default search action
Qingni Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j8]Ruiyao Huang, Qingni Shen, Yuchen Wang, Yiqi Wu, Zhonghai Wu, Xiapu Luo, Anbang Ruan:
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts. J. Syst. Softw. 216: 112107 (2024) - [j7]Cong Li, Xinyu Feng, Qingni Shen, Zhonghai Wu:
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Trans. Dependable Secur. Comput. 21(4): 4306-4308 (2024) - 2023
- [j6]Chuntao Dong, Qingni Shen, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu:
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud. IEEE Trans. Dependable Secur. Comput. 20(1): 867-885 (2023) - 2022
- [j5]Cong Li, Qingni Shen, Zhikang Xie, Jisheng Dong, Xinyu Feng, Yuejian Fang, Zhonghai Wu:
Hierarchical and non-monotonic key-policy attribute-based encryption and its application. Inf. Sci. 611: 591-627 (2022) - 2021
- [j4]Cong Li, Qingni Shen, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu:
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model. Comput. J. 64(4): 509-533 (2021) - [j3]Pengfei Wu, Robert H. Deng, Qingni Shen, Ximeng Liu, Qi Li, Zhonghai Wu:
ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Trans. Dependable Secur. Comput. 18(5): 2331-2348 (2021) - 2017
- [j2]Cong Li, Yuejian Fang, Xing Zhang, Cancan Jin, Qingni Shen, Zhonghai Wu:
A practical construction for large universe hierarchical attribute-based encryption. Concurr. Comput. Pract. Exp. 29(17) (2017) - 2013
- [j1]Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long:
Securing data services: a security architecture design for private storage cloud based on HDFS. Int. J. Grid Util. Comput. 4(4): 242-254 (2013)
Conference and Workshop Papers
- 2024
- [c82]Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Jiliang Zhang:
SegScope: Probing Fine-grained Interrupts via Architectural Footprints. HPCA 2024: 424-438 - [c81]Luyuan Xie, Cong Li, Xin Zhang, Shengfang Zhai, Yuejian Fang, Qingni Shen, Zhonghai Wu:
TRLS: A Time Series Representation Learning Framework Via Spectrogram for Medical Signal Processing. ICASSP 2024: 1591-1595 - [c80]Yuchen Wong, Chen Yan, Shengfang Zhai, Cong Li, Qingni Shen:
Security Equivalence Assessment between Cloud Standards by Mapping of Control Items. ICASSP 2024: 4630-4634 - [c79]Wenjun Qian, Qingni Shen, Haoran Xu, Xi Huang, Zhonghai Wu:
DROPFL: Client Dropout Attacks Against Federated Learning Under Communication Constraints. ICASSP 2024: 4870-4874 - [c78]Xinyu Feng, Qingni Shen, Cong Li, Yuejian Fang, Zhonghai Wu:
Privacy Preserving Federated Learning from Multi-Input Functional Proxy Re-Encryption. ICASSP 2024: 6955-6959 - [c77]Xinyu Feng, Cong Li, Qingni Shen, Jisheng Dong, Wenjun Qian, Yuejian Fang, Zhonghai Wu:
HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices. ICME 2024: 1-6 - [c76]Luyuan Xie, Manqing Lin, Tianyu Luan, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
MH-pFLID: Model Heterogeneous personalized Federated Learning via Injection and Distillation for Medical Data Analysis. ICML 2024 - [c75]Luyuan Xie, Manqing Lin, ChenMing Xu, Tianyu Luan, Zhipeng Zeng, Wenjun Qian, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
MH-pFLGB: Model Heterogeneous Personalized Federated Learning via Global Bypass for Medical Image Analysis. MICCAI (10) 2024: 534-545 - [c74]Luyuan Xie, Manqing Lin, Siyuan Liu, ChenMing Xu, Tianyu Luan, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
pFLFE: Cross-silo Personalized Federated Learning via Feature Enhancement on Medical Image Segmentation. MICCAI (10) 2024: 599-610 - 2023
- [c73]Xinyu Feng, Qingni Shen, Cong Li, Xuewei Wang, Niantao Xie, Luyuan Xie, Yuejian Fang, Zhonghai Wu:
A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model. BIBM 2023: 1080-1087 - [c72]Yuchen Wong, Qingni Shen, Cong Li, Cunzhan Liu, Tianxiang Ai:
Detecting Malicious Migration on Edge to Prevent Running Data Leakage. ICASSP 2023: 1-5 - [c71]Yutang Xia, Yang Luo, Wu Luo, Qingni Shen, Yahui Yang, Zhonghai Wu:
A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud. ICASSP 2023: 1-5 - [c70]Shengfang Zhai, Qingni Shen, Xiaoyi Chen, Weilong Wang, Cong Li, Yuejian Fang, Zhonghai Wu:
NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning. ICASSP 2023: 1-5 - [c69]Xiaolei Zhang, Huilin Zheng, Qingni Shen, Zhonghai Wu:
CL-BOSIC: A Distributed Agent-Oriented Scheme for Remote Data Integrity Check and Forensics in Public Cloud. ICIC (1) 2023: 425-441 - [c68]Luyuan Xie, Cong Li, Zirui Wang, Xin Zhang, Boyan Chen, Qingni Shen, Zhonghai Wu:
SHISRCNet: Super-Resolution and Classification Network for Low-Resolution Breast Cancer Histopathology Image. MICCAI (5) 2023: 23-32 - [c67]Shengfang Zhai, Yinpeng Dong, Qingni Shen, Shi Pu, Yuejian Fang, Hang Su:
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning. ACM Multimedia 2023: 1577-1587 - 2022
- [c66]Yutang Xia, Shengfang Zhai, Qinting Wang, Huiting Hou, Zhonghai Wu, Qingni Shen:
Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems. BIBM 2022: 1289-1296 - [c65]Xiaoyi Chen, Yinpeng Dong, Zeyu Sun, Shengfang Zhai, Qingni Shen, Zhonghai Wu:
Kallima: A Clean-Label Framework for Textual Backdoor Attacks. ESORICS (1) 2022: 447-466 - [c64]Cong Li, Qingni Shen, Zhikang Xie, Jisheng Dong, Yuejian Fang, Zhonghai Wu:
Efficient Identity-Based Chameleon Hash for Mobile Devices. ICASSP 2022: 3039-3043 - [c63]Xiaoyi Chen, Qingni Shen, Peng Cheng, Yongqiang Xiong, Zhonghai Wu:
RuleCache: Accelerating Web Application Firewalls by On-line Learning Traffic Patterns. ICWS 2022: 229-239 - [c62]Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu:
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities. NDSS 2022 - [c61]Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin:
Personalized User Profiles-based Insider Threat Detection for Distributed File System. TrustCom 2022: 1441-1446 - 2021
- [c60]Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569 - [c59]Zhikang Xie, Qingni Shen, Cong Li, Jisheng Dong, Yuejian Fang:
Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet. ICC 2021: 1-6 - 2020
- [c58]Xuhao Wang, Qingni Shen, Wu Luo, Pengfei Wu:
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis. CLOUD 2020: 600-608 - 2019
- [c57]Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu:
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. AsiaCCS 2019: 86-99 - [c56]Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan:
CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework. ICICS 2019: 584-599 - [c55]Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen:
PTAD: Provable and Traceable Assured Deletion in Cloud Storage. ISCC 2019: 1-6 - [c54]Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu:
Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. RAID 2019: 487-500 - 2018
- [c53]Lijing Cheng, Qingni Shen, Chuntao Dong:
Invader Job: A Kind of Malicious Failure Job on Hadoop YARN. ICC 2018: 1-6 - [c52]Tong Hui, Yahui Yang, Qingni Shen, Zhonghai Wu:
Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework. ICC 2018: 1-6 - [c51]Wu Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:
TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing. ICWS 2018: 67-83 - [c50]Yazhen Tian, Qingni Shen, Ziyao Zhu, Yahui Yang, Zhonghai Wu:
Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming. ISCC 2018: 783-786 - [c49]Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu:
Memory Cache Attacks on Alluxio Impede High Performance Computing. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 407-414 - [c48]Yuchen Wong, Qingni Shen:
Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 613-620 - [c47]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710 - 2017
- [c46]Tian Puyang, Qingni Shen, Yang Luo, Wu Luo, Zhonghai Wu:
Making least privilege the low-hanging fruit in clouds. ICC 2017: 1-7 - [c45]Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu:
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle. ICDF2C 2017: 221-227 - [c44]Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
Practical Large Universe Attribute-Set Based Encryption in the Standard Model. ICICS 2017: 180-191 - [c43]Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen:
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. ICICS 2017: 192-204 - [c42]Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu:
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. ICICS 2017: 661-673 - [c41]Ziyao Zhu, Qingni Shen, Yahui Yang, Zhonghai Wu:
