Sledovat
Yufei Chen
Yufei Chen
E-mailová adresa ověřena na: cityu.edu.hk - Domovská stránka
Název
Citace
Citace
Rok
Performance analysis of smartphone-sensor behavior for human activity recognition
Y Chen, C Shen
Ieee Access 5, 3095-3110, 2017
3532017
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017
2122017
Seeing is not believing: Camouflage attacks on image scaling algorithms
Q Xiao, Y Chen, C Shen, Y Chen, K Li
28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019
1162019
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis
C Shen, Y Chen, X Guan
Information Sciences 430, 538-553, 2018
842018
Property inference attacks against GANs
J Zhou, Y Chen, C Shen, Y Zhang
NDSS, 2022
682022
Pattern-growth based mining mouse-interaction behavior for an active user authentication system
C Shen, Y Chen, X Guan, RA Maxion
IEEE transactions on dependable and secure computing 17 (2), 335-349, 2017
542017
FairNeuron: improving deep neural network fairness with adversary games on selective neurons
X Gao, J Zhai, S Ma, C Shen, Y Chen, Q Wang
Proceedings of the 44th International Conference on Software Engineering …, 2022
472022
On motion-sensor behavior analysis for human-activity recognition via smartphones
C Shen, Y Chen, G Yang
2016 Ieee International Conference on Identity, Security and Behavior …, 2016
452016
Big-data analysis of multi-source logs for anomaly detection on network-based system
Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan
2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017
402017
Can we mitigate backdoor attack using adversarial detection methods?
K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu
IEEE Transactions on Dependable and Secure Computing 20 (4), 2867-2881, 2022
39*2022
Amplifying membership exposure via data poisoning
Y Chen, C Shen, Y Shen, C Wang, Y Zhang
Advances in Neural Information Processing Systems 35, 29830-29844, 2022
312022
Teacher model fingerprinting attacks against transfer learning
Y Chen, C Shen, C Wang, Y Zhang
31st USENIX Security Symposium (USENIX Security 22), 3593-3610, 2022
262022
Toward hand-dominated activity recognition systems with wristband-interaction behavior analysis
C Shen, Y Chen, G Yang, X Guan
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (7), 2501-2511, 2018
222018
Intellectual property protection of DNN models
S Peng, Y Chen, J Xu, Z Chen, C Wang, X Jia
World Wide Web 26 (4), 1877-1911, 2023
162023
Security and privacy risk of artificial intelligence system
Y Chen, C Shen, Q Wang, Q Li, C Wang, S Ji, K Li, X Guan
Journal of Computer Research and Development 56 (10), 2135-2150, 2019
152019
Waving gesture analysis for user authentication in the mobile environment
C Shen, Z Wang, C Si, Y Chen, X Su
IEEE Network 34 (2), 57-63, 2020
142020
Scaling camouflage: Content disguising attack against computer vision applications
Y Chen, C Shen, C Wang, Q Xiao, K Li, Y Chen
IEEE Transactions on Dependable and Secure Computing 18 (5), 2017-2028, 2020
132020
Multi-source interactive behavior analysis for continuous user authentication on smartphones
X Liu, C Shen, Y Chen
Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China …, 2018
132018
Handwaving authentication: Unlocking your smartwatch through handwaving biometrics
Z Wang, C Shen, Y Chen
Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China …, 2017
122017
Adaptive human–machine interactive behavior analysis with wrist-worn devices for password inference
C Shen, Y Chen, Y Liu, X Guan
IEEE Transactions on Neural Networks and Learning Systems 29 (12), 6292-6302, 2018
102018
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20