default search action
Jinqiao Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Liyan Shen, Zhenhan Ke, Jinqiao Shi, Xi Zhang, Yanwei Sun, Jiapeng Zhao, Xuebin Wang, Xiaojie Zhao:
SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks. IEEE Internet Things J. 11(8): 13437-13451 (2024) - [j11]Shiyao Cui, Bo-Wen Yu, Xin Cong, Tingwen Liu, Qingfeng Tan, Jinqiao Shi:
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network. J. Comput. Sci. Technol. 39(2): 227-242 (2024) - [j10]Shiyao Cui, Jiangxia Cao, Xin Cong, Jiawei Sheng, Quangang Li, Tingwen Liu, Jinqiao Shi:
Enhancing Multimodal Entity and Relation Extraction With Variational Information Bottleneck. IEEE ACM Trans. Audio Speech Lang. Process. 32: 1274-1285 (2024) - [j9]Xu Liu, Jianing Li, Jinqiao Shi, Xiaopeng Fan, Yonghong Tian, Debin Zhao:
Event-Based Monocular Depth Estimation With Recurrent Transformers. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7417-7429 (2024) - [c116]Zixuan Chen, Chao Zheng, Zhao Li, Jinqiao Shi, Zeyu Li:
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion. CSCWD 2024: 2116-2121 - [c115]Qingfeng Zhang, Muqian Chen, Xuebin Wang, Can Zhao, Qingyun Liu, Jinqiao Shi:
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability. WCNC 2024: 1-7 - [c114]Ruisheng Shi, Zhiyuan Peng, Tong Fu, Lina Lan, Jiaqi Zeng, Yuyang Shi, Jinqiao Shi, Shenwen Lin, Lin Li:
An Identity Alignment Method based on Online Tracking. WWW (Companion Volume) 2024: 609-612 - [c113]Qingfeng Zhang, Zhiyang Teng, Xuebin Wang, Yue Gao, Qingyun Liu, Jinqiao Shi:
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories. WWW 2024: 1812-1823 - 2023
- [j8]Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023) - [j7]Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang:
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. Cybersecur. 6(1): 50 (2023) - [j6]Wenrui Li, Zhengyu Ma, Jinqiao Shi, Xiaopeng Fan:
The Style Transformer With Common Knowledge Optimization for Image-Text Retrieval. IEEE Signal Process. Lett. 30: 1197-1201 (2023) - [c112]Xinru Huang, Jiapeng Zhao, Jinqiao Shi, Yanwei Sun, Xuebin Wang, Liyan Shen:
Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing. DSC 2023: 172-180 - [c111]Haojie Chen, Jiapeng Zhao, Jinqiao Shi, Xuebin Wang, Liyan Shen, Yanwei Sun:
Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure. DSC 2023: 298-305 - [c110]Hongmeng Liu, Jiapeng Zhao, Yixuan Huo, Yuyan Wang, Chun Liao, Liyan Shen, Shiyao Cui, Jinqiao Shi:
URM4DMU: An User Representation Model for Darknet Markets Users. ICASSP 2023: 1-5 - [c109]Qingfeng Zhang, Jiawei Zhu, Muqian Chen, Xuebin Wang, Qingyun Liu, Jinqiao Shi:
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay. ISCC 2023: 1369-1375 - [c108]Wenrui Li, Zhengyu Ma, Liang-Jian Deng, Penghong Wang, Jinqiao Shi, Xiaopeng Fan:
Reservoir Computing Transformer for Image-Text Retrieval. ACM Multimedia 2023: 5605-5613 - [c107]Meiqi Wang, Muqian Chen, Zeyu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang:
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting. TrustCom 2023: 998-1005 - [i9]Shiyao Cui, Jiawei Sheng, Xin Cong, Quangang Li, Tingwen Liu, Jinqiao Shi:
Event Causality Extraction with Event Argument Correlations. CoRR abs/2301.11621 (2023) - [i8]Wenrui Li, Zhengyu Ma, Jinqiao Shi, Xiaopeng Fan:
The style transformer with common knowledge optimization for image-text retrieval. CoRR abs/2303.00448 (2023) - [i7]Hongmeng Liu, Jiapeng Zhao, Yixuan Huo, Yuyan Wang, Chun Liao, Liyan Shen, Shiyao Cui, Jinqiao Shi:
