Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhongmin Cai
@article{DBLP:journals/eswa/NiuWSC23, author = {Hongfeng Niu and Ang Wei and Yunpeng Song and Zhongmin Cai}, title = {Exploring visual representations of computer mouse movements for bot detection using deep learning approaches}, journal = {Expert Syst. Appl.}, volume = {229}, number = {Part {A}}, pages = {120225}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120225}, doi = {10.1016/J.ESWA.2023.120225}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/NiuWSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/ZhuSSC23, author = {Rongrong Zhu and Liang Shi and Yunpeng Song and Zhongmin Cai}, title = {Integrating Gaze and Mouse Via Joint Cross-Attention Fusion Net for Students' Activity Recognition in E-learning}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {7}, number = {3}, pages = {145:1--145:35}, year = {2023}, url = {https://doi.org/10.1145/3610876}, doi = {10.1145/3610876}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/ZhuSSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/SongBWC23, author = {Yunpeng Song and Yiheng Bian and Xiaorui Wang and Zhongmin Cai}, title = {Learning from User-driven Events to Generate Automation Sequences}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {7}, number = {4}, pages = {177:1--177:22}, year = {2023}, url = {https://doi.org/10.1145/3631427}, doi = {10.1145/3631427}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imwut/SongBWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HeSZC23, author = {Ziyao He and Yunpeng Song and Shurui Zhou and Zhongmin Cai}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {Interaction of Thoughts: Towards Mediating Task Assignment in Human-AI Cooperation with a Capability-Aware Shared Mental Model}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {353:1--353:18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3580983}, doi = {10.1145/3544548.3580983}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HeSZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-11190, author = {Yunpeng Song and Yiheng Bian and Yongtao Tang and Zhongmin Cai}, title = {Navigating Interfaces with {AI} for Enhanced User Interaction}, journal = {CoRR}, volume = {abs/2312.11190}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.11190}, doi = {10.48550/ARXIV.2312.11190}, eprinttype = {arXiv}, eprint = {2312.11190}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-11190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/SongC22, author = {Yunpeng Song and Zhongmin Cai}, title = {Integrating Handcrafted Features with Deep Representations for Smartphone Authentication}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {6}, number = {1}, pages = {27:1--27:27}, year = {2022}, url = {https://doi.org/10.1145/3517332}, doi = {10.1145/3517332}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/SongC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taffco/ZhaoMC22, author = {Yinghui Zhao and Danmin Miao and Zhongmin Cai}, title = {Reading Personality Preferences From Motion Patterns in Computer Mouse Operations}, journal = {{IEEE} Trans. Affect. Comput.}, volume = {13}, number = {3}, pages = {1619--1636}, year = {2022}, url = {https://doi.org/10.1109/TAFFC.2020.3023296}, doi = {10.1109/TAFFC.2020.3023296}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taffco/ZhaoMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/WangDZCS21, author = {Hang Wang and Youtian Du and Guangxun Zhang and Zhongmin Cai and Chang Su}, title = {Learning Fundamental Visual Concepts Based on Evolved Multi-Edge Concept Graph}, journal = {{IEEE} Trans. Multim.}, volume = {23}, pages = {4400--4413}, year = {2021}, url = {https://doi.org/10.1109/TMM.2020.3042072}, doi = {10.1109/TMM.2020.3042072}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/WangDZCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbr/NiuCZC21, author = {Hongfeng Niu and Jiading Chen and Zhaozhe Zhang and Zhongmin Cai}, editor = {Jianjiang Feng and Junping Zhang and Manhua Liu and Yuchun Fang}, title = {Mouse Dynamics Based Bot Detection Using Sequence Learning}, booktitle = {Biometric Recognition - 15th Chinese Conference, {CCBR} 2021, Shanghai, China, September 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12878}, pages = {49--56}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86608-2\_6}, doi = {10.1007/978-3-030-86608-2\_6}, timestamp = {Tue, 14 Sep 2021 19:09:36 +0200}, biburl = {https://dblp.org/rec/conf/ccbr/NiuCZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/DongDC20, author = {Jianmin Dong and Youtian Du and Zhongmin Cai}, title = {Gender recognition using motion data from multiple smart devices}, journal = {Expert Syst. Appl.}, volume = {147}, pages = {113195}, year = {2020}, url = {https://doi.org/10.1016/j.eswa.2020.113195}, doi = {10.1016/J.ESWA.2020.113195}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/DongDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SongHCH20, author = {Yunpeng Song and Yun Huang and Zhongmin Cai and Jason I. Hong}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376585}, doi = {10.1145/3313831.3376585}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SongHCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/MaoCZG19, author = {Weixuan Mao and Zhongmin Cai and Bo Zeng and Xiaohong Guan}, title = {Learning edge weights in file co-occurrence graphs for malware detection}, journal = {Data Min. Knowl. Discov.}, volume = {33}, number = {1}, pages = {168--203}, year = {2019}, url = {https://doi.org/10.1007/s10618-018-0593-7}, doi = {10.1007/S10618-018-0593-7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/MaoCZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/Cai19, author = {Zhongmin Cai}, title = {Security and confidentiality of network communication using chaotic encryption technology}, journal = {J. Comput. Methods Sci. Eng.}, volume = {19}, number = {4}, pages = {1083--1092}, year = {2019}, url = {https://doi.org/10.3233/JCM-193840}, doi = {10.3233/JCM-193840}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/Cai19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/SongFCHD19, author = {Yunpeng Song and Cori Faklaris and Zhongmin Cai and Jason I. Hong and Laura Dabbish}, title = {Normal and Easy: Account Sharing Practices in the Workplace}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {3}, number = {{CSCW}}, pages = {83:1--83:25}, year = {2019}, url = {https://doi.org/10.1145/3359185}, doi = {10.1145/3359185}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/SongFCHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbr/WeiZC19, author = {Ang Wei and Yuxuan Zhao and Zhongmin Cai}, editor = {Zhenan Sun and Ran He and Jianjiang Feng and Shiguang Shan and Zhenhua Guo}, title = {A Deep Learning Approach to Web Bot Detection Using Mouse Behavioral Biometrics}, booktitle = {Biometric Recognition - 14th Chinese Conference, {CCBR} 2019, Zhuzhou, China, October 12-13, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11818}, pages = {388--395}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31456-9\_43}, doi = {10.1007/978-3-030-31456-9\_43}, timestamp = {Fri, 26 Jan 2024 21:32:19 +0100}, biburl = {https://dblp.org/rec/conf/ccbr/WeiZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoCYSG18, author = {Weixuan Mao and Zhongmin Cai and Yuan Yang and Xiaohong Shi and Xiaohong Guan}, title = {From big data to knowledge: {A} spatio-temporal approach to malware detection}, journal = {Comput. Secur.}, volume = {74}, pages = {167--183}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.005}, doi = {10.1016/J.COSE.2017.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoCYSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangCWZ18, author = {Yuan Yang and Zhongmin Cai and Chunyan Wang and Junjie Zhang}, title = {Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2913--2928}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833048}, doi = {10.1109/TIFS.2018.2833048}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangCWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoCTFG17, author = {Weixuan Mao and Zhongmin Cai and Don Towsley and Qian Feng and Xiaohong Guan}, title = {Security importance assessment for system objects and malware detection}, journal = {Comput. Secur.}, volume = {68}, pages = {47--68}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.02.009}, doi = {10.1016/J.COSE.2017.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoCTFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cvi/DongCD17, author = {Jianmin Dong and Zhongmin Cai and Shaoyi Du}, title = {Improvement of affine iterative closest point algorithm for partial registration}, journal = {{IET} Comput. Vis.}, volume = {11}, number = {2}, pages = {135--144}, year = {2017}, url = {https://doi.org/10.1049/iet-cvi.2016.0058}, doi = {10.1049/IET-CVI.2016.0058}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cvi/DongCD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/YangCY17, author = {Zhihai Yang and Zhongmin Cai and Yuan Yang}, title = {Spotting anomalous ratings for rating systems by analyzing target users and items}, journal = {Neurocomputing}, volume = {240}, pages = {25--46}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.02.052}, doi = {10.1016/J.NEUCOM.2017.02.052}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/YangCY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/YangC17, author = {Zhihai Yang and Zhongmin Cai}, title = {Detecting abnormal profiles in collaborative filtering recommender systems}, journal = {J. Intell. Inf. Syst.}, volume = {48}, number = {3}, pages = {499--518}, year = {2017}, url = {https://doi.org/10.1007/s10844-016-0424-5}, doi = {10.1007/S10844-016-0424-5}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/YangC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/KelishomiCS17, author = {Aghil Esmaeili Kelishomi and Zhongmin Cai and Mohammad Hossein Shayesteh}, title = {Tracking user information using motion data through smartphones}, booktitle = {2017 {IEEE} International Joint Conference on Biometrics, {IJCB} 2017, Denver, CO, USA, October 1-4, 2017}, pages = {286--293}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BTAS.2017.8272709}, doi = {10.1109/BTAS.2017.8272709}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/KelishomiCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongCZ17, author = {Yunpeng Song and Zhongmin Cai and Zhi{-}Li Zhang}, title = {Multi-touch Authentication Using Hand Geometry and Behavioral Information}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {357--372}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.54}, doi = {10.1109/SP.2017.