Gong X, Zhang X, Wu Q, Zhang F, Xu J, Shen Q, Zhang Z. 
Practical Opcode-based Fault Attack on AES-NI. IACR Trans. Cryptogr. Hardw. Embed. Syst. [Internet]. 2025;2025:693–716.
 访问链接 Liang J, Hu D, Wu P, Yang Y, Shen Q, Wu Z. 
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice, in  
34th USENIX SECURITY SYMPOSIUM. SEATTLE, WA, USA: USENIX; 2025.
 访问链接AbstractZero-knowledge succinct non-interactive argument of knowledge (zk-SNARK) serves as a powerful technique for proving the correctness of computations and has attracted significant interest from researchers. Numerous concrete schemes and implementations have been proposed in academia and industry. Unfortunately, the inherent complexity of zk-SNARK has created gaps between researchers, developers and users, as they focus differently on this technique. For example, researchers are dedicated to constructing new efficient proving systems with stronger security and new properties. At the same time, developers and users care more about the implementation's toolchains, usability and compatibility. This gap has hindered the development of zk-SNARK field.
In this work, we provide a comprehensive study of zk-SNARK, from theory to practice, pinpointing gaps and limitations. We first present a master recipe that unifies the main steps in converting a program into a zk-SNARK. We then classify existing zk-SNARKs according to their key techniques. Our classification addresses the main difference in practically valuable properties between existing zk-SNARK schemes. We survey over 40 zk-SNARKs since 2013 and provide a reference table listing their categories and properties. Following the steps in master recipe, we then survey 11 general-purpose popular used libraries. We elaborate on these libraries' usability, compatibility, efficiency and limitations. Since installing and executing these zk-SNARK systems is challenging, we also provide a completely virtual environment in which to run the compiler for each of them. We identify that the proving system is the primary focus in cryptography academia. In contrast, the constraint system presents a bottleneck in industry. To bridge this gap, we offer recommendations and advocate for the open-source community to enhance documentation, standardization and compatibility.
 Liang J, Zhang Z, Zhang X, Shen Q, Gao Y, Yuan X, Xue H, Wu P, Wu Z. 
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer, in  
34th USENIX SECURITY SYMPOSIUM. SEATTLE, WA, USA(Honorable Mention Paper): USENIX; 2025.
 访问链接AbstractSignature schemes are a fundamental component of cybersecurity infrastructure. While they are designed to be mathematically secure against cryptographic attacks, they are vulnerable to Rowhammer fault-injection attacks. Since all existing attacks are ad-hoc in that they target individual parameters of specific signature schemes, it remains unclear about the impact of Rowhammer on signature schemes as a whole. In this paper, we present Achilles, a formal framework that aids in leaking secrets in various real-world signature schemes via Rowhammer. Particularly, Achilles can be used to find potentially more vulnerable parameters in schemes that have been studied before and also new schemes that are potentially vulnerable. Achilles mainly describes a formal procedure where Rowhammer faults are induced to key parameters of a generalized signature scheme, called G-sign, and a post-Rowhammer analysis is then performed for secret recovery on it. To illustrate the viability of Achilles, we have evaluated six signature schemes (with five CVEs assigned to track their respective Rowhammer vulnerability), covering traditional and post-quantum signatures with different mathematical problems. Based on the analysis with Achilles, all six schemes are proved to be vulnerable, and two new vulnerable parameters are identified for EdDSA. Further, we demonstrate a successful Rowhammer attack against each of these schemes, using recent cryptographic libraries including wolfssl, relic, and liboqs.
 Yan G, Xie L, Gao X, Zhang W, Shen Q, Fang Y, Wu Z. 
FedVCK: Non-IID Robust and Communication-Efficient Federated Learning via Valuable Condensed Knowledge for Medical Image Analysis, in  
AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25 - March 4, 2025, Philadelphia, PA, USA. AAAI Press; 2025:21904–21912.
 访问链接 Xie L, Luan T, Cai W, Yan G, Chen Z, Xi N, Fang Y, Shen Q, Wu Z, Yuan J. 
dFLMoE: Decentralized Federated Learning via Mixture of Experts for Medical Data Analysis, in  
IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2025, Nashville, TN, USA, June 11-15, 2025. Computer Vision Foundation / IEEE; 2025:10203–10213.
 访问链接 Luo Y, Shen Q, Wu Z. 
MA-RAG: Automating Role Engineering for RESTful APIs with Multi-Head Attention and Retrieval-Augmented Generation, in  
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2025, Montreal, Canada, August 16-22, 2025. ijcai.org; 2025:7607–7615.
 访问链接 Luo Y, Shen Q, Wu Z. 
LPDetective: Dusting the LLM Chats for Prompt Template Abusers, in  
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2025, Montreal, Canada, August 16-22, 2025. ijcai.org; 2025:7616–7624.
 访问链接 陈博言, 沈晴霓, 张晓磊, 张鑫, 李聪, 吴中海. 
智能网联汽车的车载网络攻防技术研究进展. 软件学报. 2025;36(1):341-370.
 Zhang X, Shen Q, Zhang Z, Gao Y, Zou J, Yang Y, Wu Z. 
Fantastic Interrupts and Where to Find Them: Exploiting Non-movable Interrupts on x86. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
 Luo Y, Shen Q, Wu Z. 
PERM: Streamlining Cloud Authorization with Flexible and Scalable Policy Enforcement. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
 Li C, Jiao X, Hu A, Shen Q, Wu Z. 
Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
 Zhang X, Zou J, Zhang Z, Shen Q, Gao Y, Cui J, Feng Y, Wu Z, Abbott D. 
MUXLeak: Exploiting Multiplexers as A Power Side Channel against Multi-tenant FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(TCAD). 2025.
 Dong J, Shen Q, Liang J, Li C, Feng X, Fang Y. 
A lattice-based privacy-preserving decentralized multi-party payment scheme. Computer Networks. 2025;262:111-129.