Chao Shen

Orcid: 0000-0002-6959-0569

Affiliations:
  • Xi'an Jiaotong University, School of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, China (PhD 2014)


According to our database1, Chao Shen authored at least 185 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Motion Tracking Control of Six-Wheel Skid-Steering Electric Vehicles via Two-Level-Sequence-Based Integrated Algorithm.
IEEE Trans. Ind. Electron., November, 2024

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024

Adaptive Neural Cooperative Control of Multirobot Systems With Input Quantization.
IEEE Trans. Cybern., September, 2024

Multiagent Hierarchical Deep Reinforcement Learning for Operation Optimization of Grid-Interactive Efficient Commercial Buildings.
IEEE Trans. Artif. Intell., August, 2024

Seed Selection for Testing Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., January, 2024

Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models.
IEEE Trans. Inf. Forensics Secur., 2024

Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization.
IEEE Trans. Inf. Forensics Secur., 2024

Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code.
IEEE Trans. Inf. Forensics Secur., 2024

Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Multirobot Target Searches in Unknown Environments Via Waypoint Planning System.
IEEE Trans. Ind. Electron., 2024

LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
IEEE Trans. Dependable Secur. Comput., 2024

ChildShield: An Implicit and Continuous Child Identification System on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness.
IEEE Trans. Dependable Secur. Comput., 2024

KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Benchmarking and Evaluating Deepfake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings.
Proc. ACM Softw. Eng., 2024

Speculative Coreset Selection for Task-Specific Fine-tuning.
CoRR, 2024

Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer.
CoRR, 2024

A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication.
CoRR, 2024

Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study.
CoRR, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
CoRR, 2024

CITADEL: Context Similarity Based Deep Learning Framework Bug Finding.
CoRR, 2024

ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024

From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions.
CoRR, 2024

A Survey of Deep Learning Library Testing Methods.
CoRR, 2024

Your Large Language Model is Secretly a Fairness Proponent and You Should Prompt it Like One.
CoRR, 2024

Does DetectGPT Fully Utilize Perturbation? Bridge Selective Perturbation to Fine-tuned Contrastive Learning Detector would be Better.
CoRR, 2024

Hijacking Attacks against Neural Networks by Analyzing Training Data.
CoRR, 2024

DREAM: Debugging and Repairing AutoML Pipelines.
CoRR, 2024

Exponentially extended dissipativity-based filtering of switched neural networks.
Autom., 2024

More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024

Hijacking Attacks against Neural Network by Analyzing Training Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

Efficient DNN-Powered Software with Fair Sparse Models.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag., December, 2023

Robust Packetized MPC for Networked Systems Subject to Packet Dropouts and Input Saturation With Quantized Feedback.
IEEE Trans. Cybern., November, 2023

A Time-Varying Observer-Based Approach to Equilibrium Estimation and Compensation for Synchronization of Heterogeneous Nonlinear Cyber-Physical Systems.
IEEE Trans. Autom. Control., October, 2023

Sensitive region-aware black-box adversarial attacks.
Inf. Sci., August, 2023

Extended Moving Target Defense for AC State Estimation in Smart Grids.
IEEE Trans. Smart Grid, May, 2023

Traffic Anomaly Prediction Based on Joint Static-Dynamic Spatio-Temporal Evolutionary Learning.
IEEE Trans. Knowl. Data Eng., May, 2023

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023

Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense.
IEEE Trans. Inf. Forensics Secur., 2023

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023

SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput., 2023

CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput., 2023

Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023

Interpreting Adversarial Examples in Deep Learning: A Review.
ACM Comput. Surv., 2023

A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection.
CoRR, 2023

Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval.
CoRR, 2023

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR, 2023

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
CoRR, 2023

Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection.
CoRR, 2023

Dialogue for Prompting: a Policy-Gradient-Based Discrete Prompt Optimization for Few-shot Learning.
CoRR, 2023

Hard Adversarial Example Mining for Improving Robust Fairness.
CoRR, 2023

Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths.
CoRR, 2023

End-to-end Face-swapping via Adaptive Latent Representation Learning.
CoRR, 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Black-Box Fairness Testing with Shadow Models.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

DeepSensitive: A Fuzzing Test for Deep Neural Networks with Sensitive Neurons.
Proceedings of the Applied Intelligence - First International Conference, 2023

Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization.
Proceedings of the Applied Intelligence - First International Conference, 2023

CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Low Resource With Contrastive Learning.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles.
IEEE Trans. Veh. Technol., 2022

SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput., 2022

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
IEEE Trans. Dependable Secur. Comput., 2022

Infer-AVAE: An attribute inference model based on adversarial variational autoencoder.
Neurocomputing, 2022

CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Data Limitation With Contrastive Learning.
CoRR, 2022

Artificial Intelligence Security Competition (AISC).
CoRR, 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice.
CoRR, 2022

Towards Benchmarking and Evaluating Deepfake Detection.
CoRR, 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Teacher Model Fingerprinting Attacks Against Transfer Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Unify Local and Global Information for Top-N Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Amplifying Membership Exposure via Data Poisoning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Property Inference Attacks Against GANs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Verifying the Quality of Outsourced Training on Clouds.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings.
IEEE Trans. Smart Grid, 2021

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021

Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks.
IEEE/ACM Trans. Netw., 2021

Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE, 2021

When Deep Learning Meets Differential Privacy: Privacy, Security, and More.
IEEE Netw., 2021

A real-time explainable traffic collision inference framework based on probabilistic graph theory.
Knowl. Based Syst., 2021

Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021

A Review of Deep Reinforcement Learning for Smart Building Energy Management.
IEEE Internet Things J., 2021

<i>Payment-Guard</i>: Detecting fraudulent in-app purchases in iOS system.
Neurocomputing, 2021

A fast and scalable authentication scheme in IOT for smart living.
Future Gener. Comput. Syst., 2021

Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions.
ACM Comput. Surv., 2021

Optimal Operation of a Hydrogen-based Building Multi-Energy System Based on Deep Reinforcement Learning.
CoRR, 2021

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns.
CoRR, 2021

An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

CARTL: Cooperative Adversarially-Robust Transfer Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Rethinking Adversarial Examples Exploiting Frequency-Based Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis.
IEEE Trans. Syst. Man Cybern. Syst., 2020

We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Static Output Feedback Control of Switched Nonlinear Systems With Actuator Faults.
IEEE Trans. Fuzzy Syst., 2020

CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020

Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020

Dissipative Filtering for Switched Fuzzy Systems With Missing Measurements.
IEEE Trans. Cybern., 2020

Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Waving Gesture Analysis for User Authentication in the Mobile Environment.
IEEE Netw., 2020

Passive browser identification with multi-scale Convolutional Neural Networks.
Neurocomputing, 2020

A Duet Recommendation Algorithm Based on Jointly Local and Global Representation Learning.
CoRR, 2020

Deep Reinforcement Learning for Smart Grid Protection Against Coordinated Multistage Transmission Line Attacks.
CoRR, 2020

Deep Reinforcement Learning for Smart Building Energy Management: A Survey.
CoRR, 2020

A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach.
CoRR, 2020

Event-triggered sliding mode control of nonlinear dynamic systems.
Autom., 2020

Audee: Automated Testing for Deep Learning Frameworks.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Deep Reinforcement Learning and Blockchain for Peer-to-Peer Energy Trading among Microgrids.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Adversarial Example Detection by Classification for Deep Speech Recognition.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Digger: Detect Similar Groups in Heterogeneous Social Networks.
ACM Trans. Knowl. Discov. Data, 2019

Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol., 2019

Observer-Based Sliding Mode Control for Uncertain Fuzzy Systems via Event-Triggered Strategy.
IEEE Trans. Fuzzy Syst., 2019

Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

Fault detection filtering for nonlinear switched systems via event-triggered communication approach.
Autom., 2019

Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms.
Proceedings of the 28th USENIX Security Symposium, 2019

Event-Triggered Output Feedback Control of Takagi-Sugeno Fuzzy Systems.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

A conditional-probability zone transformation coding method for categorical features.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks.
IEEE Wirel. Commun., 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

Deep Learning Based Gait Recognition Using Smartphones in the Wild.
CoRR, 2018

A Co-Evolutionary Model for Inferring Online Social Network User Behaviors.
Proceedings of the 2018 International Conference on Security, 2018

Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

A feasible graph partition framework for parallel computing of big graph.
Knowl. Based Syst., 2017

Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition.
IEEE Access, 2017

Passive fingerprinting for wireless devices: A multi-level decision approach.
Proceedings of the IEEE International Conference on Identity, 2017

Modeling interactive sensor-behavior with smartphones for implicit and active user authentication.
Proceedings of the IEEE International Conference on Identity, 2017

On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Hum. Mach. Syst., 2016

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016

User practice in password security: An empirical study of real-life passwords in the wild.
Comput. Secur., 2016

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modeling multimodal biometric modalities for continuous user authentication.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

On motion-sensor behavior analysis for human-activity recognition via smartphones.
Proceedings of the IEEE International Conference on Identity, 2016

A human-centered smart home system with wearable-sensor behavior analysis.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016

2015
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection.
Future Gener. Comput. Syst., 2015

Input extraction via motion-sensor behavior analysis on smartphones.
Comput. Secur., 2015

SHE: Smart home energy management system based on social and motion behavior cognition.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On motion sensors as source for user input inference in smartphones.
Proceedings of the IEEE International Conference on Identity, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

2014
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Comput. Secur., 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

2013
User Authentication Through Mouse Dynamics.
IEEE Trans. Inf. Forensics Secur., 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A Study of the Consistency in Keystroke Dynamics.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

Mobile Authentication through Touch-Behavior Features.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...