Toward a comprehensive insight into the eclipse attacks of tor hidden services Q Tan, Y Gao, J Shi, X Wang, B Fang, Z Tian IEEE Internet of Things Journal 6 (2), 1584-1593, 2018 | 134 | 2018 |
Topology measurement and analysis on ethereum p2p network Y Gao, J Shi, X Wang, Q Tan, C Zhao, Z Yin 2019 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2019 | 43 | 2019 |
Inferring attack intent of malicious insider based on probabilistic attack graph model XJ Chen, BX Fang, QF Tan, H Zhang Chinese Journal of Computers 37 (1), 62-72, 2014 | 42 | 2014 |
Identifying users across different sites using usernames Y Wang, T Liu, Q Tan, J Shi, L Guo Procedia Computer Science 80, 376-385, 2016 | 31 | 2016 |
Empirical measurement and analysis of I2P routers P Liu, L Wang, Q Tan, Q Li, X Wang, J Shi Journal of Networks 9 (9), 2269, 2014 | 31 | 2014 |
De-anonymizing social networks user via profile similarity M Wang, Q Tan, X Wang, J Shi 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 21 | 2018 |
Graph neural network for ethereum fraud detection R Tan, Q Tan, P Zhang, Z Li 2021 IEEE international conference on big knowledge (ICBK), 78-85, 2021 | 20 | 2021 |
Who are in the darknet? Measurement and analysis of darknet person attributes M Wang, X Wang, J Shi, Q Tan, Y Gao, M Chen, X Jiang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 20 | 2018 |
Insider threat detection using characterizing user behavior X Wang, Q Tan, J Shi, S Su, M Wang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 19 | 2018 |
An anonymity vulnerability in Tor Q Tan, X Wang, W Shi, J Tang, Z Tian IEEE/ACM Transactions on Networking 30 (6), 2574-2587, 2022 | 16 | 2022 |
Out-of-band discovery and evaluation for tor hidden services K Li, P Liu, Q Tan, J Shi, Y Gao, X Wang Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2057-2062, 2016 | 15 | 2016 |
Towards measuring unobservability in anonymous communication systems Q Tan, J Shi, B Fang, L Guo, W Zhang, X Wang, B Wei Journal of Computer Research and Development 52 (10), 2373-2381, 2015 | 14 | 2015 |
Exploring stroke-level modifications for scene text editing Y Qu, Q Tan, H Xie, J Xu, Y Wang, Y Zhang Proceedings of the AAAI Conference on Artificial Intelligence 37 (2), 2119-2127, 2023 | 12 | 2023 |
A study of bitcoin de-anonymization: Graph and multidimensional data analysis X Lv, Y Zhong, Q Tan 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC …, 2020 | 10 | 2020 |
Large-scale discovery and empirical analysis for I2P eepSites Y Gao, Q Tan, J Shi, X Wang, M Chen 2017 IEEE Symposium on Computers and Communications (ISCC), 444-449, 2017 | 10 | 2017 |
A closer look at Eclipse attacks against Tor hidden services Q Tan, Y Gao, J Shi, X Wang, B Fang 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 10 | 2017 |
Approximation algorithms for controller placement problems in Software Defined Networks T Li, Z Gu, X Lin, S Li, Q Tan 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 9 | 2018 |
Multi-task hourglass network for online automatic diagnosis of developmental dysplasia of the hip J Xu, H Xie, Q Tan, H Wu, C Liu, S Zhang, Z Mao, Y Zhang World wide web 26 (2), 539-559, 2023 | 8 | 2023 |
Boundary-aware arbitrary-shaped scene text detector with learnable embedding network M Xing, H Xie, Q Tan, S Fang, Y Wang, Z Zha, Y Zhang IEEE Transactions on Multimedia 24, 3129-3143, 2021 | 7 | 2021 |
Generation and distribution of decoy document system L Wang, C Li, QF Tan, XB Wang Trustworthy Computing and Services: International Conference, ISCTCS 2013 …, 2014 | 7 | 2014 |