Follow
Qingfeng Tan
Qingfeng Tan
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Toward a comprehensive insight into the eclipse attacks of tor hidden services
Q Tan, Y Gao, J Shi, X Wang, B Fang, Z Tian
IEEE Internet of Things Journal 6 (2), 1584-1593, 2018
1332018
Topology measurement and analysis on ethereum p2p network
Y Gao, J Shi, X Wang, Q Tan, C Zhao, Z Yin
2019 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2019
432019
Inferring attack intent of malicious insider based on probabilistic attack graph model
XJ Chen, BX Fang, QF Tan, H Zhang
Chinese Journal of Computers 37 (1), 62-72, 2014
422014
Identifying users across different sites using usernames
Y Wang, T Liu, Q Tan, J Shi, L Guo
Procedia Computer Science 80, 376-385, 2016
312016
Empirical measurement and analysis of I2P routers
P Liu, L Wang, Q Tan, Q Li, X Wang, J Shi
Journal of Networks 9 (9), 2269, 2014
312014
De-anonymizing social networks user via profile similarity
M Wang, Q Tan, X Wang, J Shi
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
212018
Graph neural network for ethereum fraud detection
R Tan, Q Tan, P Zhang, Z Li
2021 IEEE international conference on big knowledge (ICBK), 78-85, 2021
202021
Who are in the darknet? Measurement and analysis of darknet person attributes
M Wang, X Wang, J Shi, Q Tan, Y Gao, M Chen, X Jiang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
202018
Insider threat detection using characterizing user behavior
X Wang, Q Tan, J Shi, S Su, M Wang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
182018
An anonymity vulnerability in Tor
Q Tan, X Wang, W Shi, J Tang, Z Tian
IEEE/ACM Transactions on Networking 30 (6), 2574-2587, 2022
162022
Out-of-band discovery and evaluation for tor hidden services
K Li, P Liu, Q Tan, J Shi, Y Gao, X Wang
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2057-2062, 2016
152016
Towards measuring unobservability in anonymous communication systems
Q Tan, J Shi, B Fang, L Guo, W Zhang, X Wang, B Wei
Journal of Computer Research and Development 52 (10), 2373-2381, 2015
142015
Exploring stroke-level modifications for scene text editing
Y Qu, Q Tan, H Xie, J Xu, Y Wang, Y Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (2), 2119-2127, 2023
122023
A study of bitcoin de-anonymization: Graph and multidimensional data analysis
X Lv, Y Zhong, Q Tan
2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC …, 2020
102020
A closer look at Eclipse attacks against Tor hidden services
Q Tan, Y Gao, J Shi, X Wang, B Fang
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
102017
Approximation algorithms for controller placement problems in Software Defined Networks
T Li, Z Gu, X Lin, S Li, Q Tan
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
92018
Large-scale discovery and empirical analysis for I2P eepSites
Y Gao, Q Tan, J Shi, X Wang, M Chen
2017 IEEE Symposium on Computers and Communications (ISCC), 444-449, 2017
92017
Multi-task hourglass network for online automatic diagnosis of developmental dysplasia of the hip
J Xu, H Xie, Q Tan, H Wu, C Liu, S Zhang, Z Mao, Y Zhang
World wide web 26 (2), 539-559, 2023
82023
Boundary-aware arbitrary-shaped scene text detector with learnable embedding network
M Xing, H Xie, Q Tan, S Fang, Y Wang, Z Zha, Y Zhang
IEEE Transactions on Multimedia 24, 3129-3143, 2021
72021
Generation and distribution of decoy document system
L Wang, C Li, QF Tan, XB Wang
Trustworthy Computing and Services: International Conference, ISCTCS 2013 …, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20