Follow
Mimi Wang
Title
Cited by
Cited by
Year
A novel multivariate time-series anomaly detection approach using an unsupervised deep neural network
P Zhao, X Chang, M Wang
IEEE Access 9, 109025-109041, 2021
432021
Behavior consistency computation for workflow nets with unknown correspondence
M Wang, G Liu, P Zhao, C Yan, C Jiang
IEEE/CAA Journal of Automatica Sinica 5 (1), 281-291, 2017
332017
Behavior analysis for electronic commerce trading systems: A survey
P Zhao, Z Ding, M Wang, R Cao
IEEE Access 7, 108703-108728, 2019
262019
Measurement and computation of profile similarity of workflow nets based on behavioral relation matrix
M Wang, Z Ding, G Liu, C Jiang, M Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3628-3645, 2018
222018
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users
H Zhang, C Yan, P Zhao, M Wang
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
172016
A dynamic data slice approach to the vulnerability analysis of e-commerce systems
M Wang, Z Ding, P Zhao, W Yu, C Jiang
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3598-3612, 2018
162018
A behavioral authentication method for mobile gesture against resilient user posture
Q Liu, M Wang, P Zhao, C Yan, Z Ding
2016 3rd International Conference on Systems and Informatics (ICSAI), 324-331, 2016
152016
A kind of mouse behavior authentication method on dynamic soft keyboard
L Ma, C Yan, P Zhao, M Wang
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
152016
A kind of identity authentication method based on browsing behaviors
J Zhong, C Yan, W Yu, P Zhao, M Wang
2014 Seventh International Symposium on Computational Intelligence and …, 2014
142014
A behavioral authentication method for mobile based on browsing behaviors
D Chen, Z Ding, C Yan, M Wang
IEEE/CAA Journal of Automatica Sinica 7 (6), 1528-1541, 2019
122019
A continuous identity verification method based on free-text keystroke dynamics
X Song, P Zhao, M Wang, C Yan
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
92016
Modeling and vulnerable points analysis for e-commerce transaction system with a known attack
M Wang, G Liu, C Yan, C Jiang
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2016
82016
A method for security evaluation in cloud computing based on petri behavioral profiles
X Fang, M Wang, S Wu
Proceedings of The Eighth International Conference on Bio-Inspired Computing …, 2013
72013
Behavior consistency analysis based on the behavior profile about transition multi-set of Petri Net
X Fang, M Wang, Z Yin
Przegląd Elektrotechniczny 89 (1b), 171-173, 2013
62013
Mobile behavior trusted certification based on multivariate behavior sequences
P Zhao, M Wang
Neurocomputing 419, 203-214, 2021
52021
Vulnerability evaluation method for E-commerce transaction systems with unobservable transitions
M Wang, Z Ding, P Zhao
IEEE Access 8, 101035-101048, 2020
42020
A Kind of Authentication Method based on User Web Browsing Features
M Ji, P Zhao, M Wang, C Yan, Z Li, C Jiang
International Journal of Machine Learning and Computing 7 (2), 18-23, 2017
42017
Computation of secure consistency for real systems
M Wang, G Liu, C Jiang, C Yan
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2016
42016
The analysis of change region about networked control system based on the behavior profile
X Liu, M Wang, L Liu
Proceedings of The Eighth International Conference on Bio-Inspired Computing …, 2013
42013
A process-profile-based method to measure consistency of E-commerce system
M Wang, Z Ding, C Jiang, P Zhao
IEEE Access 6, 25100-25109, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20