default search action
Tao Qin 0002
Person information
- affiliation: Xi'an Jiaotong University, Xi'an, China
Other persons with the same name
- Tao Qin — disambiguation page
- Tao Qin 0001 — Microsoft Research, Beijing, China
- Tao Qin 0003 — University of Electronic Science and Technology of China, Chengdu, China (and 2 more)
- Tao Qin 0004 — Guizhou University, Guiyang, China
- Tao Qin 0005 — Macau University of Science and Technology, Taipa, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Shaowei Wang, Lingling Zhang, Tao Qin, Jun Liu, Yifei Li, Qianying Wang, Qinghua Zheng:
Multi-view cognition with path search for one-shot part labeling. Comput. Vis. Image Underst. 244: 104015 (2024) - [j34]Kuiyu Zhu, Tao Qin, Xin Wang, Zhaoli Liu, Chenxu Wang:
Distribution-aware hybrid noise augmentation in graph contrastive learning for recommendation. Expert Syst. Appl. 257: 125118 (2024) - [j33]Chenxu Wang, Peijing Jiang, Xiangliang Zhang, Pinghui Wang, Tao Qin, Xiaohong Guan:
GTCAlign: Global Topology Consistency-Based Graph Alignment. IEEE Trans. Knowl. Data Eng. 36(5): 2009-2025 (2024) - [c24]Shaowei Wang, Lingling Zhang, Longji Zhu, Tao Qin, Kim-Hui Yap, Xinyu Zhang, Jun Liu:
CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering. CVPR 2024: 13969-13979 - 2023
- [j32]Yuzhe Zhang, Huan Liu, Dalin Zhang, Xuxu Chen, Tao Qin, Qinghua Zheng:
EEG-Based Emotion Recognition With Emotion Localization via Hierarchical Self-Attention. IEEE Trans. Affect. Comput. 14(3): 2458-2469 (2023) - [j31]Huan Liu, Ke Li, Jianping Fan, Caixia Yan, Tao Qin, Qinghua Zheng:
Social Image-Text Sentiment Classification With Cross-Modal Consistency and Knowledge Distillation. IEEE Trans. Affect. Comput. 14(4): 3332-3344 (2023) - [j30]Changyu Wang, Pinghui Wang, Tao Qin, Chenxu Wang, Suhansanu Kumar, Xiaohong Guan, Jun Liu, Kevin Chen-Chuan Chang:
SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning. IEEE Trans. Neural Networks Learn. Syst. 34(9): 5654-5668 (2023) - [c23]Kuiyu Zhu, Tao Qin, Xin Wang, Zhouguo Chen, Jianwei Ding:
Graph Contrastive Learning with Hybrid Noise Augmentation for Recommendation. ADMA (4) 2023: 325-339 - 2022
- [j29]Tao Qin, Bo Wang, Zhaoli Liu, Zhouguo Chen, Jianwei Ding:
High-quality tweet generation for online behavior security management based on semantics measurement. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j28]Zhaoli Liu, Tao Qin, Qindong Sun, Shancang Li, Houbing Herbert Song, Zhouguo Chen:
SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control. IEEE Trans. Comput. Soc. Syst. 9(6): 1703-1714 (2022) - [j27]Shaowei Wang, Lingling Zhang, Xuan Luo, Yi Yang, Xin Hu, Tao Qin, Jun Liu:
Computer Science Diagram Understanding with Topology Parsing. ACM Trans. Knowl. Discov. Data 16(6): 114:1-114:20 (2022) - [j26]Changyu Wang, Kevin Chen-Chuan Chang, Pinghui Wang, Tao Qin, Xiaohong Guan:
Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation. IEEE Trans. Knowl. Data Eng. 34(9): 4285-4297 (2022) - [c22]Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen:
TPIPD: A Robust Model for Online VPN Traffic Classification. TrustCom 2022: 105-110 - 2021
- [c21]Shaowei Wang, Lingling Zhang, Yi Yang, Xin Hu, Tao Qin, Bifan Wei, Jun Liu:
CSDQA: Diagram Question Answering in Computer Science. CCKS 2021: 274-280 - 2020
- [j25]Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin:
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access 8: 145033-145036 (2020) - [j24]Chenxu Wang, Yang Wang, Zhiyuan Zhao, Dong Qin, Xiapu Luo, Tao Qin:
Credible seed identification for large-scale structural network alignment. Data Min. Knowl. Discov. 34(6): 1744-1776 (2020) - [j23]Changyu Wang, Xiaohong Guan, Tao Qin, Pinghui Wang, Jing Tao, Yongwei Meng, Jingyuan Liu:
