Tagged articles
7 articles
Page 1 of 1
AntTech
AntTech
Aug 7, 2025 · Information Security

USENIX Security 2025 Live: Crypto DoS, Secure Graph Analysis, Video Forensics

The upcoming USENIX Security 2025 live session in Seattle will showcase three cutting‑edge papers: X.509DoS exposing denial‑of‑service flaws in cryptographic libraries via malformed certificates, GraphAce delivering communication‑efficient two‑party secure graph analysis, and RollingEvidence leveraging rolling‑shutter effects for proactive video forensics.

USENIXcryptographygraph-analysis
0 likes · 7 min read
USENIX Security 2025 Live: Crypto DoS, Secure Graph Analysis, Video Forensics
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Nov 30, 2022 · Information Security

Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic

The article outlines Xiaohongshu’s comprehensive anti‑fraud strategy—defining fake traffic, exposing three service‑provider models, detailing identification and governance challenges, and recommending engine‑based risk‑control, a five‑step process, and AI‑driven behavior, clustering, and graph analyses that have already eliminated billions of fraudulent likes.

anti-fraude-commerce securityfraud detection
0 likes · 22 min read
Best Practices for Community and E‑commerce Fraud Prevention on Xiaohongshu: Understanding and Combating Fake Traffic
SQB Blog
SQB Blog
Jul 28, 2022 · Frontend Development

How AntV Powers Data Visualization: From Charts to Graph Analysis

This article explores data visualization fundamentals, compares scientific, information, and analytical visualization, reviews popular frontend libraries like ECharts and AntV/G2, showcases real-world case studies, and details technical choices for building interactive charts and graph‑based analytics in modern applications.

AntVBig Datafrontend development
0 likes · 13 min read
How AntV Powers Data Visualization: From Charts to Graph Analysis
Big Data Technology Architecture
Big Data Technology Architecture
Jul 2, 2022 · Fundamentals

Indirect Shareholding Ratio Calculation Using Graph Techniques

This article explains how to compute indirect shareholding ratios between companies by generating synthetic relationship data, cleaning and normalizing it with multiprocessing, constructing a weighted directed graph using NetworkX, and applying a matrix‑based algorithm to derive the final ownership matrix.

Pythondata-processinggraph-analysis
0 likes · 7 min read
Indirect Shareholding Ratio Calculation Using Graph Techniques
High Availability Architecture
High Availability Architecture
Jul 12, 2018 · Information Security

Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned

This article chronicles the three‑generation evolution of Zhihu’s anti‑cheat platform Wukong, detailing its business context, spam taxonomy, multi‑layered control methods, architectural redesigns, strategy language improvements, graph‑based risk analysis, and the continuous integration of big‑data and machine‑learning techniques to combat content and behavior spam.

Big Dataanti-cheatgraph-analysis
0 likes · 23 min read
Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned
Architect
Architect
Nov 9, 2015 · Big Data

Modeling User Relationships and Information Propagation on Weibo

The article presents a comprehensive analysis of Weibo's social graph, introducing metrics such as propagation power, intimacy, fan and follow similarity, two‑degree relationships, and relationship circles to model and quantify user interactions and information diffusion within the platform.

Big DataSocial networkUser Relationship
0 likes · 13 min read
Modeling User Relationships and Information Propagation on Weibo