Tiantian Zhu
Cited by
Cited by
Autocog: Measuring the description-to-permission fidelity in android applications
Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild
T Zhu, Z Qu, H Xu, J Zhang, Z