A novel multivariate time-series anomaly detection approach using an unsupervised deep neural network P Zhao, X Chang, M Wang IEEE Access 9, 109025-109041, 2021 | 43 | 2021 |
Behavior consistency computation for workflow nets with unknown correspondence M Wang, G Liu, P Zhao, C Yan, C Jiang IEEE/CAA Journal of Automatica Sinica 5 (1), 281-291, 2017 | 33 | 2017 |
Behavior analysis for electronic commerce trading systems: A survey P Zhao, Z Ding, M Wang, R Cao IEEE Access 7, 108703-108728, 2019 | 26 | 2019 |
Measurement and computation of profile similarity of workflow nets based on behavioral relation matrix M Wang, Z Ding, G Liu, C Jiang, M Zhou IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3628-3645, 2018 | 22 | 2018 |
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users H Zhang, C Yan, P Zhao, M Wang 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 17 | 2016 |
A dynamic data slice approach to the vulnerability analysis of e-commerce systems M Wang, Z Ding, P Zhao, W Yu, C Jiang IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3598-3612, 2018 | 16 | 2018 |
A behavioral authentication method for mobile gesture against resilient user posture Q Liu, M Wang, P Zhao, C Yan, Z Ding 2016 3rd International Conference on Systems and Informatics (ICSAI), 324-331, 2016 | 15 | 2016 |
A kind of mouse behavior authentication method on dynamic soft keyboard L Ma, C Yan, P Zhao, M Wang 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 15 | 2016 |
A kind of identity authentication method based on browsing behaviors J Zhong, C Yan, W Yu, P Zhao, M Wang 2014 Seventh International Symposium on Computational Intelligence and …, 2014 | 14 | 2014 |
A behavioral authentication method for mobile based on browsing behaviors D Chen, Z Ding, C Yan, M Wang IEEE/CAA Journal of Automatica Sinica 7 (6), 1528-1541, 2019 | 12 | 2019 |
A continuous identity verification method based on free-text keystroke dynamics X Song, P Zhao, M Wang, C Yan 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 9 | 2016 |
Modeling and vulnerable points analysis for e-commerce transaction system with a known attack M Wang, G Liu, C Yan, C Jiang Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2016 | 8 | 2016 |
A method for security evaluation in cloud computing based on petri behavioral profiles X Fang, M Wang, S Wu Proceedings of The Eighth International Conference on Bio-Inspired Computing …, 2013 | 7 | 2013 |
Behavior consistency analysis based on the behavior profile about transition multi-set of Petri Net X Fang, M Wang, Z Yin Przegląd Elektrotechniczny 89 (1b), 171-173, 2013 | 6 | 2013 |
Mobile behavior trusted certification based on multivariate behavior sequences P Zhao, M Wang Neurocomputing 419, 203-214, 2021 | 5 | 2021 |
Vulnerability evaluation method for E-commerce transaction systems with unobservable transitions M Wang, Z Ding, P Zhao IEEE Access 8, 101035-101048, 2020 | 4 | 2020 |
A Kind of Authentication Method based on User Web Browsing Features M Ji, P Zhao, M Wang, C Yan, Z Li, C Jiang International Journal of Machine Learning and Computing 7 (2), 18-23, 2017 | 4 | 2017 |
Computation of secure consistency for real systems M Wang, G Liu, C Jiang, C Yan Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2016 | 4 | 2016 |
The analysis of change region about networked control system based on the behavior profile X Liu, M Wang, L Liu Proceedings of The Eighth International Conference on Bio-Inspired Computing …, 2013 | 4 | 2013 |
A process-profile-based method to measure consistency of E-commerce system M Wang, Z Ding, C Jiang, P Zhao IEEE Access 6, 25100-25109, 2018 | 3 | 2018 |