
Chao Shen 0001
Person information
- affiliation (PhD 2014): Xi'an Jiaotong University, School of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, China
Other persons with the same name
- Chao Shen — disambiguation page
- Chao Shen 0002
— Beijing University of Technology, College of Electronic Information and Control Engineering, China (and 1 more)
- Chao Shen 0003
— University of Victoria, Department of Mechanical Engineering / IESVic, BC, Canada
- Chao Shen 0004
— Beijing Jiaotong University, Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications, China (and 3 more)
- Chao Shen 0005 — Florida International University, School of Computing and Information Sciences, Miami, FL, USA
- Chao Shen 0006
— Hunan University, College of Electrical and Information Engineering, Changsha, China
- Chao Shen 0007 — Shanghai University, School of Computer Engineering and Science, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j35]Yadong Zhou, Tianyi Yue, Xiaoming Liu, Chao Shen, Lingling Tong, Zhihao Ding:
Payment-Guard: Detecting fraudulent in-app purchases in iOS system. Neurocomputing 422: 263-276 (2021) - [j34]Xiaoming Liu, Yu Lan, Yadong Zhou, Chao Shen, Xiaohong Guan:
A real-time explainable traffic collision inference framework based on probabilistic graph theory. Knowl. Based Syst. 212: 106442 (2021) - [j33]Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - 2020
- [j32]Xinxin Liu, Xiaojie Su, Peng Shi, Chao Shen, Yan Peng:
Event-triggered sliding mode control of nonlinear dynamic systems. Autom. 112 (2020) - [j31]Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang, Chao Shen, Qian Zhang:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. ACM Comput. Surv. 53(4): 84:1-84:37 (2020) - [j30]Saeid Samizade, Chao Shen
, Chengxiang Si, Xiaohong Guan:
Passive browser identification with multi-scale Convolutional Neural Networks. Neurocomputing 378: 238-247 (2020) - [j29]Chao Shen, Zhao Wang, Chengxiang Si, Yufei Chen, Xiaojie Su:
Waving Gesture Analysis for User Authentication in the Mobile Environment. IEEE Netw. 34(2): 57-63 (2020) - [j28]Meng Zhang
, Chao Shen
, Zheng-Guang Wu
:
Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems. IEEE Trans. Circuits Syst. II Express Briefs 67-II(10): 2039-2043 (2020) - [j27]Meng Zhang
, Chao Shen
, Zheng-Guang Wu
, Dan Zhang
:
Dissipative Filtering for Switched Fuzzy Systems With Missing Measurements. IEEE Trans. Cybern. 50(5): 1931-1940 (2020) - [j26]Chao Shen
, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. IEEE Trans. Dependable Secur. Comput. 17(2): 335-349 (2020) - [j25]Xiaoming Liu
, Chao Shen
, Wei Wang
, Xiaohong Guan:
CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection. IEEE Trans. Fuzzy Syst. 28(5): 806-817 (2020) - [j24]Meng Zhang
, Peng Shi
, Chao Shen
, Zheng-Guang Wu
:
Static Output Feedback Control of Switched Nonlinear Systems With Actuator Faults. IEEE Trans. Fuzzy Syst. 28(8): 1600-1609 (2020) - [j23]Chao Shen
, Yufei Chen
, Gengshan Yang, Xiaohong Guan:
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2501-2511 (2020) - [j22]Xiaoming Liu, Chao Shen
, Xiaohong Guan, Yadong Zhou:
We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2693-2704 (2020) - [c28]Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan:
Adversarial Example Detection by Classification for Deep Speech Recognition. ICASSP 2020: 3102-3106 - [i7]Qirui Li, Xiaoming Liu, Chao Shen, Xi Peng, Yadong Zhou, Xiaohong Guan:
Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach. CoRR abs/2003.06100 (2020) - [i6]Liang Yu, Yi Sun, Zhanbo Xu, Chao Shen, Dong Yue, Tao Jiang, Xiaohong Guan:
Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings. CoRR abs/2006.14156 (2020) - [i5]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020) - [i4]Liang Yu, Shuqi Qin, Meng Zhang, Chao Shen, Tao Jiang, Xiaohong Guan:
Deep Reinforcement Learning for Smart Building Energy Management: A Survey. CoRR abs/2008.05074 (2020) - [i3]Liang Yu, Zhen Gao, Shuqi Qin, Meng Zhang, Chao Shen, Xiaohong Guan, Dong Yue:
Deep Reinforcement Learning for Smart Grid Protection Against Coordinated Multistage Transmission Line Attacks. CoRR abs/2011.14526 (2020) - [i2]Yadong Zhou, Zhihao Ding, Xiaoming Liu, Chao Shen, Lingling Tong, Xiaohong Guan:
Infer-AVAE: An Attribute Inference Model Based on Adversarial Variational Autoencoder. CoRR abs/2012.15005 (2020)
2010 – 2019
- 2019
- [j21]Xinxin Liu
, Xiaojie Su, Peng Shi, Sing Kiong Nguang, Chao Shen
:
Fault detection filtering for nonlinear switched systems via event-triggered communication approach. Autom. 101: 365-376 (2019) - [j20]Xinxin Liu
, Xiaojie Su
, Peng Shi
, Chao Shen:
Observer-Based Sliding Mode Control for Uncertain Fuzzy Systems via Event-Triggered Strategy. IEEE Trans. Fuzzy Syst. 27(11): 2190-2201 (2019) - [j19]Xiaoming Liu, Chao Shen
, Xiaohong Guan, Yadong Zhou:
Digger: Detect Similar Groups in Heterogeneous Social Networks. ACM Trans. Knowl. Discov. Data 13(1): 2:1-2:27 (2019) - [c27]Yadong Zhou, Xukun Wang, Zhanbo Xu, Ying Su, Ting Liu, Chao Shen, Xiaohong Guan:
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment. CASE 2019: 739-744 - [c26]Qianqian Chen, Xiaojie Su, Jianxing Liu, Chao Shen:
Event-Triggered Output Feedback Control of Takagi-Sugeno Fuzzy Systems. CIS 2019: 383-386 - [c25]Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. USENIX Security Symposium 2019: 443-460 - [i1]Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan:
Adversarial Example Detection by Classification for Deep Speech Recognition. CoRR abs/1910.10013 (2019) - 2018
- [j18]Chao Shen
, Yufei Chen
, Xiaohong Guan:
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis. Inf. Sci. 430: 538-553 (2018) - [j17]Zheli Liu, Yanyu Huang
, Jin Li, Xiaochun Cheng
, Chao Shen
:
DivORAM: Towards a practical oblivious RAM with variable block size. Inf. Sci. 447: 1-11 (2018) - [j16]Chao Shen
, Yuanxun Li, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 13(1): 48-62 (2018) - [j15]Zheli Liu
, Zhendong Wu
, Tong Li
, Jin Li, Chao Shen
:
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Informatics 14(7): 3244-3252 (2018) - [j14]Chao Shen
, Yufei Chen
, Yao Liu, Xiaohong Guan:
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference. IEEE Trans. Neural Networks Learn. Syst. 29(12): 6292-6302 (2018) - [j13]Chao Shen
, Chang Liu, Haoliang Tan, Zhao Wang, Dezhi Xu, Xiaojie Su:
Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks. IEEE Wirel. Commun. 25(6): 26-31 (2018) - [c24]Xiaozi Liu, Chao Shen
, Yufei Chen
:
Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones. CCBR 2018: 669-677 - [c23]Xiaoming Liu, Chao Shen, Yingyue Fan, Xiaozi Liu, Yadong Zhou, Xiaohong Guan:
A Co-Evolutionary Model for Inferring Online Social Network User Behaviors. SPAC 2018: 85-90 - 2017
- [j12]Yufei Chen
, Chao Shen
:
Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition. IEEE Access 5: 3095-3110 (2017) - [j11]Xiaoming Liu, Yadong Zhou, Xiaohong Guan, Chao Shen
:
A feasible graph partition framework for parallel computing of big graph. Knowl. Based Syst. 134: 228-239 (2017) - [j10]Haijun Wang, Ting Liu
, Xiaohong Guan, Chao Shen
, Qinghua Zheng, Zijiang Yang:
Dependence Guided Symbolic Execution. IEEE Trans. Software Eng. 43(3): 252-271 (2017) - [c22]Liang He, Zhixiang Li, Chao Shen
:
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection. ACM TUR-C 2017: 32:1-32:7 - [c21]Zhanpei Jia, Chao Shen
, Xiao Yi, Yufei Chen
, Tianwen Yu, Xiaohong Guan:
Big-data analysis of multi-source logs for anomaly detection on network-based system. CASE 2017: 1136-1141 - [c20]Zhao Wang, Chao Shen
, Yufei Chen
:
Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics. CCBR 2017: 545-553 - [c19]Chao Shen
, Ziqiang Ren, Yufei Chen
, Zhao Wang:
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. CSS 2017: 494-502 - [c18]Yufei Chen
, Chao Shen
, Zhao Wang, Tianwen Yu:
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication. ISBA 2017: 1-6 - [c17]Chao Shen
, Ruiyuan Lu, Saeid Samizade, Liang He:
Passive fingerprinting for wireless devices: A multi-level decision approach. ISBA 2017: 1-6 - 2016
- [j9]Chao Shen
, Tianwen Yu, Haodi Xu, Gengshan Yang, Xiaohong Guan:
User practice in password security: An empirical study of real-life passwords in the wild. Comput. Secur. 61: 130-141 (2016) - [j8]Chao Shen
, Tianwen Yu, Sheng Yuan, Yunpeng Li, Xiaohong Guan:
Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 16(3): 345 (2016) - [j7]Chao Shen
, Zhongmin Cai, Xiaomei Liu, Xiaohong Guan, Roy A. Maxion:
MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Trans. Hum. Mach. Syst. 46(5): 734-748 (2016) - [j6]Chao Shen, Yong Zhang, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 498-513 (2016) - [c16]Jianting Ji, Ting Liu, Chao Shen
, Hongyu Wu
, Wenyi Liu, Man Su, Siyun Chen, Zhanpei Jia:
A human-centered smart home system with wearable-sensor behavior analysis. CASE 2016: 1112-1117 - [c15]Chao Shen
, Yufei Chen
, Gengshan Yang:
On motion-sensor behavior analysis for human-activity recognition via smartphones. ISBA 2016: 1-6 - [c14]Chao Shen
, He Zhang, Zhenyu Yang, Xiaohong Guan:
Modeling multimodal biometric modalities for continuous user authentication. SMC 2016: 1894-1899 - [c13]Chao Shen
, Haodi Xu, Haijun Wang, Xiaohong Guan:
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis. Trustcom/BigDataSE/ISPA 2016: 1054-1060 - 2015
- [j5]Chao Shen
, Shichao Pei, Zhenyu Yang, Xiaohong Guan:
Input extraction via motion-sensor behavior analysis on smartphones. Comput. Secur. 53: 143-155 (2015) - [j4]Ting Liu, Yanan Sun, Yang Liu, Yuhong Gui, Yucheng Zhao, Dai Wang, Chao Shen
:
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection. Future Gener. Comput. Syst. 49: 94-103 (2015) - [c12]Chao Shen
, Yong Zhang, Zhongmin Cai, Tianwen Yu, Xiaohong Guan:
Touch-interaction behavior for continuous user authentication on smartphones. ICB 2015: 157-162 - [c11]Chao Shen
, Shichao Pei, Tianwen Yu, Xiaohong Guan:
On motion sensors as source for user input inference in smartphones. ISBA 2015: 1-6 - [c10]Siyun Chen, Ting Liu, Yadong Zhou, Chao Shen
, Feng Gao, Yulin Che, Zhanbo Xu:
SHE: Smart home energy management system based on social and motion behavior cognition. SmartGridComm 2015: 859-864 - 2014
- [j3]Chao Shen
, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45: 156-171 (2014) - [j2]Zhongmin Cai, Chao Shen
, Xiaohong Guan:
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach. IEEE Trans. Hum. Mach. Syst. 44(2): 244-255 (2014) - [c9]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen
, Zijiang Yang:
Directed test suite augmentation via exploiting program dependency. CSTVA 2014: 1-6 - 2013
- [j1]Chao Shen
, Zhongmin Cai, Xiaohong Guan, Youtian Du
, Roy A. Maxion:
User Authentication Through Mouse Dynamics. IEEE Trans. Inf. Forensics Secur. 8(1): 16-30 (2013) - [c8]Zhongmin Cai, Chao Shen
, Miao Wang, Yunpeng Song, Jialin Wang:
Mobile Authentication through Touch-Behavior Features. CCBR 2013: 386-393 - [c7]Chao Shen
, Roy A. Maxion, Zhongmin Cai:
A Study of the Consistency in Keystroke Dynamics. CCBR 2013: 409-416 - [c6]Chao Shen
, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:
On User Interaction Behavior as Evidence for Computer Forensic Analysis. IWDW 2013: 221-231 - 2012
- [c5]Chao Shen
, Zhongmin Cai, Roy A. Maxion, Guang Xiang, Xiaohong Guan:
Comparing classification algorithm for mouse dynamics based user identification. BTAS 2012: 61-66 - [c4]Chao Shen
, Zhongmin Cai, Xiaohong Guan:
Continuous authentication for mouse dynamics: A pattern-growth approach. DSN 2012: 1-12 - [c3]Chao Shen
, Zhongmin Cai, Xiaohong Guan, Jialin Wang:
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. ICB 2012: 378-383 - 2011
- [c2]Chao Shen, Zhongmin Cai, Xiaohong Guan:
Poster: can it be more practical?: improving mouse dynamics biometric performance. CCS 2011: 853-856
2000 – 2009
- 2009
- [c1]Chao Shen, Zhongmin Cai, Xiaohong Guan, Huilan Sha, Jingzi Du:
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. ICC 2009: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-25 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint