Jinqiao Shi

Orcid: 0000-0002-0111-1023

According to our database1, Jinqiao Shi authored at least 125 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks.
IEEE Internet Things J., April, 2024

Enhancing Multimodal Entity and Relation Extraction With Variational Information Bottleneck.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

2023
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Cybersecur., December, 2023

An efficient confidentiality protection solution for pub/sub system.
Cybersecur., December, 2023

The Style Transformer With Common Knowledge Optimization for Image-Text Retrieval.
IEEE Signal Process. Lett., 2023

Prompt2Gaussia: Uncertain Prompt-learning for Script Event Prediction.
CoRR, 2023

URM4DMU: an user represention model for darknet markets users.
CoRR, 2023

Reservoir Computing Transformer for Image-Text Retrieval.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

URM4DMU: An User Representation Model for Darknet Markets Users.
Proceedings of the IEEE International Conference on Acoustics, 2023

Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Improved Network Pruning via Similarity-Based Regularization.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

PrUE: Distilling Knowledge from Sparse Teacher Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence.
Proceedings of the Computational Science - ICCS 2022, 2022

Document-Level Event Extraction via Human-Like Reading Process.
Proceedings of the IEEE International Conference on Acoustics, 2022

An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.
Proceedings of the Emerging Information Security and Applications, 2022

ABNN<sup>2</sup>: secure two-party arbitrary-bitwidth quantized neural network predictions.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Event Causality Extraction with Event Argument Correlations.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment.
Proceedings of the 20th IEEE International Conference on Trust, 2021

SEPC: Improving Joint Extraction of Entities and Relations by Strengthening Entity Pairs Connection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Darknet Public Hazard Entity Recognition Based on Deep Learning.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Relation Extraction based on Data Partition and Representation Integration.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

Efficient Classification of Darknet Access Activity with Partial Traffic.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

2020
Label Enhanced Event Detection with Heterogeneous Graph Attention Networks.
CoRR, 2020

Event Detection with Relation-Aware Graph Convolutional Neural Networks.
CoRR, 2020

Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Aspect level sentiment classification with unbiased attention and target enhanced representations.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Learn More from Context: Joint Modeling of Local and Global Attention for Aspect Sentiment Classification.
Proceedings of the Computational Science - ICCS 2020, 2020

Look Deep into the New Deep Network: A Measurement Study on the ZeroNet.
Proceedings of the Computational Science - ICCS 2020, 2020

An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2020, 2020

Edge-Enhanced Graph Convolution Networks for Event Detection with Syntactic Relation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Word Level Domain-Diversity Attention Based LSTM Model for Sentiment Classification.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud Services.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Novel Device Identification Method Based on Passive Measurement.
Secur. Commun. Networks, 2019

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

A coarse-grained password model with memorable unit-based recurrent neural networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

SFV-CNN: Deep Text Sentiment Classification with Scenario Feature Representation.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2019

iMCircle: Automatic Mining of Indicators of Compromise from the Web.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SignalCookie: Discovering Guard Relays of Hidden Services in Parallel.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Topology Measurement and Analysis on Ethereum P2P Network.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption.
Proceedings of the Internet of Vehicles. Technologies and Services Toward Smart Cities, 2019

A Lightweight Time Series Main-Memory Database for IoT Real-Time Services.
Proceedings of the Internet of Vehicles. Technologies and Services Toward Smart Cities, 2019

NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples.
Proceedings of the International Joint Conference on Neural Networks, 2019

ICNet: Incorporating Indicator Words and Contexts to Identify Functional Description Information.
Proceedings of the International Joint Conference on Neural Networks, 2019

Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Improving Academic Homepage Identification from the Web Using Neural Networks.
Proceedings of the Computational Science - ICCS 2019, 2019

A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

FraudNE: a Joint Embedding Approach for Fraud Detection.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Improve Word Mover's Distance with Part-of-Speech Tagging.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse.
Proceedings of the Computational Science - ICCS 2018, 2018

Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Survey on Collaborative Deep Learning and Privacy-Preserving.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An In-depth Study of Digits in Passwords for Chinese Websites.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

De-anonymizing Social Networks User via Profile Similarity.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Insider Threat Detection Using Characterizing User Behavior.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Detection of Malicious Domain Names Based on Hidden Markov Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Character-based BiLSTM-CRF Incorporating POS and Dictionaries for Chinese Opinion Target Extraction.
Proceedings of The 10th Asian Conference on Machine Learning, 2018

2017
Improving Password Guessing Using Byte Pair Encoding.
Proceedings of the Information Security - 20th International Conference, 2017

Large-scale discovery and empirical analysis for I2P eepSites.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Flexible Expert Finding on the Web via Semantic Hypergraph Learning and Affinity Propagation Model.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual Features.
Proceedings of the International Conference on Computational Science, 2017

Recognizing Compound Entity Phrases in Hybrid Academic Domains in View of Community Division.
Proceedings of the International Conference on Computational Science, 2017

Mining Host Behavior Patterns From Massive Network and Security Logs.
Proceedings of the International Conference on Computational Science, 2017

A closer look at Eclipse attacks against Tor hidden services.
Proceedings of the IEEE International Conference on Communications, 2017

Efficient and Scalable Privacy-Preserving Similar Document Detection.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Implementation and Evaluation of Different Parallel Designs of AES Using CUDA.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Out-of-band discovery and evaluation for tor hidden services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Memory chunking analysis of numerical password for Chinese websites.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Towards quantifying visual similarity of domain names for combating typosquatting abuse.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An Unsupervised Framework Towards Sci-Tech Compound Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2016

Vision-based real-time 3D mapping for UAV with laser sensor.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Identifying Users across Different Sites using Usernames.
Proceedings of the International Conference on Computational Science 2016, 2016

Towards Personal Relation Extraction Based on Sentence Pattern Tree.
Proceedings of the Knowledge Graph and Semantic Computing: Semantic, Knowledge, and Linked Big Data, 2016

2015
An automatic approach to extract the formats of network and security log messages.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Towards misdirected email detection based on multi-attributes.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

StegoP2P: Oblivious user-driven unobservable communications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation.
IEEE J. Sel. Areas Commun., 2014

Empirical Measurement and Analysis of I2P Routers.
J. Networks, 2014

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Moving Target Framework to Improve Network Service Accessibility.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Winnowing Double Structure for Wildcard Query in Payload Attribution.
Proceedings of the Information Security - 17th International Conference, 2014

Towards Enumeration of NTFS Using USN Journals Under UEFI.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

CAS: Content Attribution System for Network Forensics.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Towards misdirected email detection for preventing information leakage.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A probabilistic approach towards modeling email network with realistic features.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Detecting Insider Threat Based on Document Access Behavior Analysis.
Proceedings of the Web Technologies and Applications, 2014

Winnowing Multihashing Structure with Wildcard Query.
Proceedings of the Web Technologies and Applications, 2014

2013
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013

IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

A Multi-Level Analysis Framework in Network Security Situation Awareness.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Detecting Sybil Nodes in Anonymous Communication Systems.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Three-Dimensional Evaluation Model for Network Management System.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Multiple Watermarking Algorithm for Texts Mixed Chinese and English.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Bigram based Real Time DNS Tunnel Detection Approach.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Data Stolen Trojan Detection based on Network Behaviors.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Continuous Re-Authentication Approach Using Ensemble Learning.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

An empirical analysis of family in the Tor network.
Proceedings of IEEE International Conference on Communications, 2013

Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Unobservable Rendezvous Negotiation in P2P Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Towards Analyzing Traceability of Data Leakage by Malicious Insiders.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Hierarchical Method for Clustering Binary Text Image.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Intent-Driven Masquerader Detection Framework Based on Data Fusion.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Worm Propagation Model for Heterogeneous Network.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network.
Proceedings of the Web Technologies and Applications, 2012

2011
A Covert Communication Method Based on User-Generated Content Sites.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

2008
Protecting Mobile Codes Using the Decentralized Label Model.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2006
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack.
Internet Res., 2006

2004
Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004


  Loading...