MCS: Memory Constraint Strategy for Unified Memory Manager in Spark. ICPADS 2017: 437-444 - [c40]Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu:
RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. ICWS 2017: 548-555 - [c39]Yuqin Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu:
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud. TrustCom/BigDataSE/ICESS 2017: 347-354 - 2016
- [c38]Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu:
OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud. CLOUD 2016: 51-58 - [c37]Wenjun Qian, Qingni Shen, Jia Qin, Dong Yang, Yahui Yang, Zhonghai Wu:
S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm. HPCC/SmartCity/DSS 2016: 623-630 - [c36]Cancan Jin, Xinyu Feng, Qingni Shen:
Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size. ICCNS 2016: 91-98 - [c35]Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu:
SECapacity: A Secure Capacity Scheduler in YARN. ICICS 2016: 184-194 - [c34]Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu:
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. ICICS 2016: 214-226 - [c33]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. ICISSP 2016: 146-156 - [c32]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service. ICISSP (Revised Selected Papers) 2016: 148-168 - [c31]Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu:
Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. ICISSP 2016: 380-387 - [c30]Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu:
Sift - An Efficient Method for Co-residency Detection on Amazon EC2. ICISSP 2016: 423-431 - [c29]Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruan, Zhonghai Wu:
RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs. ICWS 2016: 666-671 - [c28]Wu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. Trustcom/BigDataSE/ISPA 2016: 152-159 - [c27]Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu:
Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker. Trustcom/BigDataSE/ISPA 2016: 630-637 - [c26]Qian Sun, Qingni Shen, Cong Li, Zhonghai Wu:
SeLance: Secure Load Balancing of Virtual Machines in Cloud. Trustcom/BigDataSE/ISPA 2016: 662-669 - 2015
- [c25]Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu:
User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. COMPSAC Workshops 2015: 104-109 - [c24]Xing Zhang, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu:
Attribute-Based Encryption Without Key Escrow. ICCCS 2015: 74-87 - [c23]Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu:
Probing the Scheduling Algorithms in the Cloud Based on OpenStack. ICCCS 2015: 510-520 - [c22]Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li:
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage. ICICS 2015: 335-345 - [c21]Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan:
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. ICICS 2015: 458-466 - [c20]Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. SecureComm 2015: 193-211 - [c19]Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu:
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. SecureComm 2015: 500-518 - [c18]Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu:
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. SecureComm 2015: 585-589 - 2013
- [c17]Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu:
A Covert Channel Using Event Channel State on Xen Hypervisor. ICICS 2013: 125-134 - 2012
- [c16]Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:
A Covert Channel Using Core Alternation. AINA Workshops 2012: 324-328 - [c15]Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. AINA Workshops 2012: 1292-1297 - [c14]Ying Chen, Qingni Shen, Pengfei Sun, Yangwei Li, Zhong Chen, Sihan Qing:
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation. IPDPS Workshops 2012: 2230-2236 - 2011
- [c13]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c12]Qingni Shen, Xin Yang, Xi Yu, Pengfei Sun, Yahui Yang, Zhonghai Wu:
Towards Data Isolation & Collaboration in Storage Cloud. APSCC 2011: 139-146 - [c11]Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing:
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. APWeb 2011: 370-375 - [c10]Pengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu:
Poster: LBMS: load balancing based on multilateral security in cloud. CCS 2011: 861-864 - [c9]Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang:
SecDM: Securing Data Migration between Cloud Storage Systems. DASC 2011: 636-641 - [c8]Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. ICICS 2011: 42-56 - [c7]Song Luo, Qingni Shen, Zhong Chen:
Fully Secure Unidirectional Identity-Based Proxy Re-encryption. ICISC 2011: 109-126 - [c6]Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing:
A Way of Key Management in Cloud Storage Based on Trusted Computing. NPC 2011: 135-145 - 2010
- [c5]Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei:
SCOBA: source code based attestation on custom software. ACSAC 2010: 337-346 - 2009
- [c4]Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen:
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. ICICS 2009: 226-240 - 2008
- [c3]Anbang Ruan, Qingni Shen, Yuanyou Yin:
A Generalized Trusted Virtualized Platform Architecture. ICYCS 2008: 2340-2346 - 2005
- [c2]Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Covert Channel Identification Founded on Information Flow Analysis. CIS (2) 2005: 381-387 - [c1]Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Optimization of Covert Channel Identification. IEEE Security in Storage Workshop 2005: 95-108
Editorship
- 2020
- [e1]Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu:
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11999, Springer 2020, ISBN 978-3-030-41578-5 [contents]
Informal and Other Publications
- 2024
- [i14]Luyuan Xie, Cong Li, Xin Zhang, Shengfang Zhai, Yuejian Fang, Qingni Shen, Zhonghai Wu:
TRLS: A Time Series Representation Learning Framework via Spectrogram for Medical Signal Processing. CoRR abs/2401.05431 (2024) - [i13]Shengfang Zhai, Weilong Wang, Jiajun Li, Yinpeng Dong, Hang Su, Qingni Shen:
Discovering Universal Semantic Triggers for Text-to-Image Synthesis. CoRR abs/2402.07562 (2024) - [i12]Luyuan Xie, Manqing Lin, Tianyu Luan, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
MH-pFLID: Model Heterogeneous personalized Federated Learning via Injection and Distillation for Medical Data Analysis. CoRR abs/2405.06822 (2024) - [i11]Shengfang Zhai, Huanran Chen, Yinpeng Dong, Jiajun Li, Qingni Shen, Yansong Gao, Hang Su, Yang Liu:
Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy. CoRR abs/2405.14800 (2024) - [i10]Luyuan Xie, Manqing Lin, Siyuan Liu, ChenMing Xu, Tianyu Luan, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
pFLFE: Cross-silo Personalized Federated Learning via Feature Enhancement on Medical Image Segmentation. CoRR abs/2407.00462 (2024) - [i9]Luyuan Xie, Manqing Lin, ChenMing Xu, Tianyu Luan, Zhipeng Zeng, Wenjun Qian, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
MH-pFLGB: Model Heterogeneous personalized Federated Learning via Global Bypass for Medical Image Analysis. CoRR abs/2407.00474 (2024) - 2023
- [i8]Shengfang Zhai, Qingni Shen, Xiaoyi Chen, Weilong Wang, Cong Li, Yuejian Fang, Zhonghai Wu:
NCL: Textual Backdoor Defense Using Noise-augmented Contrastive Learning. CoRR abs/2303.01742 (2023) - [i7]Shengfang Zhai, Yinpeng Dong, Qingni Shen, Shi Pu, Yuejian Fang, Hang Su:
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning. CoRR abs/2305.04175 (2023) - [i6]Luyuan Xie, Cong Li, Zirui Wang, Xin Zhang, Boyan Chen, Qingni Shen, Zhonghai Wu:
SHISRCNet: Super-resolution And Classification Network For Low-resolution Breast Cancer Histopathology Image. CoRR abs/2306.14119 (2023) - 2022
- [i5]Xiaoyi Chen, Yinpeng Dong, Zeyu Sun, Shengfang Zhai, Qingni Shen, Zhonghai Wu:
Kallima: A Clean-label Framework for Textual Backdoor Attacks. CoRR abs/2206.01832 (2022) - [i4]Xiaoyi Chen, Baisong Xin, Shengfang Zhai, Shiqing Ma, Qingni Shen, Zhonghai Wu:
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning. CoRR abs/2210.11082 (2022) - 2019
- [i3]Yang Luo, Qingni Shen, Zhonghai Wu:
PML: An Interpreter-Based Access Control Policy Language for Web Services. CoRR abs/1903.09756 (2019) - 2018
- [i2]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018) - 2017
- [i1]Yang Luo, Qixun Zhang, Qingni Shen, Hongzhi Liu, Zhonghai Wu:
Android Multi-Level System Permission Management Approach. CoRR abs/1712.02217 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint