Follow
Chao Shen
Chao Shen
Professor, Xi'an Jiaotong University
Verified email at cmu.edu - Homepage
Title
Cited by
Cited by
Year
Performance analysis of smartphone-sensor behavior for human activity recognition
Y Chen, C Shen
Ieee Access 5, 3095-3110, 2017
3112017
A review of deep reinforcement learning for smart building energy management
L Yu, S Qin, M Zhang, C Shen, T Jiang, X Guan
IEEE Internet of Things Journal 8 (15), 12046-12063, 2021
2242021
Multi-agent deep reinforcement learning for HVAC control in commercial buildings
L Yu, Y Sun, Z Xu, C Shen, D Yue, T Jiang, X Guan
IEEE Transactions on Smart Grid 12 (1), 407-419, 2020
2172020
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
2092012
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2018
1832018
GMM and CNN hybrid method for short utterance speaker recognition
Z Liu, Z Wu, T Li, J Li, C Shen
IEEE Transactions on Industrial informatics 14 (7), 3244-3252, 2018
1622018
Static output feedback control of switched nonlinear systems with actuator faults
M Zhang, P Shi, C Shen, ZG Wu
IEEE Transactions on Fuzzy Systems 28 (8), 1600-1609, 2019
1392019
Fault detection filtering for nonlinear switched systems via event-triggered communication approach
X Liu, X Su, P Shi, SK Nguang, C Shen
Automatica 101, 365-376, 2019
1332019
Continuous authentication for mouse dynamics: A pattern-growth approach
C Shen, Z Cai, X Guan
IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012
1332012
Event-triggered sliding mode control of nonlinear dynamic systems
X Liu, X Su, P Shi, C Shen, Y Peng
Automatica 112, 108738, 2020
1212020
Performance analysis of touch-interaction behavior for active smartphone authentication
C Shen, Y Zhang, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015
1092015
Abnormal traffic-indexed state estimation: A cyber–physical fusion approach for smart grid attack detection
T Liu, Y Sun, Y Liu, Y Gui, Y Zhao, D Wang, C Shen
Future Generation Computer Systems 49, 94-103, 2015
1032015
Deep learning on mobile and embedded devices: State-of-the-art, challenges, and future directions
Y Chen, B Zheng, Z Zhang, Q Wang, C Shen, Q Zhang
ACM Computing Surveys (CSUR) 53 (4), 1-37, 2020
982020
Seeing is not believing: Camouflage attacks on image scaling algorithms
Q Xiao, Y Chen, C Shen, Y Chen, K Li
28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019
952019
User practice in password security: An empirical study of real-life passwords in the wild
C Shen, T Yu, H Xu, G Yang, X Guan
Computers & Security 61, 130-141, 2016
952016
Dissipative filtering for switched fuzzy systems with missing measurements
M Zhang, C Shen, ZG Wu, D Zhang
IEEE transactions on cybernetics 50 (5), 1931-1940, 2019
882019
Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids
D Wang, X Guan, T Liu, Y Gu, C Shen, Z Xu
Energies 7 (3), 1517-1538, 2014
872014
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020
862020
Audee: Automated testing for deep learning frameworks
Q Guo, X Xie, Y Li, X Zhang, Y Liu, X Li, C Shen
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
762020
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis
C Shen, Y Chen, X Guan
Information Sciences 430, 538-553, 2018
742018
The system can't perform the operation now. Try again later.
Articles 1–20