User authentication through mouse dynamics C Shen, Z Cai, X Guan, Y Du, RA Maxion IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012 | 191 | 2012 |
Continuous authentication for mouse dynamics: A pattern-growth approach C Shen, Z Cai, X Guan IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012 | 138 | 2012 |
Re-scale AdaBoost for attack detection in collaborative filtering recommender systems Z Yang, L Xu, Z Cai, Z Xu Knowledge-Based Systems 100, 74-88, 2016 | 107 | 2016 |
Multi-touch authentication using hand geometry and behavioral information Y Song, Z Cai, ZL Zhang 2017 IEEE symposium on security and privacy (SP), 357-372, 2017 | 97 | 2017 |
Estimating user behavior toward detecting anomalous ratings in rating systems Z Yang, Z Cai, X Guan Knowledge-Based Systems 111, 144-158, 2016 | 73 | 2016 |
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs W Chu, BB Zhu, F Xue, X Guan, Z Cai 2013 IEEE international conference on communications (ICC), 1990-1994, 2013 | 70 | 2013 |
Feature analysis of mouse dynamics in identity authentication and monitoring C Shen, Z Cai, X Guan, H Sha, J Du 2009 IEEE International Conference on Communications, 1-5, 2009 | 56 | 2009 |
I'm all eyes and ears: Exploring effective locators for privacy awareness in iot scenarios Y Song, Y Huang, Z Cai, JI Hong Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 50 | 2020 |
Performance evaluation of anomaly-detection algorithms for mouse dynamics C Shen, Z Cai, X Guan, R Maxion computers & security 45, 156-171, 2014 | 48 | 2014 |
A rough set theory based method for anomaly intrusion detection in computer network systems Z Cai, X Guan, P Shao, Q Peng, G Sun Expert Systems 20 (5), 251-259, 2003 | 44 | 2003 |
Security importance assessment for system objects and malware detection W Mao, Z Cai, D Towsley, Q Feng, X Guan Computers & Security 68, 47-68, 2017 | 43 | 2017 |
A performance comparison of the ad hoc network protocols Q Feng, Z Cai, J Yang, X Hu 2009 Second International Workshop on Computer Science and Engineering 2 …, 2009 | 38 | 2009 |
Touch-interaction behavior for continuous user authentication on smartphones C Shen, Y Zhang, Z Cai, T Yu, X Guan 2015 International conference on biometrics (ICB), 157-162, 2015 | 37 | 2015 |
Detecting abnormal profiles in collaborative filtering recommender systems Z Yang, Z Cai Journal of Intelligent Information Systems 48, 499-518, 2017 | 31 | 2017 |
Youtian Du, and Roy A Maxion. User authentication through mouse dynamics C Shen, Z Cai, X Guan IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2013 | 31 | 2013 |
Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach Z Cai, C Shen, X Guan IEEE Transactions on Human-Machine Systems 44 (2), 244-255, 2014 | 30 | 2014 |
A deep learning approach to web bot detection using mouse behavioral biometrics A Wei, Y Zhao, Z Cai Biometric Recognition: 14th Chinese Conference, CCBR 2019, Zhuzhou, China …, 2019 | 28 | 2019 |
Spotting anomalous ratings for rating systems by analyzing target users and items Z Yang, Z Cai, Y Yang Neurocomputing 240, 25-46, 2017 | 27 | 2017 |
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study C Shen, Z Cai, X Guan, J Wang 2012 5th IAPR International Conference on Biometrics (ICB), 378-383, 2012 | 26 | 2012 |
Mobile authentication through touch-behavior features Z Cai, C Shen, M Wang, Y Song, J Wang Biometric Recognition: 8th Chinese Conference, CCBR 2013, Jinan, China …, 2013 | 25 | 2013 |