沈晴霓

  • 博士,教授,博士生导师
  • 北京大学/软件与微电子学院/网络软件与系统安全系 副系主任(2016~)

  • Email: qingnishen@ss.pku.edu.cn
  • Tel: 010-61273624
 

是我国最早自主研发“结构化保护级安胜安全操作系统”主要完成人之一、华为终端鸿蒙OS分布式文件系统安全增强技术合作研发项目负责人和完成人、北京大学-八分量区块链与隐私计算联合实验室主任兼合作项目负责人。长期致力于网络与系统安全领域的教学和科研工作,主持和负责省部级和企业合作项目30多项,包括:国家基金重点/面上、核高基重大、国家863、国家重点研发计划等国家项目/课题;中科院知识创新工程、北京市自然科学基金、深圳市科技攻关等省部项目;华为、八分量、IBM、Intel、AWS等企业合作项目等。在TDSC、Computer J、Information Science、计算机学报、软件学报;CCS、NDSS、ACM MM、ACSAC、RAID、ESORICS、ICWS、ICASSP、BIBM、MICCAI、AisaCCS等权威期刊/会议上发表高水平学术论文90多篇,提出一系列操作系统与虚拟化安全、大数据与云安全、人工智能安全、可信计算及区块链安全创新理论、方法和技术,获授权国际/国内发明专利35项(其中已授权美国专利1项、欧洲专利1项),出版教材和译著5部,参与制定国家标准3项。荣获2013年度北京大学“杨芙清-王阳元院士优秀教学科研奖”、2016年度获北京大学教学优秀奖、2020年度第七届证券期货科学技术奖优秀奖和2021年度中国人民银行金融科技发展奖三等奖(排名第5)、2022年北京市教学成果一等奖和2023年国家教学成果二等奖(排名第9)、2023年“示范性软件学院优秀专职教师”称号等。

 

 
  • 2006.9-至今

    北京大学软件与微电子学院教师。先后担任信息安全系副系主任、软件技术与服务工程学科组副组长、网络软件与系统安全系副系主任。

  • 2002.9-2006.7

    获中国科学院软件研究所工学博士学位

  • 1994.7-2002.8

    北京理工大学电子工程系教师 先后在计算机应用基础教研室、信息安全与对抗技术实验室从事教研工作

  • 1992.9-1994.7

    获中国科学院长春光学精密机械与物理研究所工学硕士学位。

 

 
  1.   《操作系统与虚拟化安全》(国家精品在线开放课程
    全球慕课平台:  https://www.coursera.org/course/os-virtsecurity
    华文慕课平台: http://www.chinesemooc.org/mooc/4391

  2.  《网络空间安全导论》(通识课)

  3. 《大数据安全与隐私保护》

 

 
  1. 沈晴霓,卿斯汉,操作系统安全设计,机械工业出版社(华章分社)(北京市精品教材).2013.9
  2. 卿斯汉,沈晴霓,操作系统安全(第2版)(国家十一五规划教材),清华大学出版社. 2011.6

 

 
  1. 操作系统与虚拟化安全
  2. 大数据与云安全
  3. 可信计算
  4. 区块链安全
  5. 人工智能安全

 

 
 
