![]() |
个人信息Personal Information
教授 博士生导师 硕士生导师
性别:男
出生日期:1976-01-26
毕业院校:南京大学
学历:博士研究生毕业
学位:博士生
在职信息:在职
所在单位:网络空间安全学院(研究院)
入职时间:2006-10-11
办公地点:济南市山大南路27号
电子邮箱:guoshanqing@sdu.edu.cn
扫描关注
- [21] 李蕊. Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems. USENIX Security Symposium, 2023.
- [22] 吕凤岩. ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications. IEEE ICC, 2023.
- [23] 马凯. 面向Android生态系统中的第三方SDK安全性分析. 软件学报, 2018.
- [24] 牛天资. Semantic Enhanced Video Captioning with Multi-feature Fusion. ACM Transactions on Multimedia Computing Communications and Applications, 2023.
- [25] 牛天资. A Multi-layer Memory Sharing Network for Video Captioning. Pattern Recognition, 2023.
- [26] 闫凯伦. Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems. 2023.
- [27] 陈振铎. Fine-Grained Hashing With Double Filtering. IEEE Transactions on Image Processing, 31, 1671, 2022.
- [28] 郭山清. FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. 2022.
- [29] 郭山清. Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. 2022.
- [30] 郭山清. An Extensive Study of Residential Proxies in China. 2022.
- [31] 郭山清. SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. 2022.
- [32] 秦桂云. Blockchain‐based secure deduplication of encrypted data supporting client‐side semantically secure encryption without trusted third party. Transactions on Emerging Telecommunications Technologies, 2022.
- [33] 杜建琪. Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. 2022.
- [34] 陈宇轩. SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022.
- [35] 唐朋. Differentially Private Publication of Multi-Party Sequential Data. 37th IEEE International Conference on Data Engineering, ICDE 2021, 2021.
- [36] 唐朋. Multi-Dimensional Data Publishing With Local Differential Privacy. Proceedings 26th International Conference on Extending Database Technology, 2022.
- [37] 唐朋. Multi-Dimensional Data Publishing With Local Differential Privacy. Proceedings 26th International Conference on Extending Database Technology, 183, 2022.
- [38] 胡程瑜. Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mobile Networks and Applications, 26, 2490, 2021.
- [39] 张宸楠. PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis. 2022.
- [40] 李蕊. Android Custom Permissions Demystified: A Comprehensive Security Evaluation. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021.