URM4DMU: an user represention model for darknet markets users. CoRR abs/2303.10674 (2023) - [i6]Shiyao Cui, Jiangxia Cao, Xin Cong, Jiawei Sheng, Quangang Li, Tingwen Liu, Jinqiao Shi:
Enhancing Multimodal Entity and Relation Extraction with Variational Information Bottleneck. CoRR abs/2304.02328 (2023) - [i5]Shiyao Cui, Xin Cong, Jiawei Sheng, Xuebin Wang, Tingwen Liu, Jinqiao Shi:
Prompt2Gaussia: Uncertain Prompt-learning for Script Event Prediction. CoRR abs/2308.02103 (2023) - 2022
- [c106]Shiyao Cui, Jiawei Sheng, Xin Cong, Quangang Li, Tingwen Liu, Jinqiao Shi:
Event Causality Extraction with Event Argument Correlations. COLING 2022: 2300-2312 - [c105]Liyan Shen, Ye Dong, Binxing Fang, Jinqiao Shi, Xuebin Wang, Shengli Pan, Ruisheng Shi:
ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions. DAC 2022: 361-366 - [c104]Dayin Zhang, Xiaojun Chen, Jinqiao Shi:
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy. EISA 2022: 173-190 - [c103]Shiyao Cui, Xin Cong, Bowen Yu, Tingwen Liu, Yucheng Wang, Jinqiao Shi:
Document-Level Event Extraction via Human-Like Reading Process. ICASSP 2022: 6337-6341 - [c102]Xuebin Wang, Zhipeng Chen, Zeyu Li, Wentao Huang, Meiqi Wang, Shengli Pan, Jinqiao Shi:
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence. ICCS (1) 2022: 554-568 - [c101]Shaopu Wang, Xiaojun Chen, Mengzhen Kou, Jinqiao Shi:
PrUE: Distilling Knowledge from Sparse Teacher Networks. ECML/PKDD (3) 2022: 102-117 - [c100]Shaopu Wang, Xiaoying Li, Jiaxin Zhang, Xiaojun Chen, Jinqiao Shi:
Improved Network Pruning via Similarity-Based Regularization. PRICAI (2) 2022: 416-429 - [i4]Shiyao Cui, Xin Cong, Bowen Yu, Tingwen Liu, Yucheng Wang, Jinqiao Shi:
Document-Level Event Extraction via Human-Like Reading Process. CoRR abs/2202.03092 (2022) - [i3]Shaopu Wang, Xiaojun Chen, Mengzhen Kou, Jinqiao Shi:
PrUE: Distilling Knowledge from Sparse Teacher Networks. CoRR abs/2207.00586 (2022) - 2021
- [c99]Qingfeng Zhang, Xuebin Wang, Jinqiao Shi, Meiqi Wang, Yue Gao, Can Zhao:
ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers. CNCERT 2021: 93-109 - [c98]Xuebin Wang, Meiqi Wang, Jinqiao Shi, Zeyu Li, Kexin Zou, Binxing Fang:
Efficient Classification of Darknet Access Activity with Partial Traffic. CNCERT 2021: 113-128 - [c97]Jiapeng Zhao, Panpan Zhang, Tingwen Liu, Zhenyu Zhang, Yanzeng Li, Jinqiao Shi:
Relation Extraction based on Data Partition and Representation Integration. DSC 2021: 68-75 - [c96]Panpan Zhang, Jing Ya, Tingwen Liu, Jinqiao Shi:
Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web. DSC 2021: 76-82 - [c95]Zeyu Li, Meiqi Wang, Xuebin Wang, Jinqiao Shi, Kexin Zou, Majing Su:
Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications. DSC 2021: 91-98 - [c94]Kexin Zou, Jinqiao Shi, Yue Gao, Xuebin Wang, Meiqi Wang, Zeyu Li, Majing Su:
Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection. DSC 2021: 99-105 - [c93]Panpan Zhang, Yao Qi, Yanzeng Li, Jing Ya, Xuebin Wang, Tingwen Liu, Jinqiao Shi:
Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion. DSC 2021: 321-327 - [c92]Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Can Zhao, Chenglong Li:
A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes. HPCC/DSS/SmartCity/DependSys 2021: 543-550 - [c91]Panpan Zhang, Xuebin Wang, Jing Ya, Jiapeng Zhao, Tingwen Liu, Jinqiao Shi:
Darknet Public Hazard Entity Recognition Based on Deep Learning. ICEA 2021: 94-100 - [c90]Xuebin Wang, Zeyu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang:
Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario. ICEA 2021: 205-210 - [c89]Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Zelin Yin, Yanyan Yang:
Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis. ISPA/BDCloud/SocialCom/SustainCom 2021: 1402-1409 - [c88]Jiapeng Zhao, Panpan Zhang, Tingwen Liu, Jinqiao Shi:
SEPC: Improving Joint Extraction of Entities and Relations by Strengthening Entity Pairs Connection. PAKDD (1) 2021: 817-828 - [c87]Dayin Zhang, Xiaojun Chen, Jinqiao Shi, Dakui Wang, Shuai Zeng:
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment. TrustCom 2021: 347-354 - 2020
- [c86]Qingling Feng, Ruisheng Shi, Qifeng Luo, Lina Lan, Jinqiao Shi:
Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud Services. IEEE BigData 2020: 5668-5670 - [c85]Haoliang Zhang, Hongbo Xu, Jinqiao Shi, Tingwen Liu, Chun Liao:
Word Level Domain-Diversity Attention Based LSTM Model for Sentiment Classification. DSC 2020: 164-170 - [c84]Shiyao Cui, Bowen Yu, Tingwen Liu, Zhenyu Zhang, Xuebin Wang, Jinqiao Shi:
Edge-Enhanced Graph Convolution Networks for Event Detection with Syntactic Relation. EMNLP (Findings) 2020: 2329-2339 - [c83]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. ESORICS (1) 2020: 419-439 - [c82]Siyuan Wang, Peng Liu, Jinqiao Shi, Xuebin Wang, Can Zhao, Zelin Yin:
Learn More from Context: Joint Modeling of Local and Global Attention for Aspect Sentiment Classification. ICCS (7) 2020: 271-284 - [c81]Siyuan Wang, Yue Gao, Jinqiao Shi, Xuebin Wang, Can Zhao, Zelin Yin:
Look Deep into the New Deep Network: A Measurement Study on the ZeroNet. ICCS (1) 2020: 595-608 - [c80]Meiqi Wang, Yanzeng Li, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Muqian Chen:
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks. ISCC 2020: 1-7 - [c79]Peng Liu, Tingwen Liu, Jinqiao Shi, Xuebin Wang, Zelin Yin, Can Zhao:
Aspect level sentiment classification with unbiased attention and target enhanced representations. SAC 2020: 843-850 - [c78]Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. TrustCom 2020: 699-706 - [i2]Shiyao Cui, Bowen Yu, Tingwen Liu, Zhenyu Zhang, Xuebin Wang, Jinqiao Shi:
Event Detection with Relation-Aware Graph Convolutional Neural Networks. CoRR abs/2002.10757 (2020) - [i1]Shiyao Cui, Bowen Yu, Xin Cong, Tingwen Liu, Quangang Li, Jinqiao Shi:
Label Enhanced Event Detection with Heterogeneous Graph Attention Networks. CoRR abs/2012.01878 (2020)
2010 – 2019
- 2019
- [j5]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang, Zhihong Tian:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j4]Wei Sun, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. Secur. Commun. Networks 2019: 6045251:1-6045251:11 (2019) - [c77]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Binxing Fang:
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash. ICC 2019: 1-7 - [c76]Jiapeng Zhao, Tingwen Liu, Jinqiao Shi:
Improving Academic Homepage Identification from the Web Using Neural Networks. ICCS (5) 2019: 551-558 - [c75]Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun:
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. ICICS 2019: 521-538 - [c74]Qu Liu, Zhenyu Zhang, Yanzeng Li, Tingwen Liu, Diying Li, Jinqiao Shi:
ICNet: Incorporating Indicator Words and Contexts to Identify Functional Description Information. IJCNN 2019: 1-8 - [c73]Jing Ya, Tingwen Liu, Panpan Zhang, Jinqiao Shi, Li Guo, Zhaojun Gu:
NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples. IJCNN 2019: 1-7 - [c72]Lina Lan, Ruisheng Shi, Bai Wang, Lei Zhang, Jinqiao Shi:
A Lightweight Time Series Main-Memory Database for IoT Real-Time Services. IOV 2019: 220-236 - [c71]Mingdong Li, Qifeng Luo, Lu Wang, Ruisheng Shi, Jinqiao Shi:
Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption. IOV 2019: 374-381 - [c70]Yue Gao, Jinqiao Shi, Xuebin Wang, Qingfeng Tan, Can Zhao, Zelin Yin:
Topology Measurement and Analysis on Ethereum P2P Network. ISCC 2019: 1-7 - [c69]Muqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang:
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel. ISCC 2019: 1-7 - [c68]Panpan Zhang, Jing Ya, Tingwen Liu, Quangang Li, Jinqiao Shi, Zhaojun Gu:
iMCircle: Automatic Mining of Indicators of Compromise from the Web. ISCC 2019: 1-6 - [c67]Haoliang Zhang, Hongbo Xu, Jinqiao Shi, Tingwen Liu, Jing Ya:
SFV-CNN: Deep Text Sentiment Classification with Scenario Feature Representation. MACIS 2019: 382-394 - [c66]Rui Xu, Xiaojun Chen, Jinqiao Shi:
A coarse-grained password model with memorable unit-based recurrent neural networks. SAC 2019: 1890-1897 - 2018
- [c65]Yanzeng Li, Tingwen Liu, Diying Li, Quangang Li, Jinqiao Shi, Yanqiu Wang:
Character-based BiLSTM-CRF Incorporating POS and Dictionaries for Chinese Opinion Target Extraction. ACML 2018: 518-533 - [c64]Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:
Insider Threat Detection Using Characterizing User Behavior. DSC 2018: 476-482 - [c63]Rui Xu, Xiaojun Chen, Xingxing Wang, Jinqiao Shi:
An In-depth Study of Digits in Passwords for Chinese Websites. DSC 2018: 588-595 - [c62]Dayin Zhang, Xiaojun Chen, Dakui Wang, Jinqiao Shi:
A Survey on Collaborative Deep Learning and Privacy-Preserving. DSC 2018: 652-658 - [c61]Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. DSC 2018: 659-664 - [c60]Meiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi:
De-anonymizing Social Networks User via Profile Similarity. DSC 2018: 889-895 - [c59]Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang:
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes. DSC 2018: 948-955 - [c58]Hong Ding, Chuang Zhang, Xiaojun Chen, Jinqiao Shi, Wenan Wang:
Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud. HPCC/SmartCity/DSS 2018: 750-757 - [c57]Pin Lv, Jing Ya, Tingwen Liu, Jinqiao Shi, Binxing Fang, Zhaojun Gu:
You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse. ICCS (1) 2018: 221-233 - [c56]Xiaojun Chen, Li Bai, Dakui Wang, Jinqiao Shi:
Improve Word Mover's Distance with Part-of-Speech Tagging. ICPR 2018: 3722-3728 - [c55]Mengyu Zheng, Chuan Zhou, Jia Wu, Shirui Pan, Jinqiao Shi, Li Guo:
FraudNE: a Joint Embedding Approach for Fraud Detection. IJCNN 2018: 1-8 - [c54]Jing Ya, Tingwen Liu, Quangang Li, Pin Lv, Jinqiao Shi, Li Guo:
Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks. MILCOM 2018: 58-63 - 2017
- [c53]Jianwei Ma, Xiaojun Chen, Rui Xu, Jinqiao Shi:
Implementation and Evaluation of Different Parallel Designs of AES Using CUDA. DSC 2017: 606-614 - [c52]Xiaojie Yu, Xiaojun Chen, Jinqiao Shi, Liyan Shen, Dakui Wang:
Efficient and Scalable Privacy-Preserving Similar Document Detection. GLOBECOM 2017: 1-7 - [c51]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang:
A closer look at Eclipse attacks against Tor hidden services. ICC 2017: 1-6 - [c50]Jing Ya, Tingwen Liu, Quangang Li, Jinqiao Shi, Haoliang Zhang, Pin Lv, Li Guo:
Mining Host Behavior Patterns From Massive Network and Security Logs. ICCS 2017: 38-47 - [c49]Yang Yan, Tingwen Liu, Quangang Li, Jinqiao Shi, Li Guo, Yubin Wang:
Recognizing Compound Entity Phrases in Hybrid Academic Domains in View of Community Division. ICCS 2017: 2287-2291 - [c48]Panpan Zhang, Tingwen Liu, Yang Zhang, Jing Ya, Jinqiao Shi, Yubin Wang:
Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual Features. ICCS 2017: 2408-2412 - [c47]Yang Yan, Tingwen Liu, Jinqiao Shi, Qiuyan Wang, Li Guo:
Flexible Expert Finding on the Web via Semantic Hypergraph Learning and Affinity Propagation Model. ICTAI 2017: 1204-1209 - [c46]Yue Gao, Qingfeng Tan, Jinqiao Shi, Xuebin Wang, Muqian Chen:
Large-scale discovery and empirical analysis for I2P eepSites. ISCC 2017: 444-449 - [c45]Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo:
Improving Password Guessing Using Byte Pair Encoding. ISC 2017: 254-268 - 2016
- [c44]Jiapeng Zhao, Yang Yan, Tingwen Liu, Jinqiao Shi:
Towards Personal Relation Extraction Based on Sentence Pattern Tree. CCKS 2016: 92-103 - [c43]Yubin Wang, Tingwen Liu, Qingfeng Tan, Jinqiao Shi, Li Guo:
Identifying Users across Different Sites using Usernames. ICCS 2016: 376-385 - [c42]Jinqiao Shi, Bingwei He, Liwei Zhang, Jianwei Zhang:
Vision-based real-time 3D mapping for UAV with laser sensor. IROS 2016: 4524-4529 - [c41]Yang Yan, Tingwen Liu, Li Guo, Jiapeng Zhao, Jinqiao Shi:
An Unsupervised Framework Towards Sci-Tech Compound Entity Recognition. KSEM 2016: 110-122 - [c40]Tingwen Liu, Yang Zhang, Jinqiao Shi, Jing Ya, Quangang Li, Li Guo:
Towards quantifying visual similarity of domain names for combating typosquatting abuse. MILCOM 2016: 770-775 - [c39]Rui Xu, Xiaojun Chen, Yingbing Wang, Jinqiao Shi, Haitao Mi:
Memory chunking analysis of numerical password for Chinese websites. MILCOM 2016: 788-793 - [c38]Kang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, Xuebin Wang:
Out-of-band discovery and evaluation for tor hidden services. SAC 2016: 2057-2062 - 2015
- [c37]Tingwen Liu, Yang Zhang, Yang Yan, Jinqiao Shi, Li Guo:
A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition. APWeb 2015: 732-743 - [c36]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - [c35]Yiguo Pu, Jinqiao Shi, Xiaojun Chen, Li Guo, Tingwen Liu:
Towards misdirected email detection based on multi-attributes. ISCC 2015: 796-802 - [c34]Jing Ya, Tingwen Liu, Haoliang Zhang, Jinqiao Shi, Li Guo:
An automatic approach to extract the formats of network and security log messages. MILCOM 2015: 1542-1547 - 2014
- [j3]Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi:
Empirical Measurement and Analysis of I2P Routers. J. Networks 9(9): 2269-2278 (2014) - [j2]Tingwen Liu, Alex X. Liu, Jinqiao Shi, Yong Sun, Li Guo:
Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation. IEEE J. Sel. Areas Commun. 32(10): 1797-1809 (2014) - [c33]Yichen Wei, Xu Fei, Xiaojun Chen, Jinqiao Shi, Sihan Qing:
Winnowing Multihashing Structure with Wildcard Query. APWeb Workshophs 2014: 265-281 - [c32]Rui Zhang, Xiaojun Chen, Jinqiao Shi, Fei Xu, Yiguo Pu:
Detecting Insider Threat Based on Document Access Behavior Analysis. APWeb Workshophs 2014: 376-387 - [c31]Quangang Li, Jinqiao Shi, Tingwen Liu, Li Guo, Zhiguang Qin:
A probabilistic approach towards modeling email network with realistic features. ICCCN 2014: 1-8 - [c30]Xiaojun Chen, Fei Xu, Rui Xu, Siu-Ming Yiu, Jinqiao Shi:
A practical real-time authentication system with Identity Tracking based on mouse dynamics. INFOCOM Workshops 2014: 121-122 - [c29]Tingwen Liu, Yiguo Pu, Jinqiao Shi, Quangang Li, Xiaojun Chen:
Towards misdirected email detection for preventing information leakage. ISCC 2014: 1-6 - [c28]Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu:
CAS: Content Attribution System for Network Forensics. ISCTCS 2014: 129-136 - [c27]Zilu Zhang, Jinqiao Shi, Lanlan Hu:
Towards Enumeration of NTFS Using USN Journals Under UEFI. ISCTCS 2014: 166-174 - [c26]Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing:
Winnowing Double Structure for Wildcard Query in Payload Attribution. ISC 2014: 454-464 - [c25]Jinqiao Shi, Xiao Wang, Binxing Fang, Li Guo:
A Moving Target Framework to Improve Network Service Accessibility. NAS 2014: 281-286 - [c24]Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo:
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy. SecureComm (1) 2014: 535-540 - 2013
- [c23]Peipeng Liu, Jinqiao Shi, Fei Xu, Lihong Wang, Li Guo:
Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors. APWeb 2013: 332-339 - [c22]Xiao Wang, Jinqiao Shi, Binxing Fang, Li Guo:
An empirical analysis of family in the Tor network. ICC 2013: 1995-2000 - [c21]Haoliang Zhang, Jinqiao Shi, Xiaojun Chen:
A Multi-Level Analysis Framework in Network Security Situation Awareness. ITQM 2013: 530-536 - [c20]Yiguo Pu, Xiaojun Chen, Xu Cui, Jinqiao Shi, Li Guo, Cheng Qi:
Data Stolen Trojan Detection based on Network Behaviors. ITQM 2013: 828-835 - [c19]Xiao Wang, Jinqiao Shi, Li Guo:
Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack. ITQM 2013: 836-843 - [c18]Rui Xu, Xiaojun Chen, Jinqiao Shi:
A Multiple Watermarking Algorithm for Texts Mixed Chinese and English. ITQM 2013: 844-851 - [c17]Cheng Qi, Xiaojun Chen, Cui Xu, Jinqiao Shi, Peipeng Liu:
A Bigram based Real Time DNS Tunnel Detection Approach. ITQM 2013: 852-860 - [c16]Wenyu Zang, Peng Zhang, Xiao Wang, Jinqiao Shi, Li Guo:
Detecting Sybil Nodes in Anonymous Communication Systems. ITQM 2013: 861-869 - [c15]Xiaojun Chen, Zicheng Wei, Yiguo Pu, Jinqiao Shi:
A Continuous Re-Authentication Approach Using Ensemble Learning. ITQM 2013: 870-878 - [c14]Fei Xu, Jinqiao Shi, Xiaojun Chen, Kam-Pui Chow:
A Three-Dimensional Evaluation Model for Network Management System. ITQM 2013: 888-892 - [c13]Peipeng Liu, Jinqiao Shi, Lihong Wang, Xiao Wang, Qingfeng Tan:
IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network. NAS 2013: 166-172 - [c12]Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. SecureComm 2013: 53-68 - 2012
- [c11]Wei Guo, Lidong Zhai, Li Guo, Jinqiao Shi:
Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. APWeb Workshops 2012: 68-77 - [c10]Lidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo, Jinqiao Shi:
Worm Propagation Model for Heterogeneous Network. CyberC 2012: 151-154 - [c9]Xiao Wang, Jinqiao Shi, Li Guo:
Towards Analyzing Traceability of Data Leakage by Malicious Insiders. ISCTCS 2012: 148-155 - [c8]Fanwen Xu, Qingfeng Tan, Jinqiao Shi, Li Guo:
Unobservable Rendezvous Negotiation in P2P Networks. ISCTCS 2012: 380-387 - [c7]Yiguo Pu, Jinqiao Shi, Li Guo:
A Hierarchical Method for Clustering Binary Text Image. ISCTCS 2012: 388-396 - [c6]Peipeng Liu, Jinqiao Shi, Lihong Wang, Li Guo:
An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA. ISCTCS 2012: 420-428 - [c5]Xiaojun Chen, Jinqiao Shi, Yiguo Pu, Haoliang Zhang:
An Intent-Driven Masquerader Detection Framework Based on Data Fusion. ISCTCS 2012: 450-457 - [c4]Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). RAID 2012: 376-377 - 2011
- [c3]Qingfeng Tan, Peipeng Liu, Jinqiao Shi, Xiao Wang, Li Guo:
A Covert Communication Method Based on User-Generated Content Sites. ICTAI 2011: 1053-1056
2000 – 2009
- 2008
- [c2]Jian-Wei Ye, Binxing Fang, Jinqiao Shi, Zhi-Gang Wu:
Protecting Mobile Codes Using the Decentralized Label Model. WAIM 2008: 493-500 - 2006
- [j1]Jinqiao Shi, Binxing Fang, Li-Jie Shao:
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack. Internet Res. 16(2): 213-223 (2006) - 2004
- [c1]Jinqiao Shi, Binxing Fang, Bin Li:
Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment. PDCAT 2004: 613-618
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint