Zhongmin Cai
Orcid: 0000-0002-4903-3992
According to our database1,
Zhongmin Cai
authored at least 63 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., September, 2024
Performance evaluation of lightweight network-based bot detection using mouse movements.
Eng. Appl. Artif. Intell., 2024
In-Situ Mode: Generative AI-Driven Characters Transforming Art Engagement Through Anthropomorphic Narratives.
CoRR, 2024
VisionTasker: Mobile Task Automation Using Vision Based UI Understanding and LLM Task Planning.
Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Towards Building Condition-Based Cross-Modality Intention-Aware Human-AI Cooperation under VR Environment.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Exploring visual representations of computer mouse movements for bot detection using deep learning approaches.
Expert Syst. Appl., November, 2023
Integrating Gaze and Mouse Via Joint Cross-Attention Fusion Net for Students' Activity Recognition in E-learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023
Interaction of Thoughts: Towards Mediating Task Assignment in Human-AI Cooperation with a Capability-Aware Shared Mental Model.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
IEEE Trans. Affect. Comput., 2022
Integrating Handcrafted Features with Deep Representations for Smartphone Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
2021
IEEE Trans. Multim., 2021
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021
2020
Expert Syst. Appl., 2020
I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proc. ACM Hum. Comput. Interact., 2019
Security and confidentiality of network communication using chaotic encryption technology.
J. Comput. Methods Sci. Eng., 2019
Data Min. Knowl. Discov., 2019
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Comput. Secur., 2018
2017
J. Intell. Inf. Syst., 2017
Neurocomputing, 2017
IET Comput. Vis., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
2016
IEEE Trans. Hum. Mach. Syst., 2016
Re-scale AdaBoost for attack detection in collaborative filtering recommender systems.
Knowl. Based Syst., 2016
Knowl. Based Syst., 2016
Int. J. Digit. Crime Forensics, 2016
Proceedings of the Web-Age Information Management - 17th International Conference, 2016
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016
2015
Re-scale AdaBoost for Attack Detection in Collaborative Filtering Recommender Systems.
CoRR, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Defending Suspected Users by Exploiting Specific Distance Metric in Collaborative Filtering Recommender Systems.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the International Conference on Biometrics, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
2014
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014
Comput. Secur., 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Web page and image semi-supervised classification with heterogeneous information fusion.
J. Inf. Sci., 2013
Neurocomputing, 2013
Comput. Networks, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013
2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Proceedings of IEEE International Conference on Communications, 2009
2003
A rough set theory based method for anomaly intrusion detection in computer network systems.
Expert Syst. J. Knowl. Eng., 2003