Zhongmin Cai

Orcid: 0000-0002-4903-3992

According to our database1, Zhongmin Cai authored at least 56 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Learning from User-driven Events to Generate Automation Sequences.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Exploring visual representations of computer mouse movements for bot detection using deep learning approaches.
Expert Syst. Appl., November, 2023

Integrating Gaze and Mouse Via Joint Cross-Attention Fusion Net for Students' Activity Recognition in E-learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

Navigating Interfaces with AI for Enhanced User Interaction.
CoRR, 2023

Interaction of Thoughts: Towards Mediating Task Assignment in Human-AI Cooperation with a Capability-Aware Shared Mental Model.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Reading Personality Preferences From Motion Patterns in Computer Mouse Operations.
IEEE Trans. Affect. Comput., 2022

Integrating Handcrafted Features with Deep Representations for Smartphone Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

2021
Learning Fundamental Visual Concepts Based on Evolved Multi-Edge Concept Graph.
IEEE Trans. Multim., 2021

Mouse Dynamics Based Bot Detection Using Sequence Learning.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

2020
Gender recognition using motion data from multiple smart devices.
Expert Syst. Appl., 2020

I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Normal and Easy: Account Sharing Practices in the Workplace.
Proc. ACM Hum. Comput. Interact., 2019

Security and confidentiality of network communication using chaotic encryption technology.
J. Comput. Methods Sci. Eng., 2019

Learning edge weights in file co-occurrence graphs for malware detection.
Data Min. Knowl. Discov., 2019

A Deep Learning Approach to Web Bot Detection Using Mouse Behavioral Biometrics.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

2018
Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network.
IEEE Trans. Inf. Forensics Secur., 2018

From big data to knowledge: A spatio-temporal approach to malware detection.
Comput. Secur., 2018

2017
Detecting abnormal profiles in collaborative filtering recommender systems.
J. Intell. Inf. Syst., 2017

Spotting anomalous ratings for rating systems by analyzing target users and items.
Neurocomputing, 2017

Improvement of affine iterative closest point algorithm for partial registration.
IET Comput. Vis., 2017

Security importance assessment for system objects and malware detection.
Comput. Secur., 2017

Multi-touch Authentication Using Hand Geometry and Behavioral Information.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Tracking user information using motion data through smartphones.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Hum. Mach. Syst., 2016

Re-scale AdaBoost for attack detection in collaborative filtering recommender systems.
Knowl. Based Syst., 2016

Estimating user behavior toward detecting anomalous ratings in rating systems.
Knowl. Based Syst., 2016

Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems.
Int. J. Digit. Crime Forensics, 2016

Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

An Improvement of Affine Iterative Closest Point Algorithm for Partial Registration.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016

User Authentication Using Motion Sensor Data from Both Wearables and Smartphones.
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016

2015
Re-scale AdaBoost for Attack Detection in Collaborative Filtering Recommender Systems.
CoRR, 2015

Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Defending Suspected Users by Exploiting Specific Distance Metric in Collaborative Filtering Recommender Systems.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Comput. Secur., 2014

Centrality metrics of importance in access behaviors and malware detections.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
User Authentication Through Mouse Dynamics.
IEEE Trans. Inf. Forensics Secur., 2013

Web page and image semi-supervised classification with heterogeneous information fusion.
J. Inf. Sci., 2013

Multi-view semi-supervised web image classification via co-graph.
Neurocomputing, 2013

Real-time volume control for interactive network traffic replay.
Comput. Networks, 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

A Study of the Consistency in Keystroke Dynamics.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

Mobile Authentication through Touch-Behavior Features.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
Model-based real-time volume control for interactive network traffic replay.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Enhancing Web Page Classification via Local Co-training.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Balance Based Performance Enhancement for Interactive TCP Traffic Replay.
Proceedings of IEEE International Conference on Communications, 2010

2009
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009

2003
A rough set theory based method for anomaly intrusion detection in computer network systems.
Expert Syst. J. Knowl. Eng., 2003


  Loading...