Follow
Qingfeng Tan
Qingfeng Tan
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Toward a comprehensive insight into the eclipse attacks of tor hidden services
Q Tan, Y Gao, J Shi, X Wang, B Fang, Z Tian
IEEE Internet of Things Journal 6 (2), 1584-1593, 2018
1162018
Inferring attack intent of malicious insider based on probabilistic attack graph model
XJ Chen, BX Fang, QF Tan, HL Zhang
Chinese Journal of Computers 37 (1), 62-72, 2014
372014
Empirical measurement and analysis of I2P routers
P Liu, L Wang, Q Tan, Q Li, X Wang, J Shi
Journal of Networks 9 (9), 2269, 2014
292014
Identifying users across different sites using usernames
Y Wang, T Liu, Q Tan, J Shi, L Guo
Procedia Computer Science 80, 376-385, 2016
242016
Topology measurement and analysis on ethereum p2p network
Y Gao, J Shi, X Wang, Q Tan, C Zhao, Z Yin
2019 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2019
172019
De-anonymizing social networks user via profile similarity
M Wang, Q Tan, X Wang, J Shi
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
152018
Who are in the darknet? Measurement and analysis of Darknet person attributes
M Wang, X Wang, J Shi, Q Tan, Y Gao, M Chen, X Jiang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
132018
Out-of-band discovery and evaluation for tor hidden services
K Li, P Liu, Q Tan, J Shi, Y Gao, X Wang
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2057-2062, 2016
102016
Towards measuring unobservability in anonymous communication systems
Q Tan, J Shi, B Fang, L Guo, W Zhang, X Wang, B Wei
Journal of Computer Research and Development 52 (10), 2373-2381, 2015
92015
Large-scale discovery and empirical analysis for I2P eepSites
Y Gao, Q Tan, J Shi, X Wang, M Chen
2017 IEEE Symposium on Computers and Communications (ISCC), 444-449, 2017
72017
Insider threat detection using characterizing user behavior
X Wang, Q Tan, J Shi, S Su, M Wang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
62018
A closer look at Eclipse attacks against Tor hidden services
Q Tan, Y Gao, J Shi, X Wang, B Fang
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
62017
IX-Level Adversaries on Entry-and Exit-Transmission Paths in Tor Network
P Liu, J Shi, L Wang, X Wang, Q Tan
2013 IEEE Eighth International Conference on Networking, Architecture and …, 2013
62013
Approximation algorithms for controller placement problems in Software Defined Networks
T Li, Z Gu, X Lin, S Li, Q Tan
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
52018
Inferring attack intent of malicious insider based on probabilistic attack graph model [J]
C Xiaojun, F Binxing, T Qingfeng
Chinese Journal of Computers 37 (1), 62-72, 2014
42014
Generation and distribution of decoy document system
L Wang, C Li, QF Tan, XB Wang
International Conference on Trustworthy Computing and Services, 123-129, 2013
42013
A study of bitcoin de-anonymization: graph and multidimensional data analysis
X Lv, Y Zhong, Q Tan
2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC …, 2020
32020
StegoP2P: a hidden communication approach in P2P networks
Q TAN, B FANG, J SHI
Journal of Computer Research and De-velopment 51 (8), 1695-1703, 2014
32014
Analyzing the availability of fast-flux based service network under countermeasures
X Wang, J Shi, L He, L Guo, Q Tan
2010 International Conference on Communications, Circuits and Systems …, 2010
32010
Bitcoin network size estimation based on coupon collection model
R Tan, X Kong, Y Zhang, Q Tan, H Lu, M Li, Y Sun
International Conference on Artificial Intelligence and Security, 298-307, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20