Cikkek nyilvánosan hozzáférhető megbízással - Chao ShenTovábbi információ
Sehol sem hozzáférhető: 71
GMM and CNN hybrid method for short utterance speaker recognition
Z Liu, Z Wu, T Li, J Li, C Shen
IEEE Transactions on Industrial informatics 14 (7), 3244-3252, 2018
Megbízások: National Natural Science Foundation of China
Event-triggered sliding mode control of nonlinear dynamic systems
X Liu, X Su, P Shi, C Shen, Y Peng
Automatica 112, 108738, 2020
Megbízások: National Natural Science Foundation of China
Fault detection filtering for nonlinear switched systems via event-triggered communication approach
X Liu, X Su, P Shi, SK Nguang, C Shen
Automatica 101, 365-376, 2019
Megbízások: Australian Research Council, National Natural Science Foundation of China
User practice in password security: An empirical study of real-life passwords in the wild
C Shen, T Yu, H Xu, G Yang, X Guan
Computers & Security 61, 130-141, 2016
Megbízások: National Natural Science Foundation of China
Dissipative filtering for switched fuzzy systems with missing measurements
M Zhang, C Shen, ZG Wu, D Zhang
IEEE transactions on cybernetics 50 (5), 1931-1940, 2019
Megbízások: National Natural Science Foundation of China
Observer-based sliding mode control for uncertain fuzzy systems via event-triggered strategy
X Liu, X Su, P Shi, C Shen
IEEE Transactions on Fuzzy Systems 27 (11), 2190-2201, 2019
Megbízások: Australian Research Council, National Natural Science Foundation of China
Asynchronous observer-based control for exponential stabilization of Markov jump systems
M Zhang, C Shen, ZG Wu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (10), 2039-2043, 2019
Megbízások: National Natural Science Foundation of China
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks
C Shen, C Liu, H Tan, Z Wang, D Xu, X Su
IEEE Wireless Communications 25 (6), 26-31, 2018
Megbízások: National Natural Science Foundation of China
Interpreting adversarial examples in deep learning: A review
S Han, C Lin, C Shen, Q Wang, X Guan
ACM Computing Surveys 55 (14s), 1-38, 2023
Megbízások: National Natural Science Foundation of China
False data injection attacks against smart gird state estimation: Construction, detection and defense
M Zhang, C Shen, N He, SC Han, Q Li, Q Wang, XH Guan
Science China Technological Sciences 62 (12), 2077-2087, 2019
Megbízások: National Natural Science Foundation of China
Towards query-efficient adversarial attacks against automatic speech recognition systems
Q Wang, B Zheng, Q Li, C Shen, Z Ba
IEEE Transactions on Information Forensics and Security 16, 896-908, 2020
Megbízások: National Natural Science Foundation of China
Dependence guided symbolic execution
H Wang, T Liu, X Guan, C Shen, Q Zheng, Z Yang
IEEE Transactions on Software Engineering 43 (3), 252-271, 2016
Megbízások: US National Science Foundation, National Natural Science Foundation of China
Pattern-growth based mining mouse-interaction behavior for an active user authentication system
C Shen, Y Chen, X Guan, R Maxion
IEEE Transactions on Dependable and Secure Computing 17 (2), 335-349, 2020
Megbízások: US National Science Foundation, National Natural Science Foundation of China
Performance evaluation of anomaly-detection algorithms for mouse dynamics
C Shen, Z Cai, X Guan, R Maxion
computers & security 45, 156-171, 2014
Megbízások: National Natural Science Foundation of China
An automated multi-tab website fingerprinting attack
Q Yin, Z Liu, Q Li, T Wang, Q Wang, C Shen, Y Xu
IEEE Transactions on Dependable and Secure Computing 19 (6), 3656-3670, 2021
Megbízások: National Natural Science Foundation of China
On motion-sensor behavior analysis for human-activity recognition via smartphones
C Shen, Y Chen, G Yang
2016 Ieee International Conference on Identity, Security and Behavior …, 2016
Megbízások: National Natural Science Foundation of China
Input extraction via motion-sensor behavior analysis on smartphones
C Shen, S Pei, Z Yang, X Guan
Computers & Security 53, 143-155, 2015
Megbízások: National Natural Science Foundation of China
Anti-distillation backdoor attacks: Backdoors can really survive in knowledge distillation
Y Ge, Q Wang, B Zheng, X Zhuang, Q Li, C Shen, C Wang
Proceedings of the 29th ACM International Conference on Multimedia, 826-834, 2021
Megbízások: National Natural Science Foundation of China
Big-data analysis of multi-source logs for anomaly detection on network-based system
Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan
2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017
Megbízások: National Natural Science Foundation of China
Touch-interaction behavior for continuous user authentication on smartphones
C Shen, Y Zhang, Z Cai, T Yu, X Guan
2015 International conference on biometrics (ICB), 157-162, 2015
Megbízások: National Natural Science Foundation of China
A publikációs és a finanszírozási adatokat számítógépes program határozza meg, automatikusan.