Követés
qingni shen
qingni shen
E-mail megerősítve itt: ss.pku.edu.cn
Cím
Hivatkozott rá
Hivatkozott rá
Év
Badnl: Backdoor attacks against nlp models with semantic-preserving improvements
X Chen, A Salem, D Chen, M Backes, S Ma, Q Shen, Z Wu, Y Zhang
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
2892021
Method, apparatus and system for making a decision about virtual machine migration
Q Shen, L Ren, S Wang, Y Jin, L Wei, Z Li, A Ruan, L Shi
US Patent 8,413,147, 2013
922013
Research on intrusion detection based on incremental GHSOM
YH Yang, HZ Huang, QN Shen, ZH Wu, Y Zhang
Chinese journal of computers 37 (5), 1216-1224, 2014
522014
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels
Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
382018
Whispers between the containers: High-capacity covert channel attacks in docker
Y Luo, W Luo, X Sun, Q Shen, A Ruan, Z Wu
2016 IEEE trustcom/bigdatase/ispa, 630-637, 2016
342016
Fully secure unidirectional identity-based proxy re-encryption
S Luo, Q Shen, Z Chen
International Conference on Information Security and Cryptology, 109-126, 2011
342011
{Container-IMA}: A privacy-preserving Integrity Measurement Architecture for Containers
W Luo, Q Shen, Y Xia, Z Wu
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
312019
Openstack security modules: A least-invasive access control framework for the cloud
Y Luo, W Luo, T Puyang, Q Shen, A Ruan, Z Wu
2016 IEEE 9th international conference on cloud computing (CLOUD), 51-58, 2016
312016
SecDM: Securing data migration between cloud storage systems
Q Shen, L Zhang, X Yang, Y Yang, Z Wu, Y Zhang
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
262011
Securing data services: a security architecture design for private storage cloud based on HDFS
Q Shen, Y Yang, Z Wu, D Wang, M Long
International Journal of Grid and Utility Computing 26 4 (4), 242-254, 2013
252013
SAPSC: Security architecture of private storage cloud based on HDFS
Q Shen, Y Yang, Z Wu, X Yang, L Zhang, X Yu, Z Lao, D Wang, M Long
2012 26th International Conference on Advanced Information Networking and …, 2012
232012
Text-to-image diffusion models can be easily backdoored through multimodal data poisoning
S Zhai, Y Dong, Q Shen, S Pu, Y Fang, H Su
Proceedings of the 31st ACM International Conference on Multimedia, 1577-1587, 2023
222023
Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size
C Jin, X Feng, Q Shen
Proceedings of the 6th International Conference on Communication and Network …, 2016
222016
A secure virtual machine deployment strategy to reduce co-residency in cloud
Y Qiu, Q Shen, Y Luo, C Li, Z Wu
2017 IEEE Trustcom/BigDataSE/ICESS, 347-354, 2017
202017
Kallima: A Clean-Label Framework for Textual Backdoor Attacks
X Chen, Y Dong, Z Sun, S Zhai, Q Shen, Z Wu
European Symposium on Research in Computer Security, 447-466, 2022
162022
Research progress on privacy-preserving techniques in big data computing environment
W Qian, Q Shen, P Wu, C Dong, Z Wu
Chinese Journal of Computers 45 (4), 669-701, 2022
162022
S-storm: A slot-aware scheduling strategy for even scheduler in storm
W Qian, Q Shen, J Qin, D Yang, Y Yang, Z Wu
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
162016
Reliable migration module in trusted cloud based on security level-Design and implementation
Y Chen, Q Shen, P Sun, Y Li, Z Chen, S Qing
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
162012
Towards data isolation & collaboration in storage cloud
Q Shen, X Yang, X Yu, P Sun, Y Yang, Z Wu
2011 IEEE Asia-Pacific Services Computing Conference, 139-146, 2011
142011
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
142011
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20