Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction C Jiang, Y Fang, P Zhao, J Panneerselvam IEEE Transactions on Industrial Informatics 16 (10), 6652-6662, 2020 | 45 | 2020 |
A novel multivariate time-series anomaly detection approach using an unsupervised deep neural network P Zhao, X Chang, M Wang IEEE Access 9, 109025-109041, 2021 | 43 | 2021 |
Behavior consistency computation for workflow nets with unknown correspondence M Wang, G Liu, P Zhao, C Yan, C Jiang IEEE/CAA Journal of Automatica Sinica 5 (1), 281-291, 2017 | 33 | 2017 |
Behavior analysis for electronic commerce trading systems: A survey P Zhao, Z Ding, M Wang, R Cao IEEE Access 7, 108703-108728, 2019 | 26 | 2019 |
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users H Zhang, C Yan, P Zhao, M Wang 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 17 | 2016 |
A dynamic data slice approach to the vulnerability analysis of e-commerce systems M Wang, Z Ding, P Zhao, W Yu, C Jiang IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3598-3612, 2018 | 16 | 2018 |
A behavioral authentication method for mobile gesture against resilient user posture Q Liu, M Wang, P Zhao, C Yan, Z Ding 2016 3rd International Conference on Systems and Informatics (ICSAI), 324-331, 2016 | 15 | 2016 |
A kind of mouse behavior authentication method on dynamic soft keyboard L Ma, C Yan, P Zhao, M Wang 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 15 | 2016 |
A kind of identity authentication method based on browsing behaviors J Zhong, C Yan, W Yu, P Zhao, M Wang 2014 Seventh International Symposium on Computational Intelligence and …, 2014 | 14 | 2014 |
Authenticating web user’s identity through browsing sequences modeling P Zhao, C Yan, C Jiang 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW …, 2016 | 13 | 2016 |
A continuous identity verification method based on free-text keystroke dynamics X Song, P Zhao, M Wang, C Yan 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 8 | 2016 |
Mobile behavior trusted certification based on multivariate behavior sequences P Zhao, M Wang Neurocomputing 419, 203-214, 2021 | 5 | 2021 |
Vulnerability evaluation method for E-commerce transaction systems with unobservable transitions M Wang, Z Ding, P Zhao IEEE Access 8, 101035-101048, 2020 | 4 | 2020 |
A kind of authentication method based on user web browsing features M Ji, P Zhao, M Wang, C Yan, Z Li, C Jiang International Journal of Machine Learning and Computing 7 (2), 18-23, 2017 | 4 | 2017 |
A process-profile-based method to measure consistency of E-commerce system M Wang, Z Ding, C Jiang, P Zhao IEEE Access 6, 25100-25109, 2018 | 3 | 2018 |
基于键盘行为进行用户识别的方法与应用 王昱杰, 赵培海, 王咪咪 计算机科学 42 (11), 203-207, 2015 | 2 | 2015 |
Keystroke dynamics in password authentication for multi-user account X Zhang, P Zhao, M Wang Journal of Computational Information Systems, 2015 | 2 | 2015 |
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance M Wang, X He, P Zhao 2022 IEEE International Conference on Big Data (Big Data), 431-436, 2022 | 1 | 2022 |
A measure consistency method for overlapping correspondence of workflow nets based on relation profiles partner matrix M Wang, P Zhao IEEE Access 9, 79766-79775, 2021 | 1 | 2021 |
Method for measuring user behavior consistency degree based on complex correspondence system C Jiang, H Chen, C Yan, Z Ding, M Wang, P Zhao US Patent App. 15/325,184, 2017 | 1 | 2017 |