Selected Publications

请查阅如下页面见最新的论文列表For the full publications:

https://scholar.google.com/citations?user=m6QY7-wAAAAJ&hl=en

 

书籍 Book / Book Chpater: 

  1. 沈超. 移动终端交互行为分析的身份主动认证,《互联网安全的40个智慧洞见(2016年)》,人民邮电出版社,2017年1月。

2020:

  1. Lingchen, Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, and Pengfei Hu. Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection, IEEE Transactions on Dependable Secure Computing, 2020.
  2. Yufei Chen, Chao Shen*, Cong Wang, Qixue Xiao, Kang Li, Yu Chen, Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications, IEEE Transactions on Dependable Secure Computing, 2020, (DOI: 10.1109/TDSC.2020.2971601).
  3. Chao Shen, Yufei Chen, Xiaohong Guan, Roy Maxion, Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System, IEEE Transactions on Dependable Secure Computingvol. 17, no. 2, pp. 335 - 349, 2020.
  4. Chao Shen, Zhao Wang, Chengxiang Si, Yufei Chen, and Xiaojie Su, Waving Gesture Analysis for User Authentication in the Mobile Environment. IEEE Network, 2020.
  5. Saeid Samizade, Chao Shen*, Chengxiang Si, Xiaohong Guan. Passive browser identification with multi-scale Convolutional Neural Networks, Neurocomputing, 2020.
  6. Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan. Adversarial Attack Detection for Deep Speech Recognition: Datasets and Algorithms. 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), 2020.
  7. Xinxin Liu, Xiaojie Su, Peng Shi, Chao Shen, Yan Peng, Event-triggered sliding mode control of nonlinear dynamic systems, Automatica, 2020.  

2019:

  1. Qixue Xiao, Yufei Chen, Chao Shen*, Yu Chen, Kang Li, Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. USENIX Security, 2019.
  2. Xiaoming Liu, Chao Shen*, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 2019.
  3. Meng Zhang, Chao Shen*, Zheng-Guang Wu, Dan Zhang, Dissipative filtering for switched fuzzy systems with missing measurements, IEEE Transactions on Cybernetics, 2019.
  4. Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using sparse representation to detect anomalies in complex WSNs, ACM Transactions on Intelligent Systems and Technology, 2019, 10 (6), 1-18  
  5. Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan, Adversarial Example Detection by Classification for Deep Speech Recognition, arXiv preprint arXiv:1910.10013, 2019.
  6. Meng Zhang, Peng Shi, Chao Shen*, Zheng-Guang Wu. Static output feedback control of switched nonlinear systems with actuator faults. IEEE Transactions on Fuzzy Systems, 2019.
  7. Xinxin Liu, Xiaojie Su, Peng Shi, Sing Kiong Nguang, Chao Shen. Fault detection filtering for nonlinear switched systems via event-triggered communication approach. Automatica, 2019.
  8. Xinxin Liu, Xiaojie Su, Peng Shi, Chao Shen. Observer-based sliding mode control for uncertain fuzzy systems via event-triggered strategy. IEEE Transactions on Fuzzy Systems, 2019.
  9. Liang He, Chao Shen*, Yun Li, A conditional-probability zone transformation coding method for categorical features, ACM Turing Celebration Conference-China, pp. 1-6. 2019.
  10. Meng Zhang, Chao Shen*, Zheng-Guang Wu, Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems, IEEE Transactions on Circuits and Systems II: Express Briefs, 2019.
  11. Yufei Chen, Chao Shen*, Xiaoyan Yu and Meng Zhang. MobiAware: Continuous User Behavior and Identity Awareness on Mobile Devices. ICICIC 2019 (Best Paper Award)
  12. Meng Zhang, Chao Shen*, Ning He, SiCong Han, Qi Li, Qian Wang, XiaoHong Guan. False data injection attacks against smart grid state estimation: Construction, detection and defense, Science China Technological Sciences, 2019.
  13. Yadong Zhou, Xukun Wang, Zhanbo Xu, Ying Su, Ting Liu, Chao Shen, Xiaohong Guan. A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment. IEEE 15th International Conference on Automation Science and Engineering (CASE), 2019.
  14. Meng Zhang, Chao Shen, Sicong Han. A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems. Chinese Control Conference, 2019.

 2018:

  1. Chao Shen, Yufei Chen, Yao Liu, Xiaohong Guan, Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference. IEEE Transactions on Neural Networks and Learning Systems, 2018 (DOI: 10.1109/TNNLS.2018.2829223)
  2. Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion, Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2018.01.01, 13(1): 48~62 (ESI高被引论文)
  3. Chao Shen, Yufei Chen, Gengshan Yang, Xiaohong Guan, Towards Hand-dominated Activity Recognition Systems with Wristband-Interaction Behavior Analysis, IEEE Transactions on Systems, Man and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2819026)
  4. Chao Shen, Qi Lv, Zhao Wang, Yufei Chen, Xiaohong Guan. Hand-Interactive Behavior Analysis for User Authentication Systems with Wrist-Worn Devices. IEEE ICCSS, 2018 (Best Paper Award)
  5. Xiaoming Liu, Chao Shen*, Xiaohong Guan, Yadong Zhou. Digger Detect Similar Groups in Heterogeneous Social Networks. ACM Transactions on Knowledge Discovery from Data, 2018.
  6. Xiaoming Liu, Chao Shen*, Xiaohong Guan, Yadong Zhou, We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2826555)
  7. Chao Shen, Chang Liu, Haoliang Tan, Zhao Wang, Dezhi Xu, Xiaojie Su. Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks. IEEE Wireless Communications, 2018.
  8. Chao Shen, Yufei Chen, Xiaohong Guan, Performance Evaluation of Implicit Smartphones Authentication via Sensor-behavior Analysis, Information Sciences, 2018.03, 430431: 538~553
  9. Xiaoming Liu, Chao Shen, Yingyue Fan, Xiaozi Liu, Yadong Zhou, Xiaohong Guan. A Co-Evolutionary Model for Inferring Online Social Network User Behaviors. IEEE SPAC, 2018 (Best Paper Award)
  10. Zheli Liu, Zhendong Wu, Tong Li, Jin Li, Chao Shen, GMM and CNN Hybrid Method for Short Utterance Speaker Recognition, IEEE Transactions on Industrial Informatics, 2018.03.05, 99: 1~1
  11. Q Zou, Y Wang, Q Wang, Y Zhao, Q Li, C Shen. Deep learning based gait recognition using smartphones in the wild. arXiv preprint arXiv:1811.00338, 2018.
  12. Zheli Liu, Yanyu Huang, Jin Li, Xianchun Cheng, Chao Shen, DivORAM: Towards a Practical Oblivious RAM with Variable Block Size, Information Sciences, 2018, 447: 1~11(ESI高被引论文)
  13. Liang He, Zhi Li, Chao Shen. Performance evaluation of an anomaly-detection algorithm for keystroke-typing based insider detection. Tsinghua Science and Technology 23 (5), 513-525, 2018.

2017:

  1. Chao Shen, Yufei Chen, Xiaohong Guan, Roy Maxion, Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System, IEEE Transactions on Dependable Secure Computing, 2017, (DOI: 10.1109/TDSC.2017.2771295)
  2. Chao Shen, Ruiyuan Lu, Saeid Samizade, Liang He, Passive Fingerprinting for Wireless Devices: A Multi-Level Decision Approach, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2017.2.22-2017.2.24 
  3. Chao Shen, Ziqiang Ren, Yufei Chen, Zhao Wang, On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach, International Symposium on Cyberspace Safety and Security, 2017.10.23-2017.10.25 
  4. Yufei Chen, Chao Shen*, Zhao Wang, Tianwen Yu, Modeling Interactive Sensor-Behavior with Smartphones for Implicit and Active User Authentication, IEEE International Conference on Identity, Security and Behavior Analysis(ISBA), 2017.2.22-2017.2.24 
  5. Liang He, Zhixiang Li, Chao Shen*, Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection, ACM TUR-C '17 Proceedings of the ACM Turing 50th Celebration Conference, 2017.5.12-2017.5.14 
  6. Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan. Big-data analysis of multi-source logs for anomaly detection on network-based system, 2017 13th IEEE Conference on Automation Science and Engineering (CASE).
  7. Y Chen, C Shen. Performance analysis of smartphone-sensor behavior for human activity recognition. IEEE Access 5, 3095-3110, 2017.
  8. Q Lyu, Z Kong, C Shen, T Yue. WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices. arXiv preprint arXiv:1710.07941, 2017.
  9. X Liu, Y Zhou, X Guan, C Shen. A feasible graph partition framework for parallel computing of big graph. Knowledge-Based Systems 134, 228-239, 2017.

2016 and before:

  1. Chao Shen, Yong Zhang, Xiaohong Guan, Roy A. Maxion, Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2016, 11(3): 498~513
  2. Chao Shen, Zhongmin Cai, Liu, Xiaomei, Guan, Xiaohong, Maxion, Roy A., MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System, IEEE Transactions on Human-Machine Systems, 2016.10, 46(5): 734~748
  3. Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion, User Authentication through Mouse Dynamics, IEEE Transactions on Information Forensics and Security, 2013, 8(1): 16~30
  4. Zhongmin Cai, Chao Shen, Xiaohong Guan, Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach, IEEE Transactions on Human-Machine Systems, 2014.4, 44(2): 44~255
  5. Chao Shen, Shichao Pei, Zhenyu Yang, Xiaohong Guan, Input extraction via motion-sensor behavior analysis on smartphones, Computers & Security, 2015.7.17, 53: 143~155
  6. Chao Shen, Yu, Tianwen, Xu, Haodi, Yang, Gengshan, Guan, Xiaohong, User practice in password security: An empirical study of real-life passwords in the wild, Computers & Security, 2016.8, 61: 130~141
  7. Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers & Security, 2014.9, 45: 156~171
  8. Haijun Wang, Ting Liu, Xiaohong Guan, Chao Shen, Qinghua Zheng, Zijiang Yang, Dependence Guided Symbolic Execution, IEEE Transactions on Software Engineering, 2017.3.1, 43(3): 252~271
  9. Dai Wang, Xiaohong Guan, Ting Liu, Yun Gu, Chao Shen, Zhanbo Xu, Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids, Energies, 2014.3, 7(3): 1517~1538
  10. Chao Shen, Zhongmin Cai, Xiaohong Guan,Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach , 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Boston, MA, 2012.6.25-2012.6.28  
  11. Chao Shen, Zhongmin Cai, Xiaohong Guan, Can it be more practical?: improving mouse dynamics biometric performance, Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, 2011.10.17-2011.10.21  

For the full publications:https://scholar.google.com/citations?user=m6QY7-wAAAAJ&hl=en