Chao Shen

According to our database1, Chao Shen authored at least 44 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Digger: Detect Similar Groups in Heterogeneous Social Networks.
TKDD, 2019

Fault detection filtering for nonlinear switched systems via event-triggered communication approach.
Automatica, 2019

A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

2018
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks.
IEEE Wireless Commun., 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Netw. Learning Syst., 2018

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Industrial Informatics, 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Information Forensics and Security, 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

A feasible graph partition framework for parallel computing of big graph.
Knowl.-Based Syst., 2017

Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition.
IEEE Access, 2017

Passive fingerprinting for wireless devices: A multi-level decision approach.
Proceedings of the IEEE International Conference on Identity, 2017

Modeling interactive sensor-behavior with smartphones for implicit and active user authentication.
Proceedings of the IEEE International Conference on Identity, 2017

On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Information Forensics and Security, 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Human-Machine Systems, 2016

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016

User practice in password security: An empirical study of real-life passwords in the wild.
Computers & Security, 2016

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modeling multimodal biometric modalities for continuous user authentication.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

On motion-sensor behavior analysis for human-activity recognition via smartphones.
Proceedings of the IEEE International Conference on Identity, 2016

A human-centered smart home system with wearable-sensor behavior analysis.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016

2015
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection.
Future Generation Comp. Syst., 2015

Input extraction via motion-sensor behavior analysis on smartphones.
Computers & Security, 2015

SHE: Smart home energy management system based on social and motion behavior cognition.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On motion sensors as source for user input inference in smartphones.
Proceedings of the IEEE International Conference on Identity, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

2014
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Human-Machine Systems, 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Computers & Security, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

2013
User Authentication Through Mouse Dynamics.
IEEE Trans. Information Forensics and Security, 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A Study of the Consistency in Keystroke Dynamics.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

Mobile Authentication through Touch-Behavior Features.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...