Zhang X, Shen Q, Zhang Z, Gao Y, Zou J, Yang Y, Wu Z.
Fantastic Interrupts and Where to Find Them: Exploiting Non-movable Interrupts on x86. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Luo Y, Shen Q, Wu Z.
PERM: Streamlining Cloud Authorization with Flexible and Scalable Policy Enforcement. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Li C, Jiao X, Hu A, Shen Q, Wu Z.
Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Zhang X, Zou J, Zhang Z, Shen Q, Gao Y, Cui J, Feng Y, Wu Z, Abbott D.
MUXLeak: Exploiting Multiplexers as A Power Side Channel against Multi-tenant FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(TCAD). 2025.
Dong J, Shen Q, Liang J, Li C, Feng X, Fang Y.
A lattice-based privacy-preserving decentralized multi-party payment scheme. Computer Networks. 2025;262:111-129.
董佶圣, 李聪, 沈子楠, 胡达齐, 沈晴霓, 吴中海.
基于国密SM9 的区块链匿名交易方案. 中国科学:信息科学. 2025;55(6):1428 - 1446.