Qiu Y, Shen Q, Luo Y, Li C, Wu Z. 
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud, in  
2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017. IEEE Computer Society; 2017:347–354.
 访问链接 Li C, Fang Y, Zhang X, Jin C, Shen Q, Wu Z. 
A practical construction for large universe hierarchical attribute-based encryption. Concurr. Comput. Pract. Exp. [Internet]. 2017;29.
 访问链接 Zhu Z, Shen Q, Yang Y, Wu Z. 
MCS: Memory Constraint Strategy for Unified Memory Manager in Spark, in  
23rd IEEE International Conference on Parallel and Distributed Systems, ICPADS 2017, Shenzhen, China, December 15-17, 2017. IEEE Computer Society; 2017:437–444.
 访问链接 Qian W, Shen Q, Yang Y, Yang Y, Wu Z. 
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm, in  
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings.Vol 10631. Springer; 2017:661–673.
 访问链接 Feng X, Jin C, Li C, Fang Y, Shen Q, Wu Z. 
Practical Large Universe Attribute-Set Based Encryption in the Standard Model, in  
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings.Vol 10631. Springer; 2017:180–191.
 访问链接 Xin W, Shen Q, Yang Y, Wu Z. 
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, in  
Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings.Vol 216. Springer; 2017:221–227.
 访问链接