Addressing the train-test gap on traffic classification combined subflow model with ensemble learning. Knowl. Based Syst. 204: 106192 (2020) - [j22]Tao Qin, Zhaoli Liu, Shancang Li, Xiaohong Guan:
A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model. Mob. Networks Appl. 25(4): 1364-1375 (2020) - [j21]Tao Qin, Zhaoli Liu, Pinghui Wang, Shancang Li, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. IEEE Trans. Inf. Forensics Secur. 15: 1040-1055 (2020)
2010 – 2019
- 2019
- [j20]Tao Qin, Bo Wang, Ruoya Chen, Zunying Qin, Lei Wang:
IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things. Sensors 19(4): 958 (2019) - [j19]Shancang Li, Tao Qin, Geyong Min:
Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems. IEEE Trans. Comput. Soc. Syst. 6(6): 1433-1441 (2019) - [c20]Jingyuan Liu, Wei Li, Tao Qin, Liang Zhao, Yuli Gao, Wenqiang Ma:
User Identification Cross Multiple Social Media Platform with Revised Input Output Network Embedding Framework. DASC/PiCom/DataCom/CyberSciTech 2019: 422-426 - 2018
- [j18]Yongwei Meng, Tao Qin, Yukun Liu, Chao He:
An Effective High Threating Alarm Mining Method for Cloud Security Management. IEEE Access 6: 22634-22644 (2018) - [j17]Zhaoli Liu, Tao Qin, Xiaohong Guan, Hezhi Jiang, Chenxu Wang:
An Integrated Method for Anomaly Detection From Massive System Logs. IEEE Access 6: 30602-30611 (2018) - [j16]Zhaoli Liu, Xiaohong Guan, Shancang Li, Tao Qin, Chao He:
Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management. IEEE Access 6: 73940-73951 (2018) - [j15]Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang:
Potential threats mining methods based on correlation analysis of multi-type logs. IET Networks 7(5): 299-305 (2018) - [j14]Huan Liu, Qinghua Zheng, Zhihui Li, Tao Qin, Lei Zhu:
An efficient multi-feature SVM solver for complex event detection. Multim. Tools Appl. 77(3): 3509-3532 (2018) - [c19]Tao Qin, Ruoya Chen, Lei Wang, Chao He:
LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents. CNS 2018: 1-8 - [c18]Tao Qin, Chao He, Hezhi Jiang, Ruoya Chen:
Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud. CNS 2018: 1-7 - [c17]Chenxu Wang, Zhiyuan Zhao, Yang Wang, Dong Qin, Xiapu Luo, Tao Qin:
DeepMatching: A Structural Seed Identification Framework for Social Network Alignment. ICDCS 2018: 600-610 - [c16]Yongwei Meng, Tao Qin, Yukun Liu, Chao He:
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application. ISCC 2018: 1-6 - 2017
- [j13]Lei Ding, Jun Liu, Tao Qin, Haifei Li:
Internet traffic classification based on expanding vector of flow. Comput. Networks 129: 178-192 (2017) - [c15]Chenxu Wang, Yang Wang, Tao Qin, Hui Li:
From micro to macro: Propagated constraints in social networks. CASE 2017: 1534-1539 - [c14]Changyu Wang, Xiaohong Guan, Tao Qin:
A traffic classification approach based on characteristics of subflows and ensemble learning. IM 2017: 588-591 - [c13]Tao Qin, Yukun Liu, Chenxu Wang, Tao Yang, Chao He:
From online to offline: Charactering user's online music listening behavior for efficacious offline radio program arrangement. ISCC 2017: 1219-1224 - 2016
- [j12]Chenxu Wang, Xiaohong Guan, Tao Qin, Tao Yang:
Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions. Inf. Sci. 330: 186-198 (2016) - [j11]Tao Qin, Lei Wang, Dan Zhao, Min Zhu:
CUFTI: Methods for core users finding and traffic identification in P2P systems. Peer-to-Peer Netw. Appl. 9(2): 424-435 (2016) - [c12]Zhaoli Liu, Tao Qin, Dan Zhao, Xiaohong Guan, Tao Yang:
A new model for nickname detection based on network structure and similarity propagation. ISCC 2016: 1103-1108 - 2015
- [j10]Tao Qin, Lei Wang, Zhaoli Liu, Xiaohong Guan:
Robust application identification methods for P2P and VoIP traffic classification in backbone networks. Knowl. Based Syst. 82: 152-162 (2015) - [j9]Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng:
Analysis of user's behavior and resource characteristics for private trackers. Peer-to-Peer Netw. Appl. 8(3): 432-446 (2015) - [j8]Tao Qin, Xiaohong Guan, Chenxu Wang, Zhaoli Liu:
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring. IEEE Syst. J. 9(4): 1322-1333 (2015) - [c11]Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang:
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics. TrustCom/BigDataSE/ISPA (1) 2015: 1154-1159 - 2014
- [j7]Tao Qin, Wei Li, Chenxu Wang, Xingjun Zhang:
A New Way for User's Web Communication Visualization and Measurement: Modeling, Experiment and Application. IEICE Trans. Commun. 97-B(4): 730-737 (2014) - [j6]Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zhe:
Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring. KSII Trans. Internet Inf. Syst. 8(4): 1307-1323 (2014) - [j5]Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Min Zhu:
A new connection degree calculation and measurement method for large scale network monitoring. J. Netw. Comput. Appl. 41: 15-26 (2014) - [j4]Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin:
A New Sketch Method for Measuring Host Connection Degree Distribution. IEEE Trans. Inf. Forensics Secur. 9(6): 948-960 (2014) - [c10]Tao Qin, Dan Zhao, Min Zhu, Wei Li:
Mapping different online behaviors to physical user for comprehensive knowledge-pushing services. ICC Workshops 2014: 671-675 - 2013
- [c9]Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng, Qiuzhen Huang:
An in-depth measurement and analysis of popular private tracker systems in China. ICC 2013: 2272-2276 - [c8]Wei Li, Guangze Cao, Tao Qin, Ping Cao:
A hierarchical method for user's behavior characteristics visualization and special user identification. ICON 2013: 1-5 - 2012
- [c7]Tao Qin, Wei Li, Xiaohong Guan, Zhaoli Liu:
Behavior spectrum: An effective method for user's web access behavior monitoring and measurement. GLOBECOM 2012: 961-966 - [c6]Chenxu Wang, Xiaohong Guan, Tao Qin, Wei Li:
Who are active? An in-depth measurement on user activity characteristics in sina microblogging. GLOBECOM 2012: 2083-2088 - [c5]Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng:
Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network. ICON 2012: 395-399 - 2011
- [j3]Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang:
Monitoring abnormal network traffic based on blind source separation approach. J. Netw. Comput. Appl. 34(5): 1732-1742 (2011) - [j2]Pinghui Wang, Xiaohong Guan, Tao Qin, Qiuzhen Huang:
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1086-1098 (2011) - 2010
- [j1]Xiaohong Guan, Tao Qin, Wei Li, Pinghui Wang:
Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring. IEEE Trans. Inf. Forensics Secur. 5(4): 905-919 (2010)
2000 – 2009
- 2009
- [c4]Tao Qin, Xiaohong Guan, Yi Long, Wei Li:
Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. ACIS-ICIS 2009: 323-328 - [c3]Pinghui Wang, Xiaohong Guan, Tao Qin:
P2P Traffic Identification Based on the Signatures of Key Packets. CAMAD 2009: 1-5 - [c2]Xiaohong Guan, Pinghui Wang, Tao Qin:
A New Data Streaming Method for Locating Hosts with Large Connection Degree. GLOBECOM 2009: 1-6 - [c1]Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang:
Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. ICC 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint