Jinqiao Shi
Orcid: 0000-0002-0111-1023
According to our database1,
Jinqiao Shi
authored at least 132 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Circuits Syst. Video Technol., August, 2024
SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks.
IEEE Internet Things J., April, 2024
J. Comput. Sci. Technol., March, 2024
Enhancing Multimodal Entity and Relation Extraction With Variational Information Bottleneck.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Cybersecur., December, 2023
Cybersecur., December, 2023
IEEE Signal Process. Lett., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
2022
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence.
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.
Proceedings of the Emerging Information Security and Applications, 2022
ABNN<sup>2</sup>: secure two-party arbitrary-bitwidth quantized neural network predictions.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2021
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment.
Proceedings of the 20th IEEE International Conference on Trust, 2021
SEPC: Improving Joint Extraction of Entities and Relations by Strengthening Entity Pairs Connection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
2020
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Aspect level sentiment classification with unbiased attention and target enhanced representations.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Learn More from Context: Joint Modeling of Local and Global Attention for Aspect Sentiment Classification.
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Edge-Enhanced Graph Convolution Networks for Event Detection with Syntactic Relation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud Services.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Secur. Commun. Networks, 2019
IEEE Internet Things J., 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption.
Proceedings of the Internet of Vehicles. Technologies and Services Toward Smart Cities, 2019
Proceedings of the Internet of Vehicles. Technologies and Services Toward Smart Cities, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
ICNet: Incorporating Indicator Words and Contexts to Identify Functional Description Information.
Proceedings of the International Joint Conference on Neural Networks, 2019
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Character-based BiLSTM-CRF Incorporating POS and Dictionaries for Chinese Opinion Target Extraction.
Proceedings of The 10th Asian Conference on Machine Learning, 2018
2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Flexible Expert Finding on the Web via Semantic Hypergraph Learning and Affinity Propagation Model.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual Features.
Proceedings of the International Conference on Computational Science, 2017
Recognizing Compound Entity Phrases in Hybrid Academic Domains in View of Community Division.
Proceedings of the International Conference on Computational Science, 2017
Proceedings of the International Conference on Computational Science, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Towards quantifying visual similarity of domain names for combating typosquatting abuse.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the Knowledge Science, Engineering and Management, 2016
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016
Proceedings of the International Conference on Computational Science 2016, 2016
Proceedings of the Knowledge Graph and Semantic Computing: Semantic, Knowledge, and Linked Big Data, 2016
2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
IEEE J. Sel. Areas Commun., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the IEEE Symposium on Computers and Communications, 2014
A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Web Technologies and Applications, 2014
2013
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the IEEE Eighth International Conference on Networking, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of IEEE International Conference on Communications, 2013
Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the Web Technologies and Applications, 2012
2011
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
2006
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004