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SongCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangC16, author = {Zhihai Yang and Zhongmin Cai}, title = {Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {16--26}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040102}, doi = {10.4018/IJDCF.2016040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/YangXCX16, author = {Zhihai Yang and Lin Xu and Zhongmin Cai and Zongben Xu}, title = {Re-scale AdaBoost for attack detection in collaborative filtering recommender systems}, journal = {Knowl. Based Syst.}, volume = {100}, pages = {74--88}, year = {2016}, url = {https://doi.org/10.1016/j.knosys.2016.02.008}, doi = {10.1016/J.KNOSYS.2016.02.008}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/YangXCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/YangCG16, author = {Zhihai Yang and Zhongmin Cai and Xiaohong Guan}, title = {Estimating user behavior toward detecting anomalous ratings in rating systems}, journal = {Knowl. Based Syst.}, volume = {111}, pages = {144--158}, year = {2016}, url = {https://doi.org/10.1016/j.knosys.2016.08.011}, doi = {10.1016/J.KNOSYS.2016.08.011}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/YangCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/thms/ShenCLGM16, author = {Chao Shen and Zhongmin Cai and Xiaomei Liu and Xiaohong Guan and Roy A. Maxion}, title = {MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System}, journal = {{IEEE} Trans. Hum. Mach. Syst.}, volume = {46}, number = {5}, pages = {734--748}, year = {2016}, url = {https://doi.org/10.1109/THMS.2016.2558623}, doi = {10.1109/THMS.2016.2558623}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/thms/ShenCLGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbr/DongC16, author = {Jianmin Dong and Zhongmin Cai}, editor = {Zhisheng You and Jie Zhou and Yunhong Wang and Zhenan Sun and Shiguang Shan and Wei{-}Shi Zheng and Jianjiang Feng and Qijun Zhao}, title = {User Authentication Using Motion Sensor Data from Both Wearables and Smartphones}, booktitle = {Biometric Recognition - 11th Chinese Conference, {CCBR} 2016, Chengdu, China, October 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9967}, pages = {756--764}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46654-5\_83}, doi = {10.1007/978-3-319-46654-5\_83}, timestamp = {Thu, 12 Jan 2023 09:26:21 +0100}, biburl = {https://dblp.org/rec/conf/ccbr/DongC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/DuDXBC16, author = {Shaoyi Du and Jianmin Dong and Guanglin Xu and Bo Bi and Zhongmin Cai}, title = {An Improvement of Affine Iterative Closest Point Algorithm for Partial Registration}, booktitle = {Proceedings of the International Conference on Internet Multimedia Computing and Service, {ICIMCS} 2016, Xi'an, China, August 19 - 21, 2016}, pages = {72--75}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007669.3007681}, doi = {10.1145/3007669.3007681}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icimcs/DuDXBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/YangCC16, author = {Zhihai Yang and Zhongmin Cai and Xinyuan Chen}, editor = {Bin Cui and Nan Zhang and Jianliang Xu and Xiang Lian and Dexi Liu}, title = {Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems}, booktitle = {Web-Age Information Management - 17th International Conference, {WAIM} 2016, Nanchang, China, June 3-5, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9659}, pages = {3--14}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39958-4\_1}, doi = {10.1007/978-3-319-39958-4\_1}, timestamp = {Sat, 09 Apr 2022 12:35:07 +0200}, biburl = {https://dblp.org/rec/conf/waim/YangCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/YangCMY15, author = {Yuan Yang and Zhongmin Cai and Weixuan Mao and Zhihai Yang}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {307--326}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_16}, doi = {10.1007/978-3-319-20550-2\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/YangCMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/ShenZCYG15, author = {Chao Shen and Yong Zhang and Zhongmin Cai and Tianwen Yu and Xiaohong Guan}, title = {Touch-interaction behavior for continuous user authentication on smartphones}, booktitle = {International Conference on Biometrics, {ICB} 2015, Phuket, Thailand, 19-22 May, 2015}, pages = {157--162}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICB.2015.7139046}, doi = {10.1109/ICB.2015.7139046}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icb/ShenZCYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/YangC15, author = {Zhihai Yang and Zhongmin Cai}, title = {Defending Suspected Users by Exploiting Specific Distance Metric in Collaborative Filtering Recommender Systems}, booktitle = {{IEEE} International Conference on Data Mining Workshop, {ICDMW} 2015, Atlantic City, NJ, USA, November 14-17, 2015}, pages = {1001--1006}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDMW.2015.89}, doi = {10.1109/ICDMW.2015.