Peihai Zhao

Orcid: 0000-0002-9484-3345

According to our database1, Peihai Zhao authored at least 21 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Dichotomous Repair-Based Load-Balanced Task Allocation Strategy in Cloud-Edge Environment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Mobile behavior trusted certification based on multivariate behavior sequences.
Neurocomputing, 2021

A Novel Multivariate Time-Series Anomaly Detection Approach Using an Unsupervised Deep Neural Network.
IEEE Access, 2021

A Measure Consistency Method for Overlapping Correspondence of Workflow Nets Based on Relation Profiles Partner Matrix.
IEEE Access, 2021

Process Model Enhancement Through Capturing Important Behaviors and Rating Trace Variants.
IEEE Access, 2021

2020
A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction.
IEEE Trans. Ind. Informatics, 2020

Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
IEEE Access, 2020

2019
Behavior Analysis for Electronic Commerce Trading Systems: A Survey.
IEEE Access, 2019

2018
基于三维行为关系图的模型一致性检测方法 (Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph).
计算机科学, 2018

Behavior consistency computation for workflow nets with unknown correspondence.
IEEE CAA J. Autom. Sinica, 2018

A Process-Profile-Based Method to Measure Consistency of E-Commerce System.
IEEE Access, 2018

2017
Decomposition of Petri nets based on the behavior relation matrix.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
基于网进程的模型一致性分析方法 (Consistency Analysis Method of Models Based on Net Process).
计算机科学, 2016

Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A continuous identity verification method based on free-text keystroke dynamics.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A kind of mouse behavior authentication method on dynamic soft keyboard.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A behavioral authentication method for mobile gesture against resilient user posture.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

Authenticating Web User's Identity through Browsing Sequences Modeling.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
基于键盘行为进行用户识别的方法与应用 (Method of User Identification Based on Keystroke Behavior and its Application).
计算机科学, 2015


  Loading...