Personal information

Activities

Works (50 of 53)

Items per page:
Page 1 of 2

Fault detection filtering for nonlinear switched systems via event-triggered communication approach

Automatica
2019 | Journal article
EID:

2-s2.0-85059571199

Contributors: Liu, X.; Su, X.; Shi, P.; Nguang, S.K.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Integrated Security Threats and Defense of Cyber-physical Systems,信息物理融合系统综合安全威胁与防御研究

Zidonghua Xuebao/Acta Automatica Sinica
2019 | Journal article
EID:

2-s2.0-85064246939

Contributors: Liu, T.; Tian, J.; Wang, J.-Z.; Wu, H.-Y.; Sun, L.-M.; Zhou, Y.-D.; Shen, C.; Guan, X.-H.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

A Dynamic Multiobjective Optimization Algorithm with a New Prediction Model,使用新预测模型的动态多目标优化算法

Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University
2018 | Journal article
EID:

2-s2.0-85059625081

Contributors: Li, Z.; Li, Y.; He, L.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Adaptive human-machine interactive behavior analysis with wrist-worn devices for password inference

IEEE Transactions on Neural Networks and Learning Systems
2018 | Journal article
EID:

2-s2.0-85047206827

Contributors: Shen, C.; Chen, Y.; Liu, Y.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Big-data analysis of multi-source logs for anomaly detection on network-based system

IEEE International Conference on Automation Science and Engineering
2018 | Conference paper
EID:

2-s2.0-85044955840

Contributors: Jia, Z.; Shen, C.; Yi, X.; Chen, Y.; Yu, T.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Digger: Detect similar groups in heterogeneous social networks

ACM Transactions on Knowledge Discovery from Data
2018 | Journal article
EID:

2-s2.0-85059551271

Contributors: Shen, C.; Zhou, Y.; Guan, X.; Liu, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

DivORAM: Towards a practical oblivious RAM with variable block size

Information Sciences
2018 | Journal article
EID:

2-s2.0-85044306505

Contributors: Liu, Z.; Huang, Y.; Li, J.; Cheng, X.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition

IEEE Transactions on Industrial Informatics
2018 | Journal article
EID:

2-s2.0-85043385905

Contributors: Liu, Z.; Wu, Z.; Li, T.; Li, J.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Hand-Interactive Behavior Analysis for User Authentication Systems with Wrist-Worn Devices

2018 International Conference on Information, Cybernetics, and Computational Social Systems, ICCSS 2018
2018 | Conference paper
EID:

2-s2.0-85060315409

Contributors: Shen, C.; Lv, Q.; Wang, Z.; Chen, Y.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks

IEEE Wireless Communications
2018 | Journal article
EID:

2-s2.0-85059834911

Contributors: Shen, C.; Liu, C.; Tan, H.; Wang, Z.; Xu, D.; Su, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Multi-source interactive behavior analysis for continuous user authentication on smartphones

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85051962578

Contributors: Liu, X.; Shen, C.; Chen, Y.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication

IEEE Transactions on Information Forensics and Security
2018 | Journal article
EID:

2-s2.0-85029001138

Contributors: Shen, C.; Li, Y.; Chen, Y.; Guan, X.; Maxion, R.A.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis

Information Sciences
2018 | Journal article
EID:

2-s2.0-85037527240

Contributors: Shen, C.; Chen, Y.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis

IEEE Transactions on Systems, Man, and Cybernetics: Systems
2018 | Journal article
EID:

2-s2.0-85045324544

Contributors: Shen, C.; Chen, Y.; Yang, G.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks

IEEE Transactions on Systems, Man, and Cybernetics: Systems
2018 | Journal article
EID:

2-s2.0-85046466452

Contributors: Liu, X.; Shen, C.; Guan, X.; Zhou, Y.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

A feasible graph partition framework for parallel computing of big graph

Knowledge-Based Systems
2017 | Journal article
EID:

2-s2.0-85026788841

Contributors: Liu, X.; Zhou, Y.; Guan, X.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Dependence Guided Symbolic Execution

IEEE Transactions on Software Engineering
2017 | Journal article
EID:

2-s2.0-85018502021

Contributors: Wang, H.; Liu, T.; Guan, X.; Shen, C.; Zheng, Q.; Yang, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85032670818

Contributors: Wang, Z.; Shen, C.; Chen, Y.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Modeling interactive sensor-behavior with smartphones for implicit and active user authentication

2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017
2017 | Conference paper
EID:

2-s2.0-85022216257

Contributors: Chen, Y.; Shen, C.; Wang, Z.; Yu, T.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Modeling multimodal biometric modalities for continuous user authentication

2016 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2016 - Conference Proceedings
2017 | Conference paper
EID:

2-s2.0-85015728416

Contributors: Shen, C.; Zhang, H.; Yang, Z.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Nonlinear adaptive command-filtered backstepping controller design for three-phase grid-connected solar photovoltaic with unknown parameters

Proceedings - 2017 Chinese Automation Congress, CAC 2017
2017 | Conference paper
EID:

2-s2.0-85050342933

Contributors: Xu, D.; Wang, G.; Yan, W.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

On using wearable devices to steal your passwords: A fuzzy inference approach

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85034230600

Contributors: Shen, C.; Ren, Z.; Chen, Y.; Wang, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Passive fingerprinting for wireless devices: A multi-level decision approach

2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017
2017 | Conference paper
EID:

2-s2.0-85022181223

Contributors: Shen, C.; Lu, R.; Samizade, S.; He, L.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System

IEEE Transactions on Dependable and Secure Computing
2017 | Journal article
EID:

2-s2.0-85033677119

Contributors: Shen, C.; Chen, Y.; Guan, X.; Maxion, R.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition

IEEE Access
2017 | Journal article
EID:

2-s2.0-85018482837

Contributors: Chen, Y.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection

ACM International Conference Proceeding Series
2017 | Conference paper
EID:

2-s2.0-85021249681

Contributors: He, L.; Li, Z.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

A human-centered smart home system with wearable-sensor behavior analysis

IEEE International Conference on Automation Science and Engineering
2016 | Conference paper
EID:

2-s2.0-85001086063

Contributors: Ji, J.; Liu, T.; Shen, C.; Wu, H.; Liu, W.; Su, M.; Chen, S.; Jia, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Handedness recognition through keystroke-typing behavior in computer forensics analysis

Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
2016 | Conference paper
EID:

2-s2.0-85015237195

Contributors: Shen, C.; Xu, H.; Wang, H.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Motion-senor behavior analysis for continuous authentication on smartphones

Proceedings of the World Congress on Intelligent Control and Automation (WCICA)
2016 | Conference paper
EID:

2-s2.0-84991676936

Contributors: Shen, C.; Li, Y.; Yu, T.; Yuan, S.; Yi, X.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System

IEEE Transactions on Human-Machine Systems
2016 | Journal article
EID:

2-s2.0-84971492726

Contributors: Shen, C.; Cai, Z.; Liu, X.; Guan, X.; Maxion, R.A.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

On motion-sensor behavior analysis for human-activity recognition via smartphones

ISBA 2016 - IEEE International Conference on Identity, Security and Behavior Analysis
2016 | Conference paper
EID:

2-s2.0-84977603123

Contributors: Shen, C.; Chen, Y.; Yang, G.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance analysis of motion-sensor behavior for user authentication on smartphones

Sensors (Switzerland)
2016 | Journal article
EID:

2-s2.0-84960419974

Contributors: Shen, C.; Yu, T.; Yuan, S.; Li, Y.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

SHE: Smart home energy management system based on social and motion behavior cognition

2015 IEEE International Conference on Smart Grid Communications, SmartGridComm 2015
2016 | Conference paper
EID:

2-s2.0-84964963354

Contributors: Chen, S.; Liu, T.; Zhou, Y.; Shen, C.; Gao, F.; Che, Y.; Xu, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Smart home energy optimization based on cognition of wearable devices sensor data

Jisuanji Yanjiu yu Fazhan/Computer Research and Development
2016 | Journal article
EID:

2-s2.0-84963568083

Contributors: Chen, S.; Liu, T.; Shen, C.; Su, M.; Gao, F.; Xu, Z.; Shi, J.; Jia, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

User practice in password security: An empirical study of real-life passwords in the wild

Computers and Security
2016 | Journal article
EID:

2-s2.0-84974573978

Contributors: Shen, C.; Yu, T.; Xu, H.; Yang, G.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection

Future Generation Computer Systems
2015 | Journal article
EID:

2-s2.0-84928820166

Contributors: Liu, T.; Sun, Y.; Liu, Y.; Gui, Y.; Zhao, Y.; Wang, D.; Shen, C.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Input extraction via motion-sensor behavior analysis on smartphones

Computers and Security
2015 | Journal article
EID:

2-s2.0-84937041393

Contributors: Shen, C.; Pei, S.; Yang, Z.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

On motion sensors as source for user input inference in smartphones

2015 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015
2015 | Conference paper
EID:

2-s2.0-84942543979

Contributors: Shen, C.; Pei, S.; Yu, T.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Touch-interaction behavior for continuous user authentication on smartphones

Proceedings of 2015 International Conference on Biometrics, ICB 2015
2015 | Conference paper
EID:

2-s2.0-84943223459

Contributors: Shen, C.; Zhang, Y.; Cai, Z.; Yu, T.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Directed test suite augmentation via exploiting program dependency

6th International Workshop on Constraints in Software Testing, Verification, and Analysis, CSTVA 2014 - Proceedings
2014 | Conference paper
EID:

2-s2.0-84942411968

Contributors: Wang, H.; Guan, X.; Zheng, Q.; Liu, T.; Shen, C.; Yang, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids

Energies
2014 | Journal article
EID:

2-s2.0-84896974419

Contributors: Wang, D.; Guan, X.; Liu, T.; Gu, Y.; Shen, C.; Xu, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach

IEEE Transactions on Human-Machine Systems
2014 | Journal article
EID:

2-s2.0-84897907010

Contributors: Cai, Z.; Shen, C.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

On user interaction behavior as evidence for computer forensic analysis

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84904736628

Contributors: Shen, C.; Cai, Z.; Maxion, R.A.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Performance evaluation of anomaly-detection algorithms for mouse dynamics

Computers and Security
2014 | Journal article
EID:

2-s2.0-84903274611

Contributors: Shen, C.; Cai, Z.; Guan, X.; Maxion, R.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

A study of the consistency in keystroke dynamics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893115664

Contributors: Shen, C.; Maxion, R.A.; Cai, Z.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Mobile authentication through touch-behavior features

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893081166

Contributors: Cai, Z.; Shen, C.; Wang, M.; Song, Y.; Wang, J.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

User authentication through mouse dynamics

IEEE Transactions on Information Forensics and Security
2013 | Journal article
EID:

2-s2.0-84872030531

Contributors: Shen, C.; Cai, Z.; Guan, X.; Du, Y.; Maxion, R.A.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Comparing classification algorithm for mouse dynamics based user identification

2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012
2012 | Conference paper
EID:

2-s2.0-84871998894

Contributors: Shen, C.; Cai, Z.; Maxion, R.A.; Xiang, G.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

Continuous authentication for mouse dynamics: A pattern-growth approach

Proceedings of the International Conference on Dependable Systems and Networks
2012 | Conference paper
EID:

2-s2.0-84866685939

Contributors: Shen, C.; Cai, Z.; Guan, X.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier

On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study

Proceedings - 2012 5th IAPR International Conference on Biometrics, ICB 2012
2012 | Conference paper
EID:

2-s2.0-84866789762

Contributors: Shen, C.; Cai, Z.; Guan, X.; Wang, J.
Source: Self-asserted source
Chao Shen via Scopus - Elsevier
Items per page:
Page 1 of 2