Chao Shen
Chao Shen
Professor, Xi'an Jiaotong University
Verified email at - Homepage
Cited by
Cited by
Performance analysis of smartphone-sensor behavior for human activity recognition
Y Chen, C Shen
Ieee Access 5, 3095-3110, 2017
A review of deep reinforcement learning for smart building energy management
L Yu, S Qin, M Zhang, C Shen, T Jiang, X Guan
IEEE Internet of Things Journal 8 (15), 12046-12063, 2021
Multi-agent deep reinforcement learning for HVAC control in commercial buildings
L Yu, Y Sun, Z Xu, C Shen, D Yue, T Jiang, X Guan
IEEE Transactions on Smart Grid 12 (1), 407-419, 2020
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2018
GMM and CNN hybrid method for short utterance speaker recognition
Z Liu, Z Wu, T Li, J Li, C Shen
IEEE Transactions on Industrial informatics 14 (7), 3244-3252, 2018
Static output feedback control of switched nonlinear systems with actuator faults
M Zhang, P Shi, C Shen, ZG Wu
IEEE Transactions on Fuzzy Systems 28 (8), 1600-1609, 2019
Continuous authentication for mouse dynamics: A pattern-growth approach
C Shen, Z Cai, X Guan
IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012
Fault detection filtering for nonlinear switched systems via event-triggered communication approach
X Liu, X Su, P Shi, SK Nguang, C Shen
Automatica 101, 365-376, 2019
Event-triggered sliding mode control of nonlinear dynamic systems
X Liu, X Su, P Shi, C Shen, Y Peng
Automatica 112, 108738, 2020
Performance analysis of touch-interaction behavior for active smartphone authentication
C Shen, Y Zhang, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015
Abnormal traffic-indexed state estimation: A cyber–physical fusion approach for smart grid attack detection
T Liu, Y Sun, Y Liu, Y Gui, Y Zhao, D Wang, C Shen
Future Generation Computer Systems 49, 94-103, 2015
Deep learning on mobile and embedded devices: State-of-the-art, challenges, and future directions
Y Chen, B Zheng, Z Zhang, Q Wang, C Shen, Q Zhang
ACM Computing Surveys (CSUR) 53 (4), 1-37, 2020
User practice in password security: An empirical study of real-life passwords in the wild
C Shen, T Yu, H Xu, G Yang, X Guan
Computers & Security 61, 130-141, 2016
Seeing is not believing: Camouflage attacks on image scaling algorithms
Q Xiao, Y Chen, C Shen, Y Chen, K Li
28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020
Dissipative filtering for switched fuzzy systems with missing measurements
M Zhang, C Shen, ZG Wu, D Zhang
IEEE transactions on cybernetics 50 (5), 1931-1940, 2019
Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids
D Wang, X Guan, T Liu, Y Gu, C Shen, Z Xu
Energies 7 (3), 1517-1538, 2014
Veriml: Enabling integrity assurances and fair payments for machine learning as a service
L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng
IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021
Backdoorbench: A comprehensive benchmark of backdoor learning
B Wu, H Chen, M Zhang, Z Zhu, S Wei, D Yuan, C Shen
Advances in Neural Information Processing Systems 35, 10546-10559, 2022
The system can't perform the operation now. Try again later.
Articles 1–20