科研成果 by Type: 期刊论文

2025
Gong X, Zhang X, Wu Q, Zhang F, Xu J, Shen Q, Zhang Z. Practical Opcode-based Fault Attack on AES-NI. IACR Trans. Cryptogr. Hardw. Embed. Syst. [Internet]. 2025;2025:693–716. 访问链接
陈博言, 沈晴霓, 张晓磊, 张鑫, 李聪, 吴中海. 智能网联汽车的车载网络攻防技术研究进展. 软件学报. 2025;36(1):341-370.
Zhang X, Shen Q, Zhang Z, Gao Y, Zou J, Yang Y, Wu Z. Fantastic Interrupts and Where to Find Them: Exploiting Non-movable Interrupts on x86. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Luo Y, Shen Q, Wu Z. PERM: Streamlining Cloud Authorization with Flexible and Scalable Policy Enforcement. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Li C, Jiao X, Hu A, Shen Q, Wu Z. Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Li C, Shen Q, Wu Z. Redactable Blockchain From Decentralized Chameleon Hash Functions, Revisited. IEEE Transactions on Computers (TC). 2025.
Zhang X, Zou J, Zhang Z, Shen Q, Gao Y, Cui J, Feng Y, Wu Z, Abbott D. MUXLeak: Exploiting Multiplexers as A Power Side Channel against Multi-tenant FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(TCAD). 2025.
Dong J, Shen Q, Liang J, Li C, Feng X, Fang Y. A lattice-based privacy-preserving decentralized multi-party payment scheme. Computer Networks. 2025;262:111-129.
董佶圣, 李聪, 沈子楠, 胡达齐, 沈晴霓, 吴中海. 基于国密SM9 的区块链匿名交易方案. 中国科学:信息科学. 2025;55(6):1428 - 1446.
2024
Li C, Feng X, Shen Q, Wu Z. On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Transactions on Dependable and Secure Computing (TDSC). 2024;21(4):4306-4308.
Huang R, Shen Q, Wang Y, Wu Y, Wu Z, Luo X, Ruan A. ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts. Journal of Systems and Software(JSS). 2024;216(112107).
Qian W, Shen Q, Chen X, Li C, Fang Y, Wu Z. FDP-FL: Differentially Private Federated Learning with Flexible Privacy Budget Allocation. The Computer Journal. 2024;67(12):3180-3195.
Zhang X, Chen Z, Zhang X, Shen Q, Wu Z. IPOD2: An Irrecoverable and Verifiable Deletion Scheme for Outsourced Data. The Computer Journal. 2024;67(10):2877-2889.
李聪, 梁俊凯, 丁煜甲, 沈晴霓, 吴中海. 基于SM9的分层标识广播内积函数加密. 中国科学:信息科学. 2024;54(6):1400–1418.
2023
Dong C, Shen Q, Ding X, Yu D, Luo W, Wu P, Wu Z. T-Counter: Trustworthy and Efficient CPU Resource Measurement using SGX in the Cloud. IEEE Transactions on Dependable and Secure Computing (TDSC). 2023;20(1):867-885.
2022
钱文君, 沈晴霓, 吴鹏飞, 董春涛, 吴中海. 大数据计算环境下的隐私保护技术研究进展. 计算机学报. 2022;45(4):669-701.
Li C, Shen Q, Xie Z, Dong J, Feng X, Fang Y, Wu Z. Hierarchical and non-monotonic key-policy attribute-based encryption and its application. Information Sciences. 2022;611:591-627.
2021
董春涛, 沈晴霓, 罗武, 吴鹏飞, 吴中海. SGX应用支持技术研究进展. 软件学报. 2021;32(1):137-166.
罗武, 沈晴霓, 吴中海, 吴鹏飞, 董春涛, 夏玉唐. 浏览器同源策略安全研究综述. 软件学报. 2021;32(8):2469-2504.
Wu P, Deng R, Shen Q, Liu X, Li Q, Wu Z. ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Transactions on Dependable and Secure Computing (TDSC). 2021;18(5):2331-2348.

Pages