Follow
Qingyuan Gong
Qingyuan Gong
Verified email at fudan.edu.cn - Homepage
Title
Cited by
Cited by
Year
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
632018
A multi-tab website fingerprinting attack
Y Xu, T Wang, Q Li, Q Gong, Y Chen, Y Jiang
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
252018
Understanding cross-site linking in online social networks
Q Gong, Y Chen, J Hu, Q Cao, P Hui, X Wang
ACM Transactions on the Web (TWEB) 12 (4), 1-29, 2018
192018
Optimal node selection for data regeneration in heterogeneous distributed storage systems
Q Gong, J Wang, D Wei, J Wang, X Wang
2015 44th international conference on parallel processing, 390-399, 2015
132015
Detecting malicious accounts in online developer communities using deep learning
Q Gong, J Zhang, Y Chen, Q Li, Y Xiao, X Wang, P Hui
Proceedings of the 28th ACM International Conference on Information and …, 2019
92019
Structural Hole Theory in Social Network Analysis: A Review
Z Lin, Y Zhang, Q Gong, Y Chen, A Oksanen, AY Ding
IEEE Transactions on Computational Social Systems, 2021
72021
DatingSec: Detecting malicious accounts in dating apps using a content-based attention network
X He, Q Gong, Y Chen, Y Zhang, X Wang, X Fu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2193-2208, 2021
72021
Exploring the power of social hub services
Q Gong, Y Chen, X Yu, C Xu, Z Guo, Y Xiao, F Ben Abdesslem, X Wang, ...
World Wide Web 22 (6), 2825-2852, 2019
52019
Identifying structural hole spanners in online social networks using machine learning
Q Gong, J Zhang, X Wang, Y Chen
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 93-95, 2019
52019
Deep learning-based malicious account detection in the momo social network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
42018
This place is swarming: using a mobile social app to study human traffic in cities
H Zhao, Q Gong, Y Chen, J Chen, Y Li, X Fu
2018 IEEE International Conference on Pervasive Computing and Communications …, 2018
42018
Cross-site prediction on social influence for cold-start users in online social networks
Q Gong, Y Chen, X He, Y Xiao, P Hui, X Wang, X Fu
ACM Transactions on the Web (TWEB) 15 (2), 1-23, 2021
32021
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions
Q Xie, Q Gong, X He, Y Chen, X Wang, H Zheng, B Zhao
IEEE Transactions on Mobile Computing, 2021
22021
Understanding the Working Time of Developers in IT Companies in China and the United States
J Zhang, Y Chen, Q Gong, X Wang, AY Ding, Y Xiao, P Hui
IEEE Software 38 (2), 96-106, 2020
22020
LBSLAB: a user data collection system in mobile environments
Q Gong, X He, Q Xie, S Lin, G She, R Fang, R Han, Y Chen, Y Xiao, X Fu, ...
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
22018
Understanding the behavioral differences between American and German users: A data-driven study
C Yang, Y Chen, Q Gong, X He, Y Xiao, Y Huang, X Fu
Big Data Mining and Analytics 1 (4), 284-296, 2018
22018
Identification of Influential Users in Emerging Online Social Networks Using Cross-site Linking
Q Gong, Y Chen, X He, F Li, Y Xiao, P Hui, X Wang, X Fu
CCF Conference on Computer Supported Cooperative Work and Social Computing …, 2018
12018
CloudyFL: A Cloudlet-Based Federated Learning Framework for Sensing User Behavior Using Wearable Devices
Q Gong, H Ruan, Y Chen, X Su
2022
Understanding Scholar Social Networks: Taking SCHOLAT as an Example
M Gao, Y Chen, Q Gong, X Wang, P Hui
CCF Conference on Computer Supported Cooperative Work and Social Computing …, 2022
2022
DeepPick: A Deep Learning Approach to Unveil Outstanding Users Ranking with Public Attainable Features
W Li, Z Xu, Y Sun, Q Gong, Y Chen, AY Ding, X Wang, P Hui
IEEE Transactions on Knowledge and Data Engineering, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20