Performance analysis of smartphone-sensor behavior for human activity recognition Y Chen, C Shen Ieee Access 5, 3095-3110, 2017 | 336 | 2017 |
Performance analysis of multi-motion sensor behavior for active smartphone authentication C Shen, Y Li, Y Chen, X Guan, RA Maxion IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017 | 200 | 2017 |
Seeing is not believing: Camouflage attacks on image scaling algorithms Q Xiao, Y Chen, C Shen, Y Chen, K Li 28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019 | 109 | 2019 |
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis C Shen, Y Chen, X Guan Information Sciences 430, 538-553, 2018 | 79 | 2018 |
Property inference attacks against GANs J Zhou, Y Chen, C Shen, Y Zhang NDSS, 2022 | 57 | 2022 |
Pattern-growth based mining mouse-interaction behavior for an active user authentication system C Shen, Y Chen, X Guan, RA Maxion IEEE transactions on dependable and secure computing 17 (2), 335-349, 2017 | 50 | 2017 |
On motion-sensor behavior analysis for human-activity recognition via smartphones C Shen, Y Chen, G Yang 2016 Ieee International Conference on Identity, Security and Behavior …, 2016 | 45 | 2016 |
Big-data analysis of multi-source logs for anomaly detection on network-based system Z Jia, C Shen, X Yi, Y Chen, T Yu, X Guan 2017 13th IEEE conference on automation science and engineering (CASE), 1136 …, 2017 | 40 | 2017 |
FairNeuron: improving deep neural network fairness with adversary games on selective neurons X Gao, J Zhai, S Ma, C Shen, Y Chen, Q Wang Proceedings of the 44th International Conference on Software Engineering …, 2022 | 35 | 2022 |
Can we mitigate backdoor attack using adversarial detection methods? K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu IEEE Transactions on Dependable and Secure Computing 20 (4), 2867-2881, 2022 | 33* | 2022 |
Amplifying membership exposure via data poisoning Y Chen, C Shen, Y Shen, C Wang, Y Zhang Advances in Neural Information Processing Systems 35, 29830-29844, 2022 | 23 | 2022 |
Toward hand-dominated activity recognition systems with wristband-interaction behavior analysis C Shen, Y Chen, G Yang, X Guan IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (7), 2501-2511, 2018 | 22 | 2018 |
Teacher model fingerprinting attacks against transfer learning Y Chen, C Shen, C Wang, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 3593-3610, 2022 | 21 | 2022 |
Intellectual property protection of DNN models S Peng, Y Chen, J Xu, Z Chen, C Wang, X Jia World Wide Web 26 (4), 1877-1911, 2023 | 14 | 2023 |
Multi-source interactive behavior analysis for continuous user authentication on smartphones X Liu, C Shen, Y Chen Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China …, 2018 | 14 | 2018 |
Scaling camouflage: Content disguising attack against computer vision applications Y Chen, C Shen, C Wang, Q Xiao, K Li, Y Chen IEEE Transactions on Dependable and Secure Computing 18 (5), 2017-2028, 2020 | 13 | 2020 |
Waving gesture analysis for user authentication in the mobile environment C Shen, Z Wang, C Si, Y Chen, X Su IEEE Network 34 (2), 57-63, 2020 | 11 | 2020 |
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication Y Chen, C Shen, Z Wang, T Yu 2017 IEEE International Conference on Identity, Security and Behavior …, 2017 | 11 | 2017 |
Handwaving authentication: Unlocking your smartwatch through handwaving biometrics Z Wang, C Shen, Y Chen Biometric Recognition: 12th Chinese Conference, CCBR 2017, Shenzhen, China …, 2017 | 11 | 2017 |
Adaptive human–machine interactive behavior analysis with wrist-worn devices for password inference C Shen, Y Chen, Y Liu, X Guan IEEE Transactions on Neural Networks and Learning Systems 29 (12), 6292-6302, 2018 | 10 | 2018 |