  1. 国家重点研发计划项目课题“基于区块链的卫生健康数据可信共享与审计监管技术”(2022YFB2703301),副组长,2022-2025。
  2. 北京大学-八分量区块链与隐私计算联合实验室,负责人,2022-2025。
  3. 华为技术中长期合作研究项目“系统权限模型安全技术”,负责人,2021-2024。
  4. 华为终端合作研发项目“分布式文件系统沙箱机制和Harmony OS多账号隔离和访问控制技术”, 负责人,2020-2021。
  5. 北大软微-八分量协同创新实验室项目“区块链安全关键技术研究” ,负责人,2018-2020。
  6. 国家自然科学基金面上项目“构建高可信云操作系统的若干关键技术研究” (61672062),负责人,2017-2020。
  7. 国家自然科学基金重点项目“云存储的隐私保护与安全保障机制” (61232005),副组长,2013-2017。
  8. 国家高技术研究发展计划863课题,“云安全的可信服务及在教育云的示范验证”(2015AA016009),副组长,2015-2017。
  9. 国家高新技术研究发展计划863大数据安全专项项目,负责人,2013-2015。
  10. 国家高新技术研究发展计划863云计算安全专项课题,负责人,2011-2015。
  11. AWS合作研发项目“基于AWS的教育云课堂安全与隐私”,负责人,2016-2017。
  12. 深圳科技计划项目“大数据信息安全的关键技术研发”,副组长,2014-2016。
  13. 国家自然科学基金面上项目“面向可信云服务的广义虚拟可信计算平台关键技术研究”(61073156),负责人,2011-2013。
  14. 国家自然科学基金面上项目“以应用安全为核心的可信虚拟监控器安全机制研究” (60873238),负责人,2009-2011。
  15. 国家自然科学基金面上项目“可信操作系统的基本理论与关键技术研究” (60970135),参与,2010-2012。
  16. 国家自然科学基金面上项目“高安全等级安全操作系统关键技术研究”(60573042),参与,2006-2008。
  17. “核高基”国家重大专项 “面向新型网络应用模式的网络化操作系统”(2009ZX01039-001-001),参与,2009-2010。
  18. “核高基”国家重大专项“国产操作系统参考实现”,参与,2009-2011。
  19. 国家科技支撑计划重大项目 (2008BAH33B02)子课题“安胜安全操作系统应用”,副组长,2008-2010。
  20. IBM SUR共享大学研究项目“Security Services of Private Storage Cloud” 负责人之一,2009-2011。
  21. Intel UPO大学项目“Virtualization Security Curriculum”, 负责人,2012-2013。
 
 
  1. Chuntao Dong, Qingni Shen*, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu. T-Counter: Trustworthy and Efficient CPU Resource Measurement using SGX in the Cloud [J]. In: IEEE Transactions on Dependable and Secure Computing (TDSC), 20(1): 867-885 (2023). (CCF A)
  2. Pengfei Wu, Robert Deng, Qingni Shen*, Ximen Liu, Qi Li, Zhonghai Wu*. ObliComm: Towards Building an Efficient Oblivious Communication System [J], IEEE Transactions on Dependable and Secure Computing (TDSC), 18(5): 2331-2348 (2021) (CCF A).
  3. Cong Li, Qingni Shen*, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu. Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model [J], The Computer Journal, 64(4): 509–533(2021). (CCF B)
  4. Cong Li, Qingni Shen*, Zhikang Xie, Jisheng Dong, Xinyu Feng, Yuejian Fang, Zhonghai Wu:Hierarchical and non-monotonic key-policy attribute-based encryption and its application [J]. Inf. Sci. 611: 591-627 (2022). (CCF B)
  5. Cong Li, Yuejian Fang*, Xing Zhang, Cancan Jin, Qingni Shen*, Zhonghai Wu. A Practical Construction for Large Universe Hierarchical Attribute-Based Encryption[J], Concurrency and Computation: Practice and Experience (CCPE) , DOI 10.1002/cpe.3957, pp:1-10, 2016
  6. Anbang Ruan, Qingni Shen*, Li Wang, etc. Towards a Source-Code Oriented Attestation[J]. China Communications, 6(4): 82-87(2009).
  7. 钱文君,沈晴霓*,吴鹏飞,董春涛,吴中海. 大数据计算环境下的隐私保护技术研究进展,计算机学报,2022: 45(4): 669-701. (CCF 中文A)
  8. 董春涛,沈晴霓*,罗武,吴鹏飞,吴中海,SGX应用支持技术研究进展[J],软件学报, 2021,32(1):137-166. (CCF 中文A)
  9. 罗武,沈晴霓*,吴中海*,吴鹏飞,董春涛,夏玉堂,浏览器同源策略安全研究综述[J], 软件学报,2021,32(8):2469-2504 (CCF 中文A)
  10. 罗杨,沈晴霓,吴中海. 一种基于元模型的访问控制策略描述语言[J], 软件学报,2020,31(2):439-454 (CCF 中文A)
  11. 吴鹏飞,沈晴霓*,秦嘉,钱文君,李聪,吴中海. 不经意随机访问机研究综述[J],软件学报,. 2018,29(9):2753-2777 (CCF 中文A)
  12. 罗杨,沈晴霓,吴中海. 一种新的访问控制策略描述语言及其权限划分方法[J]. 计算机学报, 2017.11,40(152). (CCF 中文A)
  13. 张星, 文子龙, 沈晴霓, 方跃坚, 吴中海. 可追责并解决密钥托管问题的属性基加密方案[J]. 计算机研究与发展, 2015, 52(10): 2293-2303. (CCF 中文A)
  14. 沈晴霓,卿斯汉,吴中海,张力哲,杨雅辉. 基于动态域划分的安全冗余调度策略[J],通信学报,2014,35(1): 34-46, 2014 (CCF 中文A)
  15. 方跃坚,沈晴霓,吴中海,一种超椭圆曲线密码处理器并行结构设计[J],计算机研究与发展,2013,50(11):2383-2388. (CCF 中文A)
  16. 沈晴霓, 杜虹,文汉, 卿斯汉. 一种基于完整性度量架构的数据封装方法[J]. 计算机研究与发展. 2012, 49(1):210-216. (CCF 中文A)
  17. 卿斯汉, 李丽萍, 何建波, 沈晴霓. 基于DTE策略的安全域隔离Z形式模型[J]. 计算机研究与发展, 2007, 44(11): 1881-1888. (CCF 中文A)
  18. 沈晴霓, 卿斯汉, 贺也平,李丽萍 一种支持动态调节的最小特权安全策略架构[J], 电子学报 ,2006, 34(10): 61~66. (CCF 中文A)
  19. 沈晴霓, 卿斯汉, 李丽萍, 一种多层次的特权控制机制的设计与实现[J], 计算机研究与发展 , 2006, 43 (3): 423~428. (CCF 中文A)
  20. 沈晴霓, 卿斯汉, 贺也平, 沈建军, 多策略适应的一种POSIX权能遗传算法[J], 通信学报, 2006, 27(2): 66~72 . (CCF 中文A)
 
  1. Shengfang Zhai, Yinpeng Dong, Qingni Shen, Shi Pu, Yuejian Fang, Hang Su.Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning, ACM International Conference on Multimedia (MM 2023) (CCF A)
  2. Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu: ScriptChecker: To Tame Third-party Script Execution With Task Capabilities, 29th Annual Network and Distributed System Security Symposium (NDSS 2022). (CCF A)
  3. Pengfei Sun, Qingni Shen*, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu. POSTER: LBMS: Load Balancing based on Multilateral Security in the Cloud. In Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011):861-864, October 17–21, 2011, Chicago, Illinois, USA. (CCF A)
  4. Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen*, Zhonghai Wu, Yang Zhang: BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569(CCF B)
  5. Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei. SCOBA: Source Code Based Attestation on Custom Software. In Proc. of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp: 337-346. Austin, Texas, December 6–10, 2010 (EI: 20110413614189) (CCF B)
  6. Liang Gu, Anbang Ruan, Yao Guo, Qingni Shen, Xiangqun Chen. Practical Property-based Attestation on Free Software, in Proc. of the 25th Annual Computer Security Applications Conference (ACSAC 2009), Hawaii,USA, 7-11 December, 2009 (poster) (CCF B)
  7. Wu Luo, Qingni Shen*, Yutang Xia, Zhonghai Wu. Container-IMA. A privacy-preserving Integrity Measurement Architecture for Containers. The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), September 23-25, 2019, Beijing, China. (CCF B)
  8. Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi. KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018): 691-710. 10-12 September 2018 - Heraklion, Crete, Greece(CCF B)
  9. Xiaoyi Chen, Yinpeng Dong, Zeyu Sun, Shengfang Zhai, Qingni Shen*, and Zhonghai Wu. Kallima: a Clean-label Framework for Textual Backdoor Attacks, ESORICS, 2022(CCF B)
  10. Xiaoyi Chen, Qingni Shen*, Peng Cheng, Yongqiang Xiong, and Zhonghai Wu. RCache: Improving Web Application Firewalls by On-line Learning Traffic Patterns, The 29th International Conference on Web Services(ICWS 2022)(CCF B)
  11. Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu*. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful API. The 24rd International Conference on Web Services (ICWS 2017), June 25 - June 30, 2017, Honolulu, Hawaii, USA. (CCF B)
  12. Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruany, Zhonghai Wu*. RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs, The 23rd International Conference on Web Services (ICWS 2016), June 27 - July 2, 2016, San Francisco, USA. (CCF B)
  13. Shengfang Zhai, Qingni Shen*, Xiaoyi Chen, Weilong Wang, Cong Li, Yuejian Fang, Zhonghai Wu. NCL: Textual Backdoor Defense Using Noise-augmented Contrastive Learning. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023). (CCF B)
  14. Yuchen Wong, Qingni Shen*, Cunzhan Liu, Tianxian Ai. Detecting Malicious Migration on Edge to Prevent Running Data Leakage. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023). (CCF B)
  15. Yutang Xia, Yang Luo, Wu Luo, Qingni Shen*, Yahui Yang, Zhonghai Wu. A Role Engineering Approach based on Spectral Clustering Analysis for RESTful Permissions in Cloud. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023). (CCF B)
  16. Cong Li, Qingni Shen*, Zhikang Xie, Jisheng Dong, Yuejian Fang, Zhonghai Wu. Efficient Identity-Based Chameleon Hash for Mobile Devices. ICASSP 2022: 3039-3043(CCF B)
  17. Yutang Xia, Shengfang Zhai, Qinting Wang, Huiting Hou, Zhonghai Wu, Qingni Shen*. Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems. IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2022): 1289-1296. (CCF B)
  18. Luyuan Xie, Cong Li, Zirui Wang, Xin Zhang, Boyan Chen, Qingni Shen*, Zhonghai Wu.SHISRCNet: Super-resolution And Classification Network For Low-resolution Breast Cancer Histopathology Image. International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI 2023). (CCF B)
  19. Ying Chen, Qingni Shen*,Pengfei Sun,Yangwei Li, Sihan Qing. Reliable Migration Module in Trusted Cloud based on Security Label-Design and Implementation. In Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPS 2012). May 21-25, 2012, Shanghai, China. (CCF B)
  20. Pengfei Wu, Qingni Shen*, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu*: ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. The 14th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2019) : 86-99, Auckland, New Zealand, July 09-12.
  21. Zhang X, Jin C, Li C, Wen Z, Shen Q, Fang Y, Wu Z. Ciphertext-policy attribute-based encryption with user and authority accountability, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15) :500-518, Oct 26-29, 2015, Dallas, USA.
  22. Chen Y, Li Q, Yu M, Ding X and Shen Q. SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 193-211, Oct 26-29, 2015, Dallas, USA.
  23. Fang Y, Wen Z, Shen Q, et al. POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15): 585-589, Oct 26-29, 2015, Dallas, USA.
  24. Qingni Shen, Mian Wan,Zhuangzhuang Zhang, Sihan Qing, Zhonghai Wu. A Covert Channel Using Event Channel State on Xen Hypervisor. 15th International Conference on Information and Communication Security (ICICS 2013). Beijing, China, Nov 20-22, pp:125-134, 2013.
  25. Zhenyu Zhao, Qingni Shen*, Wu Luo, Anbang Ruan. CloudCoT. A Blockchain-Based Cloud Service Dependency Attestation Framework. The 21st International Conference on Information and Communications Security ICICS 2019: 584-599
  26. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*, Zhonghai Wu. Practical Large Universe Attribute-Set Based Encryption in the Standard Model. The 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.
