scispace - formally typeset
C

Can Zhao

Researcher at Chinese Academy of Sciences

Publications -  6
Citations -  38

Can Zhao is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Sentence & Guard (information security). The author has an hindex of 2, co-authored 6 publications receiving 14 citations.

Papers
More filters
Proceedings ArticleDOI

Topology Measurement and Analysis on Ethereum P2P Network

TL;DR: A measurement of Ethereum P2P network shows that the graphs of Ethereum network have a small average shortest path length and a large clustering coefficient, and the degree distribution of nodes does not follow a pure power-law distribution, indicating that Ethereum network is very close to a small world network.
Proceedings ArticleDOI

Aspect level sentiment classification with unbiased attention and target enhanced representations

TL;DR: An adversarial training method to get unbiased attention is introduced and an Embedding-Preserving Gating (EPGating) Mechanism is proposed that dynamically incorporates target-related features into word representations as well as retains original word information.
Book ChapterDOI

Look Deep into the New Deep Network: A Measurement Study on the ZeroNet

TL;DR: This paper represents an improved peer exchange method to enhance the robustness of the ZeroNet and also measures the topology characteristics, languages, sizes and versions of the sites in ZeroNet.
Book ChapterDOI

Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays

TL;DR: While the long-term binding relation between hidden service and guard relay increases the cost of existing predecessor attacks, it also gives a new perspective to analyze the security of hidden services.
Proceedings ArticleDOI

Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way

TL;DR: Wang et al. as discussed by the authors proposed the Napping guard attack, which can deanonymize hidden services in a stealthy way by utilizing a design flaw of hidden service's requests to build a simplex covert channel, which could send message from a malicious guard relay to the collusive Client-OP.