Mimi Wang
Orcid: 0000-0001-5718-0653
According to our database1,
Mimi Wang
authored at least 29 papers
between 2013 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
The Cultivation of Students' Multiple Practical Ability Under the Multimodal Blended Teaching Mode.
Int. J. Emerg. Technol. Learn., June, 2022
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Neurocomputing, 2021
A Novel Multivariate Time-Series Anomaly Detection Approach Using an Unsupervised Deep Neural Network.
IEEE Access, 2021
A Measure Consistency Method for Overlapping Correspondence of Workflow Nets Based on Relation Profiles Partner Matrix.
IEEE Access, 2021
Process Model Enhancement Through Capturing Important Behaviors and Rating Trace Variants.
IEEE Access, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Measurement and Computation of Profile Similarity of Workflow Nets Based on Behavioral Relation Matrix.
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE CAA J. Autom. Sinica, 2020
Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
IEEE Access, 2020
EMD-Based Borehole TEM Array Signal Denoising and Baseline Wander Correction for NDT of Downhole Casings.
IEEE Access, 2020
2019
IEEE Access, 2019
2018
基于三维行为关系图的模型一致性检测方法 (Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph).
计算机科学, 2018
一种综合多因素的网页浏览行为认证方法 (Authentication Method Synthesizing Multi-factors for Web Browsing Behavior).
计算机科学, 2018
IEEE CAA J. Autom. Sinica, 2018
IEEE Access, 2018
2017
Proceedings of the 13th International Conference on Natural Computation, 2017
2016
计算机科学, 2016
Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
A behavioral authentication method for mobile gesture against resilient user posture.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
A Sufficient and Necessary Condition to Decide Compatibility for Simple Circuit Inter-organization Workflow Nets.
Proceedings of the Advances in Services Computing, 2016
2015
基于键盘行为进行用户识别的方法与应用 (Method of User Identification Based on Keystroke Behavior and its Application).
计算机科学, 2015
2013
The Analysis of Change Region About Networked Control System Based on the Behavior Profile.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013
A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013