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/YangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaoCTG15, author = {Weixuan Mao and Zhongmin Cai and Don Towsley and Xiaohong Guan}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Probabilistic Inference on Integrity for Access Behavior Based Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {155--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_8}, doi = {10.1007/978-3-319-26362-5\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaoCTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YangXC15, author = {Zhihai Yang and Lin Xu and Zhongmin Cai}, title = {Re-scale AdaBoost for Attack Detection in Collaborative Filtering Recommender Systems}, journal = {CoRR}, volume = {abs/1506.04584}, year = {2015}, url = {http://arxiv.org/abs/1506.04584}, eprinttype = {arXiv}, eprint = {1506.04584}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YangXC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenCGM14, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan and Roy A. Maxion}, title = {Performance evaluation of anomaly-detection algorithms for mouse dynamics}, journal = {Comput. Secur.}, volume = {45}, pages = {156--171}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.05.002}, doi = {10.1016/J.COSE.2014.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/thms/CaiSG14, author = {Zhongmin Cai and Chao Shen and Xiaohong Guan}, title = {Mitigating Behavioral Variability for Mouse Dynamics: {A} Dimensionality-Reduction-Based Approach}, journal = {{IEEE} Trans. Hum. Mach. Syst.}, volume = {44}, number = {2}, pages = {244--255}, year = {2014}, url = {https://doi.org/10.1109/THMS.2014.2302371}, doi = {10.1109/THMS.2014.2302371}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/thms/CaiSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaoCGT14, author = {Weixuan Mao and Zhongmin Cai and Xiaohong Guan and Don Towsley}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Centrality metrics of importance in access behaviors and malware detections}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {376--385}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664286}, doi = {10.1145/2664243.2664286}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MaoCGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChuGCG13, author = {Weibo Chu and Xiaohong Guan and Zhongmin Cai and Lixin Gao}, title = {Real-time volume control for interactive network traffic replay}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1611--1629}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.012}, doi = {10.1016/J.COMNET.2013.02.012}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChuGCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/DuLCG13, author = {Youtian Du and Qian Li and Zhongmin Cai and Xiaohong Guan}, title = {Multi-view semi-supervised web image classification via co-graph}, journal = {Neurocomputing}, volume = {122}, pages = {430--440}, year = {2013}, url = {https://doi.org/10.1016/j.neucom.2013.06.007}, doi = {10.1016/J.NEUCOM.2013.06.007}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/DuLCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jis/DuSCG13, author = {Youtian Du and Chang Su and Zhongmin Cai and Xiaohong Guan}, title = {Web page and image semi-supervised classification with heterogeneous information fusion}, journal = {J. Inf. Sci.}, volume = {39}, number = {3}, pages = {289--306}, year = {2013}, url = {https://doi.org/10.1177/0165551513477818}, doi = {10.1177/0165551513477818}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jis/DuSCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenCGDM13, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan and Youtian Du and Roy A. Maxion}, title = {User Authentication Through Mouse Dynamics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {16--30}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2223677}, doi = {10.1109/TIFS.2012.2223677}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenCGDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbr/CaiSWSW13, author = {Zhongmin Cai and Chao Shen and Miao Wang and Yunpeng Song and Jialin Wang}, editor = {Zhenan Sun and Shiguang Shan and Gongping Yang and Jie Zhou and Yunhong Wang and Yilong Yin}, title = {Mobile Authentication through Touch-Behavior Features}, booktitle = {Biometric Recognition - 8th Chinese Conference, {CCBR} 2013, Jinan, China, November 16-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8232}, pages = {386--393}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02961-0\_48}, doi = {10.1007/978-3-319-02961-0\_48}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccbr/CaiSWSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbr/ShenMC13, author = {Chao Shen and Roy A. Maxion and Zhongmin Cai}, editor = {Zhenan Sun and Shiguang Shan and Gongping Yang and Jie Zhou and Yunhong Wang and Yilong Yin}, title = {A Study of the Consistency in Keystroke Dynamics}, booktitle = {Biometric Recognition - 8th Chinese Conference, {CCBR} 2013, Jinan, China, November 16-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8232}, pages = {409--416}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02961-0\_51}, doi = {10.1007/978-3-319-02961-0\_51}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccbr/ShenMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChuZXGC13, author = {Weibo Chu and Bin B. Zhu and Feng Xue and Xiaohong Guan and Zhongmin Cai}, title = {Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {1990--1994}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654816}, doi = {10.1109/ICC.2013.6654816}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChuZXGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ChuGLCS13, author = {Weibo Chu and Xiaohong Guan and John C. S. Lui and Zhongmin Cai and Xiaohong Shi}, title = {Secure Cache Provision: Provable {DDOS} Prevention for Randomly Partitioned Services with Replication}, booktitle = {33rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013}, pages = {58--63}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCSW.2013.24}, doi = {10.1109/ICDCSW.2013.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ChuGLCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ShenCMG13, author = {Chao Shen and Zhongmin Cai and Roy A. Maxion and Xiaohong Guan}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {On User Interaction Behavior as Evidence for Computer Forensic Analysis}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {221--231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_16}, doi = {10.1007/978-3-662-43886-2\_16}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ShenCMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/ShenCMXG12, author = {Chao Shen and Zhongmin Cai and Roy A. Maxion and Guang Xiang and Xiaohong Guan}, title = {Comparing classification algorithm for mouse dynamics based user identification}, booktitle = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012}, pages = {61--66}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BTAS.2012.6374551}, doi = {10.1109/BTAS.2012.6374551}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/btas/ShenCMXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ShenCG12, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Continuous authentication for mouse dynamics: {A} pattern-growth approach}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263955}, doi = {10.1109/DSN.2012.6263955}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ShenCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/ShenCGW12, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan and Jialin Wang}, editor = {Anil K. Jain and Arun Ross and Salil Prabhakar and Jaihie Kim}, title = {On the effectiveness and applicability of mouse dynamics biometric for static authentication: {A} benchmark study}, booktitle = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New Delhi, India, March 29 - April 1, 2012}, pages = {378--383}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICB.2012.6199780}, doi = {10.1109/ICB.2012.6199780}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/ShenCGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ChuGGC12, author = {Weibo Chu and Xiaohong Guan and Lixin Gao and Zhongmin Cai}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {Model-based real-time volume control for interactive network traffic replay}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {163--170}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6211895}, doi = {10.1109/NOMS.2012.6211895}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/ChuGGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShenCG11, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: can it be more practical?: improving mouse dynamics biometric performance}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {853--856}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093510}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShenCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChuGCC10, author = {Weibo Chu and Xiaohong Guan and Zhongmin Cai and Mingxu Chen}, title = {Balance Based Performance Enhancement for Interactive {TCP} Traffic Replay}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501960}, doi = {10.1109/ICC.2010.5501960}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChuGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/DuGC10, author = {Youtian Du and Xiaohong Guan and Zhongmin Cai}, title = {Enhancing Web Page Classification via Local Co-training}, booktitle = {20th International Conference on Pattern Recognition, {ICPR} 2010, Istanbul, Turkey, 23-26 August 2010}, pages = {2905--2908}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPR.2010.712}, doi = {10.1109/ICPR.2010.712}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/DuGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ShenCGSD09, author = {Chao Shen and Zhongmin Cai and Xiaohong Guan and Huilan Sha and Jingzi Du}, title = {Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199032}, doi = {10.1109/ICC.2009.5199032}, timestamp = {Fri, 15 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ShenCGSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/CaiGSPS03, author = {Zhongmin Cai and Xiaohong Guan and Ping Shao and Qingke Peng and Guoji Sun}, title = {A rough set theory based method for anomaly intrusion detection in computer network systems}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {20}, number = {5}, pages = {251--259}, year = {2003}, url = {https://doi.org/10.1111/1468-0394.00249}, doi = {10.1111/1468-0394.00249}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/CaiGSPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.