Peihai Zhao
Orcid: 0000-0002-9484-3345
According to our database1,
Peihai Zhao
authored at least 21 papers
between 2015 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
A Dichotomous Repair-Based Load-Balanced Task Allocation Strategy in Cloud-Edge Environment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
2022
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Neurocomputing, 2021
A Novel Multivariate Time-Series Anomaly Detection Approach Using an Unsupervised Deep Neural Network.
IEEE Access, 2021
A Measure Consistency Method for Overlapping Correspondence of Workflow Nets Based on Relation Profiles Partner Matrix.
IEEE Access, 2021
Process Model Enhancement Through Capturing Important Behaviors and Rating Trace Variants.
IEEE Access, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction.
IEEE Trans. Ind. Informatics, 2020
Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
IEEE Access, 2020
2019
IEEE Access, 2019
2018
基于三维行为关系图的模型一致性检测方法 (Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph).
计算机科学, 2018
IEEE CAA J. Autom. Sinica, 2018
IEEE Access, 2018
2017
Proceedings of the 13th International Conference on Natural Computation, 2017
2016
计算机科学, 2016
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
A behavioral authentication method for mobile gesture against resilient user posture.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
2015
基于键盘行为进行用户识别的方法与应用 (Method of User Identification Based on Keystroke Behavior and its Application).
计算机科学, 2015