Qingfeng Pan

Orcid: 0000-0002-8211-8242

According to our database1, Qingfeng Pan authored at least 12 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
CoordMail: Exploiting SMTP Timeout and Command Interaction to Coordinate Email Middleware for Convergence Amplification Attack.
Proceedings of the 33rd Annual Network and Distributed System Security Symposium, 2026

2025
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Understanding and Characterizing Intermediate Paths of Email Delivery: The Hidden Dependencies.
Proceedings of the 2025 ACM Internet Measurement Conference, 2025

Machine Learning Inference Pipeline Execution Using Pure SQL Based on Operator Fusion.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
Fine-Grained Tuple Transfer for Pipelined Query Execution on CPU-GPU Coprocessor.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Proceedings of the 31st USENIX Security Symposium, 2022

ACF2: Accelerating Checkpoint-Free Failure Recovery for Distributed Graph Processing.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
An Adaptive Approach for Anomaly Detector Selection and Fine-Tuning in Time Series.
CoRR, 2019


  Loading...