Mimi Wang

Orcid: 0000-0001-5718-0653

According to our database1, Mimi Wang authored at least 29 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
The Cultivation of Students' Multiple Practical Ability Under the Multimodal Blended Teaching Mode.
Int. J. Emerg. Technol. Learn., June, 2022

The Design of Epidemic Prevention Robot Based on Deep Learning.
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022

A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Mobile behavior trusted certification based on multivariate behavior sequences.
Neurocomputing, 2021

A Novel Multivariate Time-Series Anomaly Detection Approach Using an Unsupervised Deep Neural Network.
IEEE Access, 2021

A Measure Consistency Method for Overlapping Correspondence of Workflow Nets Based on Relation Profiles Partner Matrix.
IEEE Access, 2021

Process Model Enhancement Through Capturing Important Behaviors and Rating Trace Variants.
IEEE Access, 2021

2020
A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Measurement and Computation of Profile Similarity of Workflow Nets Based on Behavioral Relation Matrix.
IEEE Trans. Syst. Man Cybern. Syst., 2020

A behavioral authentication method for mobile based on browsing behaviors.
IEEE CAA J. Autom. Sinica, 2020

Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
IEEE Access, 2020

EMD-Based Borehole TEM Array Signal Denoising and Baseline Wander Correction for NDT of Downhole Casings.
IEEE Access, 2020

2019
Behavior Analysis for Electronic Commerce Trading Systems: A Survey.
IEEE Access, 2019

2018
基于三维行为关系图的模型一致性检测方法 (Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph).
计算机科学, 2018

一种综合多因素的网页浏览行为认证方法 (Authentication Method Synthesizing Multi-factors for Web Browsing Behavior).
计算机科学, 2018

Behavior consistency computation for workflow nets with unknown correspondence.
IEEE CAA J. Autom. Sinica, 2018

A Process-Profile-Based Method to Measure Consistency of E-Commerce System.
IEEE Access, 2018

2017
Decomposition of Petri nets based on the behavior relation matrix.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
基于网进程的模型一致性分析方法 (Consistency Analysis Method of Models Based on Net Process).
计算机科学, 2016

Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Computation of Secure Consistency for Real Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A continuous identity verification method based on free-text keystroke dynamics.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A kind of mouse behavior authentication method on dynamic soft keyboard.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A behavioral authentication method for mobile gesture against resilient user posture.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

A Sufficient and Necessary Condition to Decide Compatibility for Simple Circuit Inter-organization Workflow Nets.
Proceedings of the Advances in Services Computing, 2016

2015
基于键盘行为进行用户识别的方法与应用 (Method of User Identification Based on Keystroke Behavior and its Application).
计算机科学, 2015

2013
The Analysis of Change Region About Networked Control System Based on the Behavior Profile.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013


  Loading...