Zhongmin Cai
Zhongmin Cai
Verified email at - Homepage
Cited by
Cited by
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
Continuous authentication for mouse dynamics: A pattern-growth approach
C Shen, Z Cai, X Guan
IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012
Re-scale AdaBoost for attack detection in collaborative filtering recommender systems
Z Yang, L Xu, Z Cai, Z Xu
Knowledge-Based Systems 100, 74-88, 2016
Multi-touch authentication using hand geometry and behavioral information
Y Song, Z Cai, ZL Zhang
2017 IEEE symposium on security and privacy (SP), 357-372, 2017
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs
W Chu, BB Zhu, F Xue, X Guan, Z Cai
2013 IEEE international conference on communications (ICC), 1990-1994, 2013
Estimating user behavior toward detecting anomalous ratings in rating systems
Z Yang, Z Cai, X Guan
Knowledge-Based Systems 111, 144-158, 2016
Feature analysis of mouse dynamics in identity authentication and monitoring
C Shen, Z Cai, X Guan, H Sha, J Du
2009 IEEE International Conference on Communications, 1-5, 2009
Performance evaluation of anomaly-detection algorithms for mouse dynamics
C Shen, Z Cai, X Guan, R Maxion
computers & security 45, 156-171, 2014
A rough set theory based method for anomaly intrusion detection in computer network systems
Z Cai, X Guan, P Shao, Q Peng, G Sun
Expert Systems 20 (5), 251-259, 2003
I'm all eyes and ears: Exploring effective locators for privacy awareness in IoT scenarios
Y Song, Y Huang, Z Cai, JI Hong
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Security importance assessment for system objects and malware detection
W Mao, Z Cai, D Towsley, Q Feng, X Guan
Computers & Security 68, 47-68, 2017
A performance comparison of the ad hoc network protocols
Q Feng, Z Cai, J Yang, X Hu
2009 Second International Workshop on Computer Science and Engineering 2 …, 2009
Touch-interaction behavior for continuous user authentication on smartphones
C Shen, Y Zhang, Z Cai, T Yu, X Guan
2015 International Conference on Biometrics (ICB), 157-162, 2015
Detecting abnormal profiles in collaborative filtering recommender systems
Z Yang, Z Cai
Journal of Intelligent Information Systems 48, 499-518, 2017
Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach
Z Cai, C Shen, X Guan
IEEE Transactions on Human-Machine Systems 44 (2), 244-255, 2014
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study
C Shen, Z Cai, X Guan, J Wang
2012 5th IAPR International Conference on Biometrics (ICB), 378-383, 2012
Spotting anomalous ratings for rating systems by analyzing target users and items
Z Yang, Z Cai, Y Yang
Neurocomputing 240, 25-46, 2017
Mobile authentication through touch-behavior features
Z Cai, C Shen, M Wang, Y Song, J Wang
Biometric Recognition: 8th Chinese Conference, CCBR 2013, Jinan, China …, 2013
A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring
C Shen, Z Cai, X Guan, J Cai
2010 IEEE International Conference on Information Theory and Information …, 2010
Normal and easy: Account sharing practices in the workplace
Y Song, C Faklaris, Z Cai, JI Hong, L Dabbish
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-25, 2019
The system can't perform the operation now. Try again later.
Articles 1–20