Chao Shen
Orcid: 0000-0002-6959-0569Affiliations:
- Xi'an Jiaotong University, School of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, China (PhD 2014)
According to our database1,
Chao Shen
authored at least 185 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Motion Tracking Control of Six-Wheel Skid-Steering Electric Vehicles via Two-Level-Sequence-Based Integrated Algorithm.
IEEE Trans. Ind. Electron., November, 2024
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024
IEEE Trans. Cybern., September, 2024
Multiagent Hierarchical Deep Reinforcement Learning for Operation Optimization of Grid-Interactive Efficient Commercial Buildings.
IEEE Trans. Artif. Intell., August, 2024
ACM Trans. Softw. Eng. Methodol., January, 2024
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models.
IEEE Trans. Inf. Forensics Secur., 2024
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization.
IEEE Trans. Inf. Forensics Secur., 2024
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code.
IEEE Trans. Inf. Forensics Secur., 2024
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Ind. Electron., 2024
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings.
Proc. ACM Softw. Eng., 2024
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer.
CoRR, 2024
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication.
CoRR, 2024
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study.
CoRR, 2024
CoRR, 2024
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024
From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions.
CoRR, 2024
Your Large Language Model is Secretly a Fairness Proponent and You Should Prompt it Like One.
CoRR, 2024
Does DetectGPT Fully Utilize Perturbation? Bridge Selective Perturbation to Fine-tuned Contrastive Learning Detector would be Better.
CoRR, 2024
Autom., 2024
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Commun. Mag., December, 2023
Robust Packetized MPC for Networked Systems Subject to Packet Dropouts and Input Saturation With Quantized Feedback.
IEEE Trans. Cybern., November, 2023
A Time-Varying Observer-Based Approach to Equilibrium Estimation and Compensation for Synchronization of Heterogeneous Nonlinear Cyber-Physical Systems.
IEEE Trans. Autom. Control., October, 2023
IEEE Trans. Smart Grid, May, 2023
Traffic Anomaly Prediction Based on Joint Static-Dynamic Spatio-Temporal Evolutionary Learning.
IEEE Trans. Knowl. Data Eng., May, 2023
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense.
IEEE Trans. Inf. Forensics Secur., 2023
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023
ACM Comput. Surv., 2023
Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval.
CoRR, 2023
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR, 2023
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
CoRR, 2023
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection.
CoRR, 2023
Dialogue for Prompting: a Policy-Gradient-Based Discrete Prompt Optimization for Few-shot Learning.
CoRR, 2023
Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths.
CoRR, 2023
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Applied Intelligence - First International Conference, 2023
Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization.
Proceedings of the Applied Intelligence - First International Conference, 2023
CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Low Resource With Contrastive Learning.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
2022
A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Infer-AVAE: An attribute inference model based on adversarial variational autoencoder.
Neurocomputing, 2022
CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Data Limitation With Contrastive Learning.
CoRR, 2022
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Smart Grid, 2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks.
IEEE/ACM Trans. Netw., 2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proc. IEEE, 2021
IEEE Netw., 2021
A real-time explainable traffic collision inference framework based on probabilistic graph theory.
Knowl. Based Syst., 2021
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021
IEEE Internet Things J., 2021
Neurocomputing, 2021
Future Gener. Comput. Syst., 2021
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions.
ACM Comput. Surv., 2021
Optimal Operation of a Hydrogen-based Building Multi-Energy System Based on Deep Reinforcement Learning.
CoRR, 2021
An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis.
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Fuzzy Syst., 2020
CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cybern., 2020
Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2020
IEEE Netw., 2020
Neurocomputing, 2020
A Duet Recommendation Algorithm Based on Jointly Local and Global Representation Learning.
CoRR, 2020
Deep Reinforcement Learning for Smart Grid Protection Against Coordinated Multistage Transmission Line Attacks.
CoRR, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Deep Reinforcement Learning and Blockchain for Peer-to-Peer Energy Trading among Microgrids.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
ACM Trans. Knowl. Discov. Data, 2019
ACM Trans. Intell. Syst. Technol., 2019
Observer-Based Sliding Mode Control for Uncertain Fuzzy Systems via Event-Triggered Strategy.
IEEE Trans. Fuzzy Syst., 2019
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
Fault detection filtering for nonlinear switched systems via event-triggered communication approach.
Autom., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019
A conditional-probability zone transformation coding method for categorical features.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks.
IEEE Wirel. Commun., 2018
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018
IEEE Trans. Ind. Informatics, 2018
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018
Proceedings of the 2018 International Conference on Security, 2018
Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018
2017
Knowl. Based Syst., 2017
IEEE Access, 2017
Proceedings of the IEEE International Conference on Identity, 2017
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication.
Proceedings of the IEEE International Conference on Identity, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017
Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Hum. Mach. Syst., 2016
Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016
User practice in password security: An empirical study of real-life passwords in the wild.
Comput. Secur., 2016
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the IEEE International Conference on Identity, 2016
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016
2015
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection.
Future Gener. Comput. Syst., 2015
Comput. Secur., 2015
SHE: Smart home energy management system based on social and motion behavior cognition.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the IEEE International Conference on Identity, 2015
Proceedings of the International Conference on Biometrics, 2015
2014
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014
Comput. Secur., 2014
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014
2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013
2012
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2009
Proceedings of IEEE International Conference on Communications, 2009