Follow
Peihai Zhao
Title
Cited by
Cited by
Year
Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction
C Jiang, Y Fang, P Zhao, J Panneerselvam
IEEE Transactions on Industrial Informatics 16 (10), 6652-6662, 2020
452020
A novel multivariate time-series anomaly detection approach using an unsupervised deep neural network
P Zhao, X Chang, M Wang
IEEE Access 9, 109025-109041, 2021
432021
Behavior consistency computation for workflow nets with unknown correspondence
M Wang, G Liu, P Zhao, C Yan, C Jiang
IEEE/CAA Journal of Automatica Sinica 5 (1), 281-291, 2017
332017
Behavior analysis for electronic commerce trading systems: A survey
P Zhao, Z Ding, M Wang, R Cao
IEEE Access 7, 108703-108728, 2019
262019
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users
H Zhang, C Yan, P Zhao, M Wang
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
172016
A dynamic data slice approach to the vulnerability analysis of e-commerce systems
M Wang, Z Ding, P Zhao, W Yu, C Jiang
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3598-3612, 2018
162018
A behavioral authentication method for mobile gesture against resilient user posture
Q Liu, M Wang, P Zhao, C Yan, Z Ding
2016 3rd International Conference on Systems and Informatics (ICSAI), 324-331, 2016
152016
A kind of mouse behavior authentication method on dynamic soft keyboard
L Ma, C Yan, P Zhao, M Wang
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
152016
A kind of identity authentication method based on browsing behaviors
J Zhong, C Yan, W Yu, P Zhao, M Wang
2014 Seventh International Symposium on Computational Intelligence and …, 2014
142014
Authenticating web user’s identity through browsing sequences modeling
P Zhao, C Yan, C Jiang
2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW …, 2016
132016
A continuous identity verification method based on free-text keystroke dynamics
X Song, P Zhao, M Wang, C Yan
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
82016
Mobile behavior trusted certification based on multivariate behavior sequences
P Zhao, M Wang
Neurocomputing 419, 203-214, 2021
52021
Vulnerability evaluation method for E-commerce transaction systems with unobservable transitions
M Wang, Z Ding, P Zhao
IEEE Access 8, 101035-101048, 2020
42020
A kind of authentication method based on user web browsing features
M Ji, P Zhao, M Wang, C Yan, Z Li, C Jiang
International Journal of Machine Learning and Computing 7 (2), 18-23, 2017
42017
A process-profile-based method to measure consistency of E-commerce system
M Wang, Z Ding, C Jiang, P Zhao
IEEE Access 6, 25100-25109, 2018
32018
基于键盘行为进行用户识别的方法与应用
王昱杰, 赵培海, 王咪咪
计算机科学 42 (11), 203-207, 2015
22015
Keystroke dynamics in password authentication for multi-user account
X Zhang, P Zhao, M Wang
Journal of Computational Information Systems, 2015
22015
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance
M Wang, X He, P Zhao
2022 IEEE International Conference on Big Data (Big Data), 431-436, 2022
12022
A measure consistency method for overlapping correspondence of workflow nets based on relation profiles partner matrix
M Wang, P Zhao
IEEE Access 9, 79766-79775, 2021
12021
Method for measuring user behavior consistency degree based on complex correspondence system
C Jiang, H Chen, C Yan, Z Ding, M Wang, P Zhao
US Patent App. 15/325,184, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20