Tao Qin

Orcid: 0000-0003-4874-2567

Affiliations:
  • Xi'an Jiaotong University, Xi'an, China


According to our database1, Tao Qin authored at least 59 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GTCAlign: Global Topology Consistency-Based Graph Alignment.
IEEE Trans. Knowl. Data Eng., May, 2024

Distribution-aware hybrid noise augmentation in graph contrastive learning for recommendation.
Expert Syst. Appl., 2024

Multi-view cognition with path search for one-shot part labeling.
Comput. Vis. Image Underst., 2024

CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

EEG-Based Emotion Recognition With Emotion Localization via Hierarchical Self-Attention.
IEEE Trans. Affect. Comput., 2023

Social Image-Text Sentiment Classification With Cross-Modal Consistency and Knowledge Distillation.
IEEE Trans. Affect. Comput., 2023

Graph Contrastive Learning with Hybrid Noise Augmentation for Recommendation.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation.
IEEE Trans. Knowl. Data Eng., 2022

Computer Science Diagram Understanding with Topology Parsing.
ACM Trans. Knowl. Discov. Data, 2022

SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control.
IEEE Trans. Comput. Soc. Syst., 2022

High-quality tweet generation for online behavior security management based on semantics measurement.
Trans. Emerg. Telecommun. Technol., 2022

TPIPD: A Robust Model for Online VPN Traffic Classification.
Proceedings of the IEEE International Conference on Trust, 2022

2021
CSDQA: Diagram Question Answering in Computer Science.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph Empowers New Infrastructure Construction, 2021

2020
Symmetry Degree Measurement and its Applications to Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2020

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model.
Mob. Networks Appl., 2020

Addressing the train-test gap on traffic classification combined subflow model with ensemble learning.
Knowl. Based Syst., 2020

Credible seed identification for large-scale structural network alignment.
Data Min. Knowl. Discov., 2020

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020

2019
Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems.
IEEE Trans. Comput. Soc. Syst., 2019

IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things.
Sensors, 2019

User Identification Cross Multiple Social Media Platform with Revised Input Output Network Embedding Framework.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
An efficient multi-feature SVM solver for complex event detection.
Multim. Tools Appl., 2018

Potential threats mining methods based on correlation analysis of multi-type logs.
IET Networks, 2018

An Effective High Threating Alarm Mining Method for Cloud Security Management.
IEEE Access, 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management.
IEEE Access, 2018

High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

DeepMatching: A Structural Seed Identification Framework for Social Network Alignment.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Internet traffic classification based on expanding vector of flow.
Comput. Networks, 2017

From online to offline: Charactering user's online music listening behavior for efficacious offline radio program arrangement.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A traffic classification approach based on characteristics of subflows and ensemble learning.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

From micro to macro: Propagated constraints in social networks.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
CUFTI: Methods for core users finding and traffic identification in P2P systems.
Peer-to-Peer Netw. Appl., 2016

Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions.
Inf. Sci., 2016

A new model for nickname detection based on network structure and similarity propagation.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Syst. J., 2015

Analysis of user's behavior and resource characteristics for private trackers.
Peer-to-Peer Netw. Appl., 2015

Robust application identification methods for P2P and VoIP traffic classification in backbone networks.
Knowl. Based Syst., 2015

Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
A New Sketch Method for Measuring Host Connection Degree Distribution.
IEEE Trans. Inf. Forensics Secur., 2014

A new connection degree calculation and measurement method for large scale network monitoring.
J. Netw. Comput. Appl., 2014

Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring.
KSII Trans. Internet Inf. Syst., 2014

A New Way for User's Web Communication Visualization and Measurement: Modeling, Experiment and Application.
IEICE Trans. Commun., 2014

Mapping different online behaviors to physical user for comprehensive knowledge-pushing services.
Proceedings of the IEEE International Conference on Communications, 2014

2013
A hierarchical method for user's behavior characteristics visualization and special user identification.
Proceedings of the 19th IEEE International Conference on Networks, 2013

An in-depth measurement and analysis of popular private tracker systems in China.
Proceedings of IEEE International Conference on Communications, 2013

2012
Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Who are active? An in-depth measurement on user activity characteristics in sina microblogging.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Behavior spectrum: An effective method for user's web access behavior monitoring and measurement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links.
IEEE Trans. Inf. Forensics Secur., 2011

Monitoring abnormal network traffic based on blind source separation approach.
J. Netw. Comput. Appl., 2011

2010
Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring.
IEEE Trans. Inf. Forensics Secur., 2010

2009
Monitoring Abnormal Traffic Flows Based on Independent Component Analysis.
Proceedings of IEEE International Conference on Communications, 2009

A New Data Streaming Method for Locating Hosts with Large Connection Degree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

P2P Traffic Identification Based on the Signatures of Key Packets.
Proceedings of the IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2009

Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009


  Loading...