关注
Yufei Chen
Yufei Chen
在 cityu.edu.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Performance analysis of smartphone-sensor behavior for human activity recognition
Y Chen, C Shen
Ieee Access 5, 3095-3110, 2017
3232017
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017
1952017
Seeing is not believing: Camouflage attacks on image scaling algorithms
Q Xiao, Y Chen, C Shen, Y Chen, K Li
28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019
1002019
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis
C Shen, Y Chen, X Guan
Information Sciences 430, 538-553, 2018
782018
Property inference attacks against GANs
J Zhou, Y Chen, C Shen, Y Zhang
arXiv preprint arXiv:2111.07608, 2021
522021
Pattern-growth based mining mouse-interaction behavior for an active user authentication system
C Shen, Y Chen, X Guan, RA Maxion
IEEE transactions on dependable and secure computing 17 (2), 335-349, 2017
462017
On motion-sensor behavior analysis for human-activity recognition via smartphones
C Shen, Y Chen, G Yang
2016 Ieee International Conference on Identity, Security and Behavior …, 2016
442016
Big-data analysis of multi-source logs for anomaly detection on network-based system
Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan
2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017
372017
Can we mitigate backdoor attack using adversarial detection methods?
K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu
IEEE Transactions on Dependable and Secure Computing 20 (4), 2867-2881, 2022
32*2022
FairNeuron: improving deep neural network fairness with adversary games on selective neurons
X Gao, J Zhai, S Ma, C Shen, Y Chen, Q Wang
Proceedings of the 44th International Conference on Software Engineering …, 2022
242022
Toward hand-dominated activity recognition systems with wristband-interaction behavior analysis
C Shen, Y Chen, G Yang, X Guan
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (7), 2501-2511, 2018
212018
Amplifying membership exposure via data poisoning
Y Chen, C Shen, Y Shen, C Wang, Y Zhang
Advances in Neural Information Processing Systems 35, 29830-29844, 2022
202022
Teacher model fingerprinting attacks against transfer learning
Y Chen, C Shen, C Wang, Y Zhang
31st USENIX Security Symposium (USENIX Security 22), 3593-3610, 2022
192022
Multi-source interactive behavior analysis for continuous user authentication on smartphones
X Liu, C Shen, Y Chen
Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China …, 2018
142018
Scaling camouflage: Content disguising attack against computer vision applications
Y Chen, C Shen, C Wang, Q Xiao, K Li, Y Chen
IEEE Transactions on Dependable and Secure Computing 18 (5), 2017-2028, 2020
122020
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication
Y Chen, C Shen, Z Wang, T Yu
2017 IEEE International Conference on Identity, Security and Behavior …, 2017
112017
Handwaving authentication: Unlocking your smartwatch through handwaving biometrics
Z Wang, C Shen, Y Chen
Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China …, 2017
112017
Waving gesture analysis for user authentication in the mobile environment
C Shen, Z Wang, C Si, Y Chen, X Su
IEEE Network 34 (2), 57-63, 2020
102020
Adaptive human–machine interactive behavior analysis with wrist-worn devices for password inference
C Shen, Y Chen, Y Liu, X Guan
IEEE Transactions on Neural Networks and Learning Systems 29 (12), 6292-6302, 2018
72018
When deep learning meets differential privacy: Privacy, security, and more
X Li, Y Chen, C Wang, C Shen
IEEE Network 35 (6), 148-155, 2021
42021
系统目前无法执行此操作,请稍后再试。
文章 1–20