Qingfeng Tan

Orcid: 0000-0002-9758-3470

According to our database1, Qingfeng Tan authored at least 33 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A data-centric framework of improving graph neural networks for knowledge graph embedding.
World Wide Web (WWW), January, 2025

2024
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation.
IEEE Trans. Comput. Soc. Syst., August, 2024

Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network.
J. Comput. Sci. Technol., March, 2024

P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges.
Proceedings of the International Joint Conference on Neural Networks, 2024

MHPS: Multimodality-Guided Hierarchical Policy Search for Knowledge Graph Reasoning.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Meta semi-supervised medical image segmentation with label hierarchy.
Health Inf. Sci. Syst., December, 2023

Ethereum fraud behavior detection based on graph neural networks.
Computing, October, 2023

Multi-task hourglass network for online automatic diagnosis of developmental dysplasia of the hip.
World Wide Web (WWW), March, 2023

Exploring Stroke-Level Modifications for Scene Text Editing.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An Anonymity Vulnerability in Tor.
IEEE/ACM Trans. Netw., 2022

Boundary-Aware Arbitrary-Shaped Scene Text Detector With Learnable Embedding Network.
IEEE Trans. Multim., 2022

2021
Towards embedding information diffusion data for understanding big dynamic networks.
Neurocomputing, 2021

Graph Neural Network for Ethereum Fraud Detection.
Proceedings of the 2021 IEEE International Conference on Big Knowledge, 2021

2020
A Study of Bitcoin De-Anonymization: Graph and Multidimensional Data Analysis.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

Topology Measurement and Analysis on Ethereum P2P Network.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

De-anonymizing Social Networks User via Profile Similarity.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Insider Threat Detection Using Characterizing User Behavior.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Approximation Algorithms for Controller Placement Problems in Software Defined Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Large-scale discovery and empirical analysis for I2P eepSites.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A closer look at Eclipse attacks against Tor hidden services.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Out-of-band discovery and evaluation for tor hidden services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Identifying Users across Different Sites using Usernames.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
StegoP2P: Oblivious user-driven unobservable communications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Empirical Measurement and Analysis of I2P Routers.
J. Networks, 2014

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Generation and Distribution of Decoy Document System.
Proceedings of the Trustworthy Computing and Services, 2013

2012
Unobservable Rendezvous Negotiation in P2P Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
A Covert Communication Method Based on User-Generated Content Sites.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011


  Loading...