Badnl: Backdoor attacks against nlp models with semantic-preserving improvements X Chen, A Salem, D Chen, M Backes, S Ma, Q Shen, Z Wu, Y Zhang Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 406 | 2021 |
Method, apparatus and system for making a decision about virtual machine migration Q Shen, L Ren, S Wang, Y Jin, L Wei, Z Li, A Ruan, L Shi US Patent 8,413,147, 2013 | 94 | 2013 |
Text-to-image diffusion models can be easily backdoored through multimodal data poisoning S Zhai, Y Dong, Q Shen, S Pu, Y Fang, H Su Proceedings of the 31st ACM International Conference on Multimedia, 1577-1587, 2023 | 54 | 2023 |
Research on intrusion detection based on incremental GHSOM YH Yang, HZ Huang, QN Shen, ZH Wu, Y Zhang Chinese journal of computers 37 (5), 1216-1224, 2014 | 52 | 2014 |
KASR: a reliable and practical approach to attack surface reduction of commodity OS kernels Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 43 | 2018 |
{Container-IMA}: A privacy-preserving Integrity Measurement Architecture for Containers W Luo, Q Shen, Y Xia, Z Wu 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 42 | 2019 |
Whispers between the containers: High-capacity covert channel attacks in docker Y Luo, W Luo, X Sun, Q Shen, A Ruan, Z Wu 2016 IEEE trustcom/bigdatase/ispa, 630-637, 2016 | 40 | 2016 |
Fully secure unidirectional identity-based proxy re-encryption S Luo, Q Shen, Z Chen International Conference on Information Security and Cryptology, 109-126, 2011 | 34 | 2011 |
Openstack security modules: A least-invasive access control framework for the cloud Y Luo, W Luo, T Puyang, Q Shen, A Ruan, Z Wu 2016 IEEE 9th international conference on cloud computing (CLOUD), 51-58, 2016 | 31 | 2016 |
Kallima: A Clean-Label Framework for Textual Backdoor Attacks X Chen, Y Dong, Z Sun, S Zhai, Q Shen, Z Wu European Symposium on Research in Computer Security, 447-466, 2022 | 26 | 2022 |
SecDM: Securing data migration between cloud storage systems Q Shen, L Zhang, X Yang, Y Yang, Z Wu, Y Zhang 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011 | 26 | 2011 |
Securing data services: a security architecture design for private storage cloud based on HDFS Q Shen, Y Yang, Z Wu, D Wang, M Long International Journal of Grid and Utility Computing 26 4 (4), 242-254, 2013 | 25 | 2013 |
SAPSC: Security architecture of private storage cloud based on HDFS Q Shen, Y Yang, Z Wu, X Yang, L Zhang, X Yu, Z Lao, D Wang, M Long 2012 26th International Conference on Advanced Information Networking and …, 2012 | 23 | 2012 |
A secure virtual machine deployment strategy to reduce co-residency in cloud Y Qiu, Q Shen, Y Luo, C Li, Z Wu 2017 IEEE Trustcom/BigDataSE/ICESS, 347-354, 2017 | 22 | 2017 |
Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size C Jin, X Feng, Q Shen Proceedings of the 6th International Conference on Communication and Network …, 2016 | 21 | 2016 |
Research progress on privacy-preserving techniques in big data computing environment W Qian, Q Shen, P Wu, C Dong, Z Wu Chinese Journal of Computers 45 (4), 669-701, 2022 | 19 | 2022 |
S-storm: A slot-aware scheduling strategy for even scheduler in storm W Qian, Q Shen, J Qin, D Yang, Y Yang, Z Wu 2016 IEEE 18th International Conference on High Performance Computing and …, 2016 | 17 | 2016 |
ObliDC: An SGX-based oblivious distributed computing framework with formal proof P Wu, Q Shen, RH Deng, X Liu, Y Zhang, Z Wu Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 16 | 2019 |
Reliable migration module in trusted cloud based on security level-Design and implementation Y Chen, Q Shen, P Sun, Y Li, Z Chen, S Qing 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 16 | 2012 |
Poster: LBMS: Load balancing based on multilateral security in cloud P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 15 | 2011 |