Jiafen Liu

According to our database1, Jiafen Liu authored at least 14 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Normal Fuzzy Three-Way Decision Based on Prospect Theory.
Proceedings of the Rough Sets - International Joint Conference, 2023

2018
Keystroke Biometrics for Freely Typed Text Based on CNN model.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

TDSD: A Touch Dynamic and Sensor Data Based Approach for Continuous User Authentication.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
A genetic algorithm based approach to transactional and QoS-aware service selection.
Enterp. Inf. Syst., 2017

2016
Keystroke Biometric Recognition on Chinese Long Text Input.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2016

The Battle for singles' Day: How Social Media Marketing Campaigns Boost Sales.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Online Signature Verification Based on Biometric Features.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments.
Comput. Networks, 2015

I Know It's You: Touch Behavioral Characteristics Recognition on Smartphone Based on Pattern Password.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

2014
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability.
Sci. China Inf. Sci., 2014

2013
Looking for Gold in the Sands: Stock Prediction Using Financial News and Social Media.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2010
News Recommendation in Forum-Based Social Media.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2008
General Authentication Test.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Designing an Authentication Protocol via Authentication Test.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007


  Loading...