default search action
Chao Shen 0001
Person information
- affiliation (PhD 2014): Xi'an Jiaotong University, School of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, China
Other persons with the same name
- Chao Shen — disambiguation page
- Chao Shen 0002 — Beijing University of Technology, College of Electronic Information and Control Engineering, China (and 1 more)
- Chao Shen 0003 — University of Victoria, Department of Mechanical Engineering / IESVic, BC, Canada
- Chao Shen 0004 — Beijing Jiaotong University, Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications, China (and 3 more)
- Chao Shen 0005 — Florida International University, School of Computing and Information Sciences, Miami, FL, USA
- Chao Shen 0006 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Chao Shen 0007 — Shanghai University, School of Computer Engineering and Science, China
- Chao Shen 0008 — Zhejiang University, College of Pharmaceutical Sciences, Hangzhou, China (and 1 more)
- Chao Shen 0009 — Fudan University, Key Laboratory of EMW Information, MoE, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j83]Yufeng Tian, Xiaojie Su, Chao Shen, Xiaoyu Ma:
Exponentially extended dissipativity-based filtering of switched neural networks. Autom. 161: 111465 (2024) - [j82]Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings. Proc. ACM Softw. Eng. 1(FSE): 906-928 (2024) - [j81]Zhiqiang Chen, Liang Yu, Shuang Zhang, Shushan Hu, Chao Shen:
Multiagent Hierarchical Deep Reinforcement Learning for Operation Optimization of Grid-Interactive Efficient Commercial Buildings. IEEE Trans. Artif. Intell. 5(8): 4280-4292 (2024) - [j80]Tiedong Ma, Feng Hu, Xiaojie Su, Chao Shen, Xiaoyu Ma:
Adaptive Neural Cooperative Control of Multirobot Systems With Input Quantization. IEEE Trans. Cybern. 54(9): 5518-5528 (2024) - [j79]Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024) - [j78]Xueluan Gong, Yanjiao Chen, Huayang Huang, Weihan Kong, Ziyao Wang, Chao Shen, Qian Wang:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. IEEE Trans. Dependable Secur. Comput. 21(4): 1605-1620 (2024) - [j77]Chenhao Lin, Tianle Song, Yingmao Miao, Jingyi He, Minghui Yang, Huan Wang, Chao Shen:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. IEEE Trans. Dependable Secur. Comput. 21(4): 2257-2272 (2024) - [j76]Jiwei Tian, Chao Shen, Buhong Wang, Xiaofang Xia, Meng Zhang, Chenhao Lin, Qian Li:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 4418-4432 (2024) - [j75]Lishuai Yu, Xiaojie Su, Yufeng Tian, Jiangshuai Huang, Chao Shen:
Multirobot Target Searches in Unknown Environments Via Waypoint Planning System. IEEE Trans. Ind. Electron. 71(7): 7511-7519 (2024) - [j74]Yaoyao Tan, Xiaojie Su, Chao Shen, Jiangshuai Huang:
Motion Tracking Control of Six-Wheel Skid-Steering Electric Vehicles via Two-Level-Sequence-Based Integrated Algorithm. IEEE Trans. Ind. Electron. 71(11): 14937-14945 (2024) - [j73]Shenyi Zhang, Baolin Zheng, Peipei Jiang, Lingchen Zhao, Chao Shen, Qian Wang:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. IEEE Trans. Inf. Forensics Secur. 19: 3164-3177 (2024) - [j72]Yulong Yang, Chenhao Lin, Qian Li, Zhengyu Zhao, Haoran Fan, Dawei Zhou, Nannan Wang, Tongliang Liu, Chao Shen:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. IEEE Trans. Inf. Forensics Secur. 19: 3265-3278 (2024) - [j71]Yulong Yang, Haoran Fan, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. IEEE Trans. Inf. Forensics Secur. 19: 5880-5894 (2024) - [j70]Qian Li, Qingyuan Hu, Haoran Fan, Chenhao Lin, Chao Shen, Libing Wu:
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. IEEE Trans. Inf. Forensics Secur. 19: 8673-8684 (2024) - [j69]Chenhao Lin, Fangbin Yi, Hang Wang, Jingyi Deng, Zhengyu Zhao, Qian Li, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 8832-8844 (2024) - [j68]Man Zhou, Qian Wang, Qi Li, Wenyu Zhou, Jingxiao Yang, Chao Shen:
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns. IEEE Trans. Mob. Comput. 23(10): 9772-9788 (2024) - [j67]Yuhan Zhi, Xiaofei Xie, Chao Shen, Jun Sun, Xiaoyu Zhang, Xiaohong Guan:
Seed Selection for Testing Deep Neural Networks. ACM Trans. Softw. Eng. Methodol. 33(1): 23:1-23:33 (2024) - [c63]Chen Ma, Ningfei Wang, Qi Alfred Chen, Chao Shen:
SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples. AAAI 2024: 4062-4070 - [c62]Yichen Wang, Shangbin Feng, Abe Bohan Hou, Xiao Pu, Chao Shen, Xiaoming Liu, Yulia Tsvetkov, Tianxing He:
Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks. ACL (1) 2024: 2894-2925 - [c61]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CVPR 2024: 24452-24461 - [c60]Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen:
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval. ICML 2024 - [c59]Zhoulin Ji, Chenhao Lin, Hang Wang, Chao Shen:
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis. IJCAI 2024: 413-421 - [c58]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. ISSTA 2024: 983-995 - [c57]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c56]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [i53]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
DREAM: Debugging and Repairing AutoML Pipelines. CoRR abs/2401.00379 (2024) - [i52]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i51]Jiwei Tian, Chao Shen, Buhong Wang, Xiaofang Xia, Meng Zhang, Chenhao Lin, Qian Li:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. CoRR abs/2401.16001 (2024) - [i50]Shengchao Liu, Xiaoming Liu, Yichen Wang, Zehua Cheng, Chengzhengxu Li, Zhaohan Zhang, Yu Lan, Chao Shen:
Does DetectGPT Fully Utilize Perturbation? Bridge Selective Perturbation to Fine-tuned Contrastive Learning Detector would be Better. CoRR abs/2402.00263 (2024) - [i49]Yichen Wang, Shangbin Feng, Abe Bohan Hou, Xiao Pu, Chao Shen, Xiaoming Liu, Yulia Tsvetkov, Tianxing He:
Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks. CoRR abs/2402.11638 (2024) - [i48]Tianlin Li, Xiaoyu Zhang, Chao Du, Tianyu Pang, Qian Liu, Qing Guo, Chao Shen, Yang Liu:
Your Large Language Model is Secretly a Fairness Proponent and You Should Prompt it Like One. CoRR abs/2402.12150 (2024) - [i47]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CoRR abs/2403.17301 (2024) - [i46]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024) - [i45]Weipeng Jiang, Xuanqi Gao, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions. CoRR abs/2406.00602 (2024) - [i44]Chen Ma, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen:
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving. CoRR abs/2406.05810 (2024) - [i43]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Shiwei Wang, Chao Shen:
CITADEL: Context Similarity Based Deep Learning Framework Bug Finding. CoRR abs/2406.12196 (2024) - [i42]Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CoRR abs/2406.19311 (2024) - [i41]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. CoRR abs/2407.02805 (2024) - [i40]Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang:
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study. CoRR abs/2407.09295 (2024) - [i39]Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen:
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication. CoRR abs/2407.10575 (2024) - [i38]Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen:
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer. CoRR abs/2408.11313 (2024) - [i37]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen, Tianlin Li, Weipeng Jiang, Yang Liu:
Speculative Coreset Selection for Task-Specific Fine-tuning. CoRR abs/2410.01296 (2024) - 2023
- [j66]Yunjie Ge, Qian Wang, Jiayuan Yu, Chao Shen, Qi Li:
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems. IEEE Commun. Mag. 61(12): 176-182 (2023) - [j65]Sicong Han, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. ACM Comput. Surv. 55(14s): 328:1-328:38 (2023) - [j64]Chenhao Lin, Sicong Han, Jiongli Zhu, Qian Li, Chao Shen, Youwei Zhang, Xiaohong Guan:
Sensitive region-aware black-box adversarial attacks. Inf. Sci. 637: 118929 (2023) - [j63]Bohui Wang, Chao Shen:
A Time-Varying Observer-Based Approach to Equilibrium Estimation and Compensation for Synchronization of Heterogeneous Nonlinear Cyber-Physical Systems. IEEE Trans. Autom. Control. 68(10): 6176-6183 (2023) - [j62]Langwen Zhang, Bohui Wang, Yuanshi Zheng, Ali Zemouche, Xudong Zhao, Chao Shen:
Robust Packetized MPC for Networked Systems Subject to Packet Dropouts and Input Saturation With Quantized Feedback. IEEE Trans. Cybern. 53(11): 6987-6997 (2023) - [j61]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j60]Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j59]Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j58]Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j57]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023) - [j56]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Meng Xue, Qian Wang, Chao Shen:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. IEEE Trans. Dependable Secur. Comput. 20(6): 4993-5004 (2023) - [j55]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j54]Qian Li, Qingyuan Hu, Chenhao Lin, Di Wu, Chao Shen:
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. IEEE Trans. Inf. Forensics Secur. 18: 5936-5949 (2023) - [j53]Xiaoming Liu, Zhanwei Zhang, Lingjuan Lyu, Zhaohan Zhang, Shuai Xiao, Chao Shen, Philip S. Yu:
Traffic Anomaly Prediction Based on Joint Static-Dynamic Spatio-Temporal Evolutionary Learning. IEEE Trans. Knowl. Data Eng. 35(5): 5356-5370 (2023) - [j52]Meng Zhang, Xuzhen Fan, Rongxing Lu, Chao Shen, Xiaohong Guan:
Extended Moving Target Defense for AC State Estimation in Smart Grids. IEEE Trans. Smart Grid 14(3): 2313-2325 (2023) - [c55]Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Hang Pu, Yu Lan, Chao Shen:
CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Low Resource With Contrastive Learning. EMNLP 2023: 16167-16188 - [c54]Bowen Pei, Jingyi Deng, Chenhao Lin, Pengwei Hu, Chao Shen:
Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization. ICAI (2) 2023: 202-213 - [c53]Zixuan Yang, Chenhao Lin, Pengwei Hu, Chao Shen:
DeepSensitive: A Fuzzing Test for Deep Neural Networks with Sensitive Neurons. ICAI (1) 2023: 351-362 - [c52]Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. ICICS 2023: 467-484 - [c51]Yingmao Miao, Qiwei Tian, Chenhao Lin, Tianle Song, Yajie Zhou, Junyi Zhao, Shuxin Gao, Minghui Yang, Chao Shen:
Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction. IJCAI 2023: 3029-3037 - [c50]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. ISSTA 2023: 475-487 - [c49]Longtian Wang, Xiaofei Xie, Xiaoning Du, Meng Tian, Qing Guo, Zheng Yang, Chao Shen:
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems. ESEC/SIGSOFT FSE 2023: 68-80 - [c48]Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - [c47]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [c46]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [i36]Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li:
End-to-end Face-swapping via Adaptive Latent Representation Learning. CoRR abs/2303.04186 (2023) - [i35]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement. CoRR abs/2304.04222 (2023) - [i34]Yulong Yang, Chenhao Lin, Qian Li, Chao Shen, Dawei Zhou, Nannan Wang, Tongliang Liu:
Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths. CoRR abs/2305.05875 (2023) - [i33]Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang:
Hard Adversarial Example Mining for Improving Robust Fairness. CoRR abs/2308.01823 (2023) - [i32]Chengzhengxu Li, Xiaoming Liu, Yichen Wang, Duyi Li, Yu Lan, Chao Shen:
Dialogue for Prompting: a Policy-Gradient-Based Discrete Prompt Optimization for Few-shot Learning. CoRR abs/2308.07272 (2023) - [i31]Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Jingyi Deng, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. CoRR abs/2310.04845 (2023) - [i30]Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen:
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning. CoRR abs/2310.09891 (2023) - [i29]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen:
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights. CoRR abs/2310.11850 (2023) - [i28]Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval. CoRR abs/2312.07364 (2023) - [i27]Chen Ma, Ningfei Wang, Qi Alfred Chen, Chao Shen:
SlowTrack: Increasing the Latency of Camera-based Perception in Autonomous Driving Using Adversarial Examples. CoRR abs/2312.09520 (2023) - [i26]Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Xiaofei Xie, Yang Liu, Chao Shen:
A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection. CoRR abs/2312.10766 (2023) - 2022
- [j51]Yadong Zhou, Zhihao Ding, Xiaoming Liu, Chao Shen, Lingling Tong, Xiaohong Guan:
Infer-AVAE: An attribute inference model based on adversarial variational autoencoder. Neurocomputing 483: 105-115 (2022) - [j50]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [j49]Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang, Chao Shen, Qi Li:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(5): 3329-3342 (2022) - [j48]Qilei Yin, Zhuotao Liu, Qi Li, Tao Wang, Qian Wang, Chao Shen, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 19(6): 3656-3670 (2022) - [j47]Kairan Zhao, Meng Zhang, Rongxing Lu, Chao Shen:
A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles. IEEE Trans. Veh. Technol. 71(12): 12576-12587 (2022) - [c45]Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c44]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c43]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c42]Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang:
Property Inference Attacks Against GANs. NDSS 2022 - [c41]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c40]Xiaoming Liu, Shaocong Wu, Zhaohan Zhang, Chao Shen:
Unify Local and Global Information for Top-N Recommendation. SIGIR 2022: 1262-1272 - [c39]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c38]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. USENIX Security Symposium 2022: 3593-3610 - [i25]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - [i24]Yunjie Ge, Qian Wang, Jingfeng Zhang, Juntao Zhou, Yunzhu Zhang, Chao Shen:
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice. CoRR abs/2203.13497 (2022) - [i23]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i22]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - [i21]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. CoRR abs/2211.00463 (2022) - [i20]Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang:
Artificial Intelligence Security Competition (AISC). CoRR abs/2212.03412 (2022) - [i19]Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Yu Lan, Chao Shen:
CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Data Limitation With Contrastive Learning. CoRR abs/2212.10341 (2022) - 2021
- [j46]Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang, Chao Shen, Qian Zhang:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. ACM Comput. Surv. 53(4): 84:1-84:37 (2021) - [j45]Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen:
A fast and scalable authentication scheme in IOT for smart living. Future Gener. Comput. Syst. 117: 125-137 (2021) - [j44]Yadong Zhou, Tianyi Yue, Xiaoming Liu, Chao Shen, Lingling Tong, Zhihao Ding:
Payment-Guard: Detecting fraudulent in-app purchases in iOS system. Neurocomputing 422: 263-276 (2021) - [j43]Liang Yu, Shuqi Qin, Meng Zhang, Chao Shen, Tao Jiang, Xiaohong Guan:
A Review of Deep Reinforcement Learning for Smart Building Energy Management. IEEE Internet Things J. 8(15): 12046-12063 (2021) - [j42]Xueluan Gong, Yanjiao Chen, Qian Wang, Huayang Huang, Lingshuo Meng, Chao Shen, Qian Zhang:
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment. IEEE J. Sel. Areas Commun. 39(8): 2617-2631 (2021) - [j41]Xiaoming Liu, Yu Lan, Yadong Zhou, Chao Shen, Xiaohong Guan:
A real-time explainable traffic collision inference framework based on probabilistic graph theory. Knowl. Based Syst. 212: 106442 (2021) - [j40]Xinyan Li, Yufei Chen, Cong Wang, Chao Shen:
When Deep Learning Meets Differential Privacy: Privacy, Security, and More. IEEE Netw. 35(6): 148-155 (2021) - [j39]Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j38]Yufei Chen, Chao Shen, Cong Wang, Qixue Xiao, Kang Li, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. IEEE Trans. Dependable Secur. Comput. 18(5): 2017-2028 (2021) - [j37]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j36]Qian Wang, Baolin Zheng, Qi Li, Chao Shen, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - [j35]Peng Zhang, Fangzheng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu:
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks. IEEE/ACM Trans. Netw. 29(1): 332-345 (2021) - [j34]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [j33]Liang Yu, Yi Sun, Zhanbo Xu, Chao Shen, Dong Yue, Tao Jiang, Xiaohong Guan:
Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings. IEEE Trans. Smart Grid 12(1): 407-419 (2021) - [c37]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c36]Sicong Han, Chenhao Lin, Chao Shen, Qian Wang:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. ICICS (2) 2021: 73-89 - [c35]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c34]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. ICSE 2021: 359-371 - [c33]Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c32]Meng Zhang, Shan Fu, Jun Yan, Huiyan Zhang, Chenhao Ling, Chao Shen, Peng Shi:
An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks. SMC 2021: 921-926 - [i18]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i17]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i16]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. CoRR abs/2106.12478 (2021) - [i15]Liang Yu, Shuqi Qin, Zhanbo Xu, Xiaohong Guan, Chao Shen, Dong Yue:
Optimal Operation of a Hydrogen-based Building Multi-Energy System Based on Deep Reinforcement Learning. CoRR abs/2109.10754 (2021) - [i14]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - [i13]Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang:
Property Inference Attacks Against GANs. CoRR abs/2111.07608 (2021) - 2020
- [j32]Xinxin Liu, Xiaojie Su, Peng Shi, Chao Shen, Yan Peng:
Event-triggered sliding mode control of nonlinear dynamic systems. Autom. 112 (2020) - [j31]Saeid Samizade, Chao Shen, Chengxiang Si, Xiaohong Guan:
Passive browser identification with multi-scale Convolutional Neural Networks. Neurocomputing 378: 238-247 (2020) - [j30]Chao Shen, Zhao Wang, Chengxiang Si, Yufei Chen, Xiaojie Su:
Waving Gesture Analysis for User Authentication in the Mobile Environment. IEEE Netw. 34(2): 57-63 (2020) - [j29]Meng Zhang, Chao Shen, Zheng-Guang Wu:
Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems. IEEE Trans. Circuits Syst. II Express Briefs 67-II(10): 2039-2043 (2020) - [j28]Meng Zhang, Chao Shen, Zheng-Guang Wu, Dan Zhang:
Dissipative Filtering for Switched Fuzzy Systems With Missing Measurements. IEEE Trans. Cybern. 50(5): 1931-1940 (2020) - [j27]Chao Shen, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. IEEE Trans. Dependable Secur. Comput. 17(2): 335-349 (2020) - [j26]Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan:
CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection. IEEE Trans. Fuzzy Syst. 28(5): 806-817 (2020) - [j25]Meng Zhang, Peng Shi, Chao Shen, Zheng-Guang Wu:
Static Output Feedback Control of Switched Nonlinear Systems With Actuator Faults. IEEE Trans. Fuzzy Syst. 28(8): 1600-1609 (2020) - [j24]Chao Shen, Yufei Chen, Gengshan Yang, Xiaohong Guan:
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2501-2511 (2020) - [j23]Xiaoming Liu, Chao Shen, Xiaohong Guan, Yadong Zhou:
We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2693-2704 (2020) - [c31]Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan:
Adversarial Example Detection by Classification for Deep Speech Recognition. ICASSP 2020: 3102-3106 - [c30]Ye Xu, Liang Yu, Gang Bi, Meng Zhang, Chao Shen:
Deep Reinforcement Learning and Blockchain for Peer-to-Peer Energy Trading among Microgrids. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 360-365 - [c29]Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. ASE 2020: 486-498 - [i12]Qirui Li, Xiaoming Liu, Chao Shen, Xi Peng, Yadong Zhou, Xiaohong Guan:
Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach. CoRR abs/2003.06100 (2020) - [i11]Liang Yu, Yi Sun, Zhanbo Xu, Chao Shen, Dong Yue, Tao Jiang, Xiaohong Guan:
Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings. CoRR abs/2006.14156 (2020) - [i10]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020) - [i9]Liang Yu, Shuqi Qin, Meng Zhang, Chao Shen, Tao Jiang, Xiaohong Guan:
Deep Reinforcement Learning for Smart Building Energy Management: A Survey. CoRR abs/2008.05074 (2020) - [i8]Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen:
A Fast and Scalable Authentication Scheme in IoT for Smart Living. CoRR abs/2011.06325 (2020) - [i7]Liang Yu, Zhen Gao, Shuqi Qin, Meng Zhang, Chao Shen, Xiaohong Guan, Dong Yue:
Deep Reinforcement Learning for Smart Grid Protection Against Coordinated Multistage Transmission Line Attacks. CoRR abs/2011.14526 (2020) - [i6]Xiaoming Liu, Shaocong Wu, Zhaohan Zhang, Zhanwei Zhang, Yu Lan, Chao Shen:
A Duet Recommendation Algorithm Based on Jointly Local and Global Representation Learning. CoRR abs/2012.01635 (2020) - [i5]Yadong Zhou, Zhihao Ding, Xiaoming Liu, Chao Shen, Lingling Tong, Xiaohong Guan:
Infer-AVAE: An Attribute Inference Model Based on Adversarial Variational Autoencoder. CoRR abs/2012.15005 (2020)
2010 – 2019
- 2019
- [j22]Xinxin Liu, Xiaojie Su, Peng Shi, Sing Kiong Nguang, Chao Shen:
Fault detection filtering for nonlinear switched systems via event-triggered communication approach. Autom. 101: 365-376 (2019) - [j21]Xinxin Liu, Xiaojie Su, Peng Shi, Chao Shen:
Observer-Based Sliding Mode Control for Uncertain Fuzzy Systems via Event-Triggered Strategy. IEEE Trans. Fuzzy Syst. 27(11): 2190-2201 (2019) - [j20]Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Trans. Intell. Syst. Technol. 10(6): 64:1-64:18 (2019) - [j19]Xiaoming Liu, Chao Shen, Xiaohong Guan, Yadong Zhou:
Digger: Detect Similar Groups in Heterogeneous Social Networks. ACM Trans. Knowl. Discov. Data 13(1): 2:1-2:27 (2019) - [c28]Liang He, Chao Shen, Yun Li:
A conditional-probability zone transformation coding method for categorical features. ACM TUR-C 2019: 116:1-116:6 - [c27]Yadong Zhou, Xukun Wang, Zhanbo Xu, Ying Su, Ting Liu, Chao Shen, Xiaohong Guan:
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment. CASE 2019: 739-744 - [c26]Qianqian Chen, Xiaojie Su, Jianxing Liu, Chao Shen:
Event-Triggered Output Feedback Control of Takagi-Sugeno Fuzzy Systems. CIS 2019: 383-386 - [c25]Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. USENIX Security Symposium 2019: 443-460 - [i4]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - [i3]Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan:
Adversarial Example Detection by Classification for Deep Speech Recognition. CoRR abs/1910.10013 (2019) - [i2]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo:
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection. CoRR abs/1910.13111 (2019) - 2018
- [j18]Chao Shen, Yufei Chen, Xiaohong Guan:
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis. Inf. Sci. 430: 538-553 (2018) - [j17]Zheli Liu, Yanyu Huang, Jin Li, Xiaochun Cheng, Chao Shen:
DivORAM: Towards a practical oblivious RAM with variable block size. Inf. Sci. 447: 1-11 (2018) - [j16]Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 13(1): 48-62 (2018) - [j15]Zheli Liu, Zhendong Wu, Tong Li, Jin Li, Chao Shen:
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Informatics 14(7): 3244-3252 (2018) - [j14]Chao Shen, Yufei Chen, Yao Liu, Xiaohong Guan:
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference. IEEE Trans. Neural Networks Learn. Syst. 29(12): 6292-6302 (2018) - [j13]Chao Shen, Chang Liu, Haoliang Tan, Zhao Wang, Dezhi Xu, Xiaojie Su:
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks. IEEE Wirel. Commun. 25(6): 26-31 (2018) - [c24]Xiaozi Liu, Chao Shen, Yufei Chen:
Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones. CCBR 2018: 669-677 - [c23]Xiaoming Liu, Chao Shen, Yingyue Fan, Xiaozi Liu, Yadong Zhou, Xiaohong Guan:
A Co-Evolutionary Model for Inferring Online Social Network User Behaviors. SPAC 2018: 85-90 - [i1]Qin Zou, Yanling Wang, Yi Zhao, Qian Wang, Chao Shen, Qingquan Li:
Deep Learning Based Gait Recognition Using Smartphones in the Wild. CoRR abs/1811.00338 (2018) - 2017
- [j12]Yufei Chen, Chao Shen:
Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition. IEEE Access 5: 3095-3110 (2017) - [j11]Xiaoming Liu, Yadong Zhou, Xiaohong Guan, Chao Shen:
A feasible graph partition framework for parallel computing of big graph. Knowl. Based Syst. 134: 228-239 (2017) - [j10]Haijun Wang, Ting Liu, Xiaohong Guan, Chao Shen, Qinghua Zheng, Zijiang Yang:
Dependence Guided Symbolic Execution. IEEE Trans. Software Eng. 43(3): 252-271 (2017) - [c22]Liang He, Zhixiang Li, Chao Shen:
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection. ACM TUR-C 2017: 32:1-32:7 - [c21]Zhanpei Jia, Chao Shen, Xiao Yi, Yufei Chen, Tianwen Yu, Xiaohong Guan:
Big-data analysis of multi-source logs for anomaly detection on network-based system. CASE 2017: 1136-1141 - [c20]Zhao Wang, Chao Shen, Yufei Chen:
Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics. CCBR 2017: 545-553 - [c19]Chao Shen, Ziqiang Ren, Yufei Chen, Zhao Wang:
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. CSS 2017: 494-502 - [c18]Yufei Chen, Chao Shen, Zhao Wang, Tianwen Yu:
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication. ISBA 2017: 1-6 - [c17]Chao Shen, Ruiyuan Lu, Saeid Samizade, Liang He:
Passive fingerprinting for wireless devices: A multi-level decision approach. ISBA 2017: 1-6 - 2016
- [j9]Chao Shen, Tianwen Yu, Haodi Xu, Gengshan Yang, Xiaohong Guan:
User practice in password security: An empirical study of real-life passwords in the wild. Comput. Secur. 61: 130-141 (2016) - [j8]Chao Shen, Tianwen Yu, Sheng Yuan, Yunpeng Li, Xiaohong Guan:
Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 16(3): 345 (2016) - [j7]Chao Shen, Zhongmin Cai, Xiaomei Liu, Xiaohong Guan, Roy A. Maxion:
MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Trans. Hum. Mach. Syst. 46(5): 734-748 (2016) - [j6]Chao Shen, Yong Zhang, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 498-513 (2016) - [c16]Jianting Ji, Ting Liu, Chao Shen, Hongyu Wu, Wenyi Liu, Man Su, Siyun Chen, Zhanpei Jia:
A human-centered smart home system with wearable-sensor behavior analysis. CASE 2016: 1112-1117 - [c15]Chao Shen, Yufei Chen, Gengshan Yang:
On motion-sensor behavior analysis for human-activity recognition via smartphones. ISBA 2016: 1-6 - [c14]Chao Shen, He Zhang, Zhenyu Yang, Xiaohong Guan:
Modeling multimodal biometric modalities for continuous user authentication. SMC 2016: 1894-1899 - [c13]Chao Shen, Haodi Xu, Haijun Wang, Xiaohong Guan:
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis. Trustcom/BigDataSE/ISPA 2016: 1054-1060 - 2015
- [j5]Chao Shen, Shichao Pei, Zhenyu Yang, Xiaohong Guan:
Input extraction via motion-sensor behavior analysis on smartphones. Comput. Secur. 53: 143-155 (2015) - [j4]Ting Liu, Yanan Sun, Yang Liu, Yuhong Gui, Yucheng Zhao, Dai Wang, Chao Shen:
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection. Future Gener. Comput. Syst. 49: 94-103 (2015) - [c12]Chao Shen, Yong Zhang, Zhongmin Cai, Tianwen Yu, Xiaohong Guan:
Touch-interaction behavior for continuous user authentication on smartphones. ICB 2015: 157-162 - [c11]Chao Shen, Shichao Pei, Tianwen Yu, Xiaohong Guan:
On motion sensors as source for user input inference in smartphones. ISBA 2015: 1-6 - [c10]Siyun Chen, Ting Liu, Yadong Zhou, Chao Shen, Feng Gao, Yulin Che, Zhanbo Xu:
SHE: Smart home energy management system based on social and motion behavior cognition. SmartGridComm 2015: 859-864 - 2014
- [j3]Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45: 156-171 (2014) - [j2]Zhongmin Cai, Chao Shen, Xiaohong Guan:
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach. IEEE Trans. Hum. Mach. Syst. 44(2): 244-255 (2014) - [c9]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen, Zijiang Yang:
Directed test suite augmentation via exploiting program dependency. CSTVA 2014: 1-6 - 2013
- [j1]Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:
User Authentication Through Mouse Dynamics. IEEE Trans. Inf. Forensics Secur. 8(1): 16-30 (2013) - [c8]Zhongmin Cai, Chao Shen, Miao Wang, Yunpeng Song, Jialin Wang:
Mobile Authentication through Touch-Behavior Features. CCBR 2013: 386-393 - [c7]Chao Shen, Roy A. Maxion, Zhongmin Cai:
A Study of the Consistency in Keystroke Dynamics. CCBR 2013: 409-416 - [c6]Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:
On User Interaction Behavior as Evidence for Computer Forensic Analysis. IWDW 2013: 221-231 - 2012
- [c5]Chao Shen, Zhongmin Cai, Roy A. Maxion, Guang Xiang, Xiaohong Guan:
Comparing classification algorithm for mouse dynamics based user identification. BTAS 2012: 61-66 - [c4]Chao Shen, Zhongmin Cai, Xiaohong Guan:
Continuous authentication for mouse dynamics: A pattern-growth approach. DSN 2012: 1-12 - [c3]Chao Shen, Zhongmin Cai, Xiaohong Guan, Jialin Wang:
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. ICB 2012: 378-383 - 2011
- [c2]Chao Shen, Zhongmin Cai, Xiaohong Guan:
Poster: can it be more practical?: improving mouse dynamics biometric performance. CCS 2011: 853-856
2000 – 2009
- 2009
- [c1]Chao Shen, Zhongmin Cai, Xiaohong Guan, Huilan Sha, Jingzi Du:
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. ICC 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint