Large-scale discovery and empirical analysis for I2P eepSites
Yue Gao, Qingfeng Tan, Jinqiao Shi, Xuebin Wang, Muqian Chen
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01.07.2017)
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01.07.2017)
Get full text
Conference Proceeding
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes
Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang
Published in 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (01.06.2018)
Published in 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (01.06.2018)
Get full text
Conference Proceeding
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability
Zhang, Qingfeng, Chen, Muqian, Wang, Xuebin, Zhao, Can, Liu, Qingyun, Shi, Jinqiao
Published in 2024 IEEE Wireless Communications and Networking Conference (WCNC) (21.04.2024)
Published in 2024 IEEE Wireless Communications and Networking Conference (WCNC) (21.04.2024)
Get full text
Conference Proceeding
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay
Zhang, Qingfeng, Zhu, Jiawei, Chen, Muqian, Wang, Xuebin, Liu, Qingyun, Shi, Jinqiao
Published in 2023 IEEE Symposium on Computers and Communications (ISCC) (09.07.2023)
Published in 2023 IEEE Symposium on Computers and Communications (ISCC) (09.07.2023)
Get full text
Conference Proceeding
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks
Wang, Meiqi, Li, Yanzeng, Wang, Xuebin, Liu, Tingwen, Shi, Jinqiao, Chen, Muqian
Published in 2020 IEEE Symposium on Computers and Communications (ISCC) (01.07.2020)
Published in 2020 IEEE Symposium on Computers and Communications (ISCC) (01.07.2020)
Get full text
Conference Proceeding
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel
Chen, Muqian, Wang, Xuebin, Liu, Tingwen, Shi, Jinqiao, Yin, Zelin, Fang, Binxing
Published in 2019 IEEE Symposium on Computers and Communications (ISCC) (01.06.2019)
Published in 2019 IEEE Symposium on Computers and Communications (ISCC) (01.06.2019)
Get full text
Conference Proceeding
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting
Wang, Meiqi, Chen, Muqian, Li, Zeyu, Wang, Xuebin, Shi, Jinqiao, Fang, Binxing
Published in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01.11.2023)
Published in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01.11.2023)
Get full text
Conference Proceeding
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way
Chen, Muqian, Wang, Xuebin, Shi, Jinqiao, Zhao, Can, Wang, Meiqi, Fang, Binxing
Published in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01.12.2020)
Published in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01.12.2020)
Get full text
Conference Proceeding
Automatic classification and threshold optimization method and system for specific content of long text
CHEN YANG, PAN BIN, LIU YI, PAN JIN, YIN WEI, CHEN MUQIAN, LI ZEKUN, ZHAO CHUNLU
Year of Publication 21.06.2024
Get full text
Year of Publication 21.06.2024
Patent
End-to-end pornographic website detection method based on HTML (Hypertext Markup Language) structural features
GUO CHENGYU, XIN YONGHUI, PAN JIN, ZHANG CUI, LIU YANG, CHEN MUQIAN, ZHAO CHUNLU
Year of Publication 17.03.2023
Get full text
Year of Publication 17.03.2023
Patent
Group application preference feature representation method
WANG YUANJIE, LIU YI, CHENG GUANG, LIU XIAOHUI, BAO ZEMIN, LIU YANG, CHEN MUQIAN, WANG XIANG
Year of Publication 05.09.2023
Get full text
Year of Publication 05.09.2023
Patent
Event information extraction method and system based on deep semantics and multi-task learning
LIU YI, FANG FANG, LUO YILIN, CAO YANAN, PAN JIN, LIU YANG, CHEN MUQIAN, LI ZIWEI, ZHAO CHUNLU, YAO XIAO
Year of Publication 01.11.2022
Get full text
Year of Publication 01.11.2022
Patent
User node anonymous communication method and device
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 01.12.2020
Get full text
Year of Publication 01.12.2020
Patent
Anonymous protection method for user nodes of annular guard network and electronic equipment
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 01.12.2020
Get full text
Year of Publication 01.12.2020
Patent
Construction and message forwarding method of anonymous communication network based on ring architecture
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 20.11.2020
Get full text
Year of Publication 20.11.2020
Patent
Confusion message sending method of peer-to-peer ring in anonymous communication network
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 20.11.2020
Get full text
Year of Publication 20.11.2020
Patent
Two-factor anonymous message network forwarding method and device
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 20.11.2020
Get full text
Year of Publication 20.11.2020
Patent
Heterogeneous layered anonymous communication network construction method and device
MA ZHENG, SHI RUISHENG, WANG DONGBIN, CHEN MUQIAN, WANG XUEBIN, GAO YUE, SHI JINQIAO
Year of Publication 20.11.2020
Get full text
Year of Publication 20.11.2020
Patent