, Dec 9-11, Beijing, China

25.Zhang Xing, Jin Cancan, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Attribute-based encryption without key escrow. International Conference on Cloud Computing and Security (ICCCS’15): 74-87.

26.Chuntao Dong, Qingni Shen*, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015): 429-435, Dec 9-11, Beijing, China

27.Ying Chen, Qingni Shen*,Pengfei Sun,Yangwei Li, Sihan Qing etc. Reliable Migration Module in Trusted Cloud based on Security Label-Design and Implementation. In Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium Workshops (IEEE IPDPS 2012). May 21-25, 2012, Shanghai, China.

28.Qingni Shen,Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenmin Lao,Dandan Wang, Min Long. SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012),Fukuoka, Japan, March 26-29, 2012

29.Pengfei Sun, Qingni Shen*,Ying Chen,Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu. POSTER: LBMS: Load Balancingbased on Multilateral Security in the Cloud. In Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011):861-864, October 17–21, 2011, Chicago, Illinois, USA.

30.Xin Yang, Qingni Shen*, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proc. of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011): 135-145, Changsha, China. 2011.10

31.Qingni Shen, Xin Yang, Xi Yu, Yahui Yang, Zhonghai Wu. Towards Data Isolation and Collaboration in Storage Cloud. In Proc. of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC2011): 139-146. December 12-15, 2011,Jeju, Korea.

32.Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM:Securing Data Migration Between Cloud Storage Systems. In Proc. of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011): 636-641. December 12-14, Sydney, Australia.

33.Song Luo, Qingni Shen*, Yongmei Jin,Zhong Chen. A Variant of Boyen-Waters Anonymous IBE Scheme. In Proc. of 13th International Conference on Information and Communication Security (ICICS2011): 42-56. Beijing, China, Nov.24-26, 2011.

34.Song Luo, Qingni Shen*,Zhong Chen,Fully Secure Unidirectional Identity-Based Proxy Re-encryption. In Proc. of the 14th International Conference on Information Security and Cryptology (ICISC 2011), Nov 30-Dec 2, 2011, Seoul, Korea.

35.   Cong Tang, Yonggang Wang,Hu Xiong, Tao Yang, Jianbin Hu,Qingni Shen, etc, Need For Symmetry: Addressing Privacy Risks in Online Social Networks, In Proc. of the 25th International Conference on Advanced Information Networking and Applications (AINA 2011), Biopolis, Singapore, March 22-25,2011

1.Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi: KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018): 691-710. 10-12 September 2018 - Heraklion, Crete, Greece

2.Yuchen Wong, Qingni Shen*: Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 613-620, Melbourne, Australia, December 11-13, 2018.

3.Yuqing Qiu, Qingni Shen*, Yang Luo, Cong Li, Zhonghai Wu. A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud, The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia, 1-4 August, 2017.

4.Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu*. Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.

5.Qian Sun, Qingni Shen*, Cong Li, Zhonghai Wu. SeLance: Secure Load Balancing of Virtual Machines in Cloud, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.

6.Cong Li, Qingni Shen*, Kang Chen, Yahui Yang, Zhonghai Wu. Whisper in the Cloud:A Covert Channel Using the Result of Creating a Virtual Machine. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roma Italy. 2016: 380-387.

7.Kang Chen, Qingni Shen*, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu. Sift: An Efficient Method for Co-residency Detection on Amazon EC2. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016) , Feb 19-21, 2016, Roma Italy. 2016: 423-431.

8.Chen Y, Li Q, Yu M, Ding X and Shen Q. SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 193-211, Oct 26-29, 2015, Dallas, USA.

9.Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu. Probing the Scheduling Algorithms in the Cloud Based on OpenStack. 2015 International Conference on Cloud Computing and Security (ICCCS 2015): 510-520.

10.Qingni Shen, Mian Wan,Zhuangzhuang Zhang, Sihan Qing, Zhonghai Wu. A Covert Channel Using Event Channel State on Xen Hypervisor. 15th International Conference on Information and Communication Security (ICICS 2013). Beijing, China, Nov 20-22, pp:125-134, 2013(EI)

11.Yangwei Li, Qingni Shen*,Pengfei Sun,Cong Zhang, Ying Chen. A Covert Channel Using Core Alternation In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012), Fukuoka, Japan, March 26-29, 2012

12.Ennan Zhai, Qingni Shen*, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing. SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. In Proc. of the 13th Asia-Pacific Web Conference (APWeb 2011). pp:370-375, Beijing, China,April 18-20, 2011.(EI)

13.Sihan Qing, Qingni Shen, Qingguang Ji, Yeping He, A Dynamically Modified Privilege Control Policy, In Proc. of the 7th IEEE Annual Information Assurance Workshop (IAW2006), pp: 340-347, USMA, West Point, NY, USA, June 21-23, 2006.

14.Jianjun Shen, Sihan Qing, Qingni Shen, Design of a Micro-kernel Based Secure System Architecture, In Proc. of 7th IEEE Annual Information Assurance Workshop (IAW2006), pp: 384- 385, USMA, West Point, NY, USA, June 21-23, 2006.

15.Jianjun Shen, Sihan Qing, Qingni Shen,Liping Li: Covert Channel Identification Founded on Information Flow Analysis. In Proc. of the 2005 International Conference on Computational Intelligence and Security(CIS'2005): 381-387.

16.Jianjun Shen, Sihan Qing, Qingni Shen,Liping Li: Optimization of Covert Channel Identification. In Proc. of the IEEE Security in Storage Workshop 2005(SISW2005): 95-108.

1.Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu:Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), September 23-25, 2019, Beijing, China(to appear)

2.Wu Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu: TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing. ICWS 2018: 67-83

3.Wu Luo, Wei Liu, Anbang Ruan, Qingni Shen, Zhonghai Wu*. Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.

4.Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei. SCOBA: Source Code Based Attestation on Custom Software. In Proc. of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp: 337-346. Austin, Texas, December 6–10, 2010 (EI: 20110413614189)

5.Liang Gu, Anbang Ruan, Yao Guo, Qingni Shen, Xiangqun Chen. Practical Property-based Attestation on Free Software, in Proc. of the 25th Annual Computer Security Applications Conference (ACSAC 2009), Hawaii,USA, 7-11 December, 2009 (poster)

6.Anbang Ruan, Qingni Shen*, Liang Gu, Li Wang, Lei Shi, YahuiYang, ZhongChen. Trusted Isolation Environment: An Attestation Architecture with Usage Control model. In Proc. of 11th International Conference on Information and Communication Security (ICICS 2009). pp: 226-240. Beijing, China, Dec.14-17, 2009.

7.       Anbang Ruan, Qingni Shen*, Yuanyou Yin. A Generalized Trusted Virtualized Platform Architecture. In Proc. of the Young Computer Sciencists, 2008 (ICYCS2008): 2340-2346,Zhangjiajie, China, Nov.18-21, 2008.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值