  27. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen*. Fully Secure Hidden Ciphertext-Policy Attribute-based Proxy Re-encryption. The 19th International Conference on Information and Communications Security(ICICS 2017), December 6-8, 2017, Beijing, China.
  28. Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm. The 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.
  29. Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu*. MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. The 18th International Conference on Information and Communications Security (ICICS 2016):214-226, Singapore, Singapore, Nov. 29–Dec. 2, 2016.
  30. Chuntao Dong, Qingni Shen*, Lijin Cheng, Yahui Yang, Zhonghai Wu. SECapacity: A Secure Capacity Scheduler in YARN. The 18th International Conference on Information and Communications Security (ICICS 2016):184-194, Singapore, Singapore, Nov. 29–Dec. 2, 2016.
  31. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS 2015): 312-318, Dec 9-11, Beijing, China
  32. Chuntao Dong, Qingni Shen*, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The 17th International Conference on Information and Communications Security (ICICS 2015): 429-435, Dec 9-11, Beijing, China
  33. Song Luo, Qingni Shen*, Yongmei Jin,Zhong Chen. A Variant of Boyen-Waters Anonymous IBE Scheme. In Proc. of 13rd International Conference on Information and Communication Security (ICICS2011): 42-56. Beijing, China, Nov.24-26, 2011.
  34. Anbang Ruan, Qingni Shen*, Liang Gu, Li Wang, Lei Shi, YahuiYang, ZhongChen. Trusted Isolation Environment: An Attestation Architecture with Usage Control model. The 11st International Conference on Information and Communication Security (ICICS 2009). pp: 226-240. Beijing, China, Dec.14-17, 2009.
  35. Yuqing Qiu, Qingni Shen*, Yang Luo, Cong Li, Zhonghai Wu. A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud, The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia, 1-4 August, 2017.
  36. Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu*. Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  37. Qian Sun, Qingni Shen*, Cong Li, Zhonghai Wu. SeLance: Secure Load Balancing of Virtual Machines in Cloud, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  38. Wu Luo, Wei Liu, Anbang Ruan, Qingni Shen, Zhonghai Wu*. Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  39. Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017),October 9-11 2017, Prague, Czech Republic, pp: 221-227.
  40. Xuhao Wang, Qingni Shen*, Wu Luo, Pengfei Wu. RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis, 13rd IEEE International Conference on Cloud Computing (CLOUD2020),pp:600-608, Beijing, China,18-24 October, 2020。
  41. Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu: OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud. 9th IEEE International Conference on Cloud Computing (CLOUD 2016): 51-58, San Francisco, CA, USA, June 27 - July 2, 2016.
  42. Zhikang Xie, Qingni Shen*, Cong Li, Jisheng Dong, Yuejian Fang: Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet. The 57th IEEE International Conference on Communications (ICC 2021): 1-6, Montreal, QC, Canada, June 14-23, 2021.
  43. Lijing Cheng, Qingni Shen*, Chuntao Dong: Invader Job: A Kind of Malicious Failure Job on Hadoop YARN. The 54th IEEE International Conference on Communications (ICC 2018), 20-24 May 2018 // Kansas City, MO, USA.
  44. Tong Hui, Yahui Yang, Qingni Shen, Zhonghai Wu: Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework. The 54th IEEE International Conference on Communications (ICC 2018), 20-24 May 2018 // Kansas City, MO, USA.
  45. Tian Puyang, Qingni Shen*, Yang Luo, Wu Luo, Zhonghai Wu. Making Least Privilege the Low-Hanging Fruit in Clouds, 53th IEEE International Conference on Communications (ICC 2017), Paris, France, 21-25 May, 2017.
  46. Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen, PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications (ISCC2019). Barcelona, Spain. June 2019.
  47. Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu: Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming. IEEE Symposium on Computers and communications (ISCC 2018): 783-786, 25-28 June, 2018, Natal, Brazil.
  48. Yuchen Wong, Qingni Shen*: Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 613-620, Melbourne, Australia, December 11-13, 2018.
  49. Yizhe Yang, Qingni Shen*, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 407-414, Melbourne, Australia, December 11-13, 2018.
  50. Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark, The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China.
  51. Wenjun Qian, Qingni Shen*, Jia Qin, Dong Yang, Yahui Yang, Zhonghai Wu. S-Storm: A Slot-aware Scheduling Strategy for Even Scheduler in Storm, The 18th IEEE International Conference on High Performance Computing and Communications(HPCC 2016), Sydney, Australia, December 12 - 14, 2016. IEEE, pp.623-630, 2016.
  52. Xin Yang, Qingni Shen*, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proc. of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011): 135-145, Changsha, China. 2011.10
  53. Ennan Zhai, Qingni Shen*, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing. SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. In Proc. of the 13th Asia-Pacific Web Conference (APWeb 2011). pp:370-375, Beijing, China,April 18-20, 2011.
 
  1. 兼任边缘计算产业联盟安全工作组主席。
  2. 兼任国家工业信息安全发展产业联盟理事。
  3. 兼任国际通信与信息安全会议指导委员会委员。
  4. 兼任中国计算机学会计算机安全专委会委员。
  5. 兼任中国密码学会大数据与人工智能专委会委员。
  6. ICICS 2019(http://icics.cn)国际学术会议大会主席。
  7. ACM MM、ICICS、TrustCom、ACNS、STM等国际学术会议程序委员会成员。
  8. Computer & Security、Computer Journal, Information Science等国际期刊审稿专家。