default search action
Qingfeng Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Yanan Cao, Xixun Lin, Yongxuan Wu, Fengzhao Shi, Yanmin Shang, Qingfeng Tan, Chuan Zhou, Peng Zhang:
A data-centric framework of improving graph neural networks for knowledge graph embedding. World Wide Web (WWW) 28(1): 2 (2025) - 2024
- [j10]Shiyao Cui, Bo-Wen Yu, Xin Cong, Tingwen Liu, Qingfeng Tan, Jinqiao Shi:
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network. J. Comput. Sci. Technol. 39(2): 227-242 (2024) - [j9]Mingqi Fang, Lingyun Yu, Hongtao Xie, Qingfeng Tan, Zhiyuan Tan, Amir Hussain, Zezheng Wang, Jiahong Li, Zhihong Tian:
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation. IEEE Trans. Comput. Soc. Syst. 11(4): 5354-5366 (2024) - [c22]Chen Gao, Xugong Qin, Peng Zhang, Yongquan He, Xinjian Huang, Ming Zhou, Liehuang Zhu, Qingfeng Tan:
MHPS: Multimodality-Guided Hierarchical Policy Search for Knowledge Graph Reasoning. ICASSP 2024: 11096-11100 - [c21]Runnan Tan, Qingfeng Tan, Haiyan Wang, Yushun Xie, Peng Zhang:
P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges. IJCNN 2024: 1-10 - 2023
- [j8]Runnan Tan, Qingfeng Tan, Qin Zhang, Peng Zhang, Yushun Xie, Zhao Li:
Ethereum fraud behavior detection based on graph neural networks. Computing 105(10): 2143-2170 (2023) - [j7]Hai Xu, Hongtao Xie, Qingfeng Tan, Yongdong Zhang:
Meta semi-supervised medical image segmentation with label hierarchy. Health Inf. Sci. Syst. 11(1): 26 (2023) - [j6]Jingyuan Xu, Hongtao Xie, Qingfeng Tan, Hai Wu, Chuanbin Liu, Sicheng Zhang, Zhendong Mao, Yongdong Zhang:
Multi-task hourglass network for online automatic diagnosis of developmental dysplasia of the hip. World Wide Web (WWW) 26(2): 539-559 (2023) - [c20]Yadong Qu, Qingfeng Tan, Hongtao Xie, Jianjun Xu, YuXin Wang, Yongdong Zhang:
Exploring Stroke-Level Modifications for Scene Text Editing. AAAI 2023: 2119-2127 - 2022
- [j5]Mengting Xing, Hongtao Xie, Qingfeng Tan, Shancheng Fang, Yuxin Wang, Zhengjun Zha, Yongdong Zhang:
Boundary-Aware Arbitrary-Shaped Scene Text Detector With Learnable Embedding Network. IEEE Trans. Multim. 24: 3129-3143 (2022) - [j4]Qingfeng Tan, Xuebin Wang, Wei Shi, Jian Tang, Zhihong Tian:
An Anonymity Vulnerability in Tor. IEEE/ACM Trans. Netw. 30(6): 2574-2587 (2022) - [i1]Yadong Qu, Qingfeng Tan, Hongtao Xie, Jianjun Xu, Yuxin Wang, Yongdong Zhang:
Exploring Stroke-Level Modifications for Scene Text Editing. CoRR abs/2212.01982 (2022) - 2021
- [j3]Hong Yang, Peng Zhang, Haishuai Wang, Chuan Zhou, Zhao Li, Li Gao, Qingfeng Tan:
Towards embedding information diffusion data for understanding big dynamic networks. Neurocomputing 466: 265-284 (2021) - [c19]Runnan Tan, Qingfeng Tan, Peng Zhang, Zhao Li:
Graph Neural Network for Ethereum Fraud Detection. ICBK 2021: 78-85 - 2020
- [c18]Xingyu Lv, Ye Zhong, Qingfeng Tan:
A Study of Bitcoin De-Anonymization: Graph and Multidimensional Data Analysis. DSC 2020: 339-345
2010 – 2019
- 2019
- [j2]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang, Zhihong Tian:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [c17]Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:
Bitcoin Network Size Estimation Based on Coupon Collection Model. ICAIS (4) 2019: 298-307 - [c16]Yu Zhang, Runan Tan, Xiangyi Kong, Qingfeng Tan, Xiangtao Liu:
Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn. ICAIS (4) 2019: 385-395 - [c15]Yue Gao, Jinqiao Shi, Xuebin Wang, Qingfeng Tan, Can Zhao, Zelin Yin:
Topology Measurement and Analysis on Ethereum P2P Network. ISCC 2019: 1-7 - 2018
- [c14]Tianshu Li, Zhaoquan Gu, Xiao Lin, Shudong Li, Qingfeng Tan:
Approximation Algorithms for Controller Placement Problems in Software Defined Networks. DSC 2018: 250-257 - [c13]Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:
Insider Threat Detection Using Characterizing User Behavior. DSC 2018: 476-482 - [c12]Meiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi:
De-anonymizing Social Networks User via Profile Similarity. DSC 2018: 889-895 - [c11]Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang:
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes. DSC 2018: 948-955 - 2017
- [c10]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang:
A closer look at Eclipse attacks against Tor hidden services. ICC 2017: 1-6 - [c9]Yue Gao, Qingfeng Tan, Jinqiao Shi, Xuebin Wang, Muqian Chen:
Large-scale discovery and empirical analysis for I2P eepSites. ISCC 2017: 444-449 - 2016
- [c8]Yubin Wang, Tingwen Liu, Qingfeng Tan, Jinqiao Shi, Li Guo:
Identifying Users across Different Sites using Usernames. ICCS 2016: 376-385 - [c7]Kang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, Xuebin Wang:
Out-of-band discovery and evaluation for tor hidden services. SAC 2016: 2057-2062 - 2015
- [c6]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - 2014
- [j1]Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi:
Empirical Measurement and Analysis of I2P Routers. J. Networks 9(9): 2269-2278 (2014) - [c5]Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo:
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy. SecureComm (1) 2014: 535-540 - 2013
- [c4]Lei Wang, Chenglong Li, Qingfeng Tan, Xuebin Wang:
Generation and Distribution of Decoy Document System. ISCTCS 2013: 123-129 - [c3]Peipeng Liu, Jinqiao Shi, Lihong Wang, Xiao Wang, Qingfeng Tan:
IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network. NAS 2013: 166-172 - 2012
- [c2]Fanwen Xu, Qingfeng Tan, Jinqiao Shi, Li Guo:
Unobservable Rendezvous Negotiation in P2P Networks. ISCTCS 2012: 380-387 - 2011
- [c1]Qingfeng Tan, Peipeng Liu, Jinqiao Shi, Xiao Wang, Li Guo:
A Covert Communication Method Based on User-Generated Content Sites. ICTAI 2011: 1053-1056
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint