Performance analysis of smartphone-sensor behavior for human activity recognition Y Chen, C Shen Ieee Access 5, 3095-3110, 2017 | 323 | 2017 |
Performance analysis of multi-motion sensor behavior for active smartphone authentication C Shen, Y Li, Y Chen, X Guan, RA Maxion IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017 | 195 | 2017 |
Seeing is not believing: Camouflage attacks on image scaling algorithms Q Xiao, Y Chen, C Shen, Y Chen, K Li 28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019 | 100 | 2019 |
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis C Shen, Y Chen, X Guan Information Sciences 430, 538-553, 2018 | 78 | 2018 |
Property inference attacks against GANs J Zhou, Y Chen, C Shen, Y Zhang arXiv preprint arXiv:2111.07608, 2021 | 52 | 2021 |
Pattern-growth based mining mouse-interaction behavior for an active user authentication system C Shen, Y Chen, X Guan, RA Maxion IEEE transactions on dependable and secure computing 17 (2), 335-349, 2017 | 46 | 2017 |
On motion-sensor behavior analysis for human-activity recognition via smartphones C Shen, Y Chen, G Yang 2016 Ieee International Conference on Identity, Security and Behavior …, 2016 | 44 | 2016 |
Big-data analysis of multi-source logs for anomaly detection on network-based system Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan 2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017 | 37 | 2017 |
Can we mitigate backdoor attack using adversarial detection methods? K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu IEEE Transactions on Dependable and Secure Computing 20 (4), 2867-2881, 2022 | 32* | 2022 |
FairNeuron: improving deep neural network fairness with adversary games on selective neurons X Gao, J Zhai, S Ma, C Shen, Y Chen, Q Wang Proceedings of the 44th International Conference on Software Engineering …, 2022 | 24 | 2022 |
Toward hand-dominated activity recognition systems with wristband-interaction behavior analysis C Shen, Y Chen, G Yang, X Guan IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (7), 2501-2511, 2018 | 21 | 2018 |
Amplifying membership exposure via data poisoning Y Chen, C Shen, Y Shen, C Wang, Y Zhang Advances in Neural Information Processing Systems 35, 29830-29844, 2022 | 20 | 2022 |
Teacher model fingerprinting attacks against transfer learning Y Chen, C Shen, C Wang, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 3593-3610, 2022 | 19 | 2022 |
Multi-source interactive behavior analysis for continuous user authentication on smartphones X Liu, C Shen, Y Chen Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China …, 2018 | 14 | 2018 |
Scaling camouflage: Content disguising attack against computer vision applications Y Chen, C Shen, C Wang, Q Xiao, K Li, Y Chen IEEE Transactions on Dependable and Secure Computing 18 (5), 2017-2028, 2020 | 12 | 2020 |
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication Y Chen, C Shen, Z Wang, T Yu 2017 IEEE International Conference on Identity, Security and Behavior …, 2017 | 11 | 2017 |
Handwaving authentication: Unlocking your smartwatch through handwaving biometrics Z Wang, C Shen, Y Chen Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China …, 2017 | 11 | 2017 |
Waving gesture analysis for user authentication in the mobile environment C Shen, Z Wang, C Si, Y Chen, X Su IEEE Network 34 (2), 57-63, 2020 | 10 | 2020 |
Adaptive human–machine interactive behavior analysis with wrist-worn devices for password inference C Shen, Y Chen, Y Liu, X Guan IEEE Transactions on Neural Networks and Learning Systems 29 (12), 6292-6302, 2018 | 7 | 2018 |
When deep learning meets differential privacy: Privacy, security, and more X Li, Y Chen, C Wang, C Shen IEEE Network 35 (6), 148-155, 2021 | 4 | 2021 |