Qinyuan Feng

According to our database1, Qinyuan Feng authored at least 14 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Vulnerabilities and countermeasures in context-aware social rating services.
ACM Trans. Internet Techn., 2012

2010
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses.
IEEE Trans. Knowl. Data Eng., 2010

A multiple user sharing behaviors based approach for fake file detection in P2P environments.
Sci. China Inf. Sci., 2010

Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator.
J. Comput. Sci. Technol., 2009

Rainbow Product Ranking for Upgrading E-Commerce.
IEEE Internet Comput., 2009

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
RepTrap: a novel attack on feedback-based reputation systems.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Modeling Attack Behaviors in Rating Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
LIP: A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
A simple, universal and scalable approach to migrate applications to hybrid network using ALG.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

2005
Fast Two Phrases PPM for IP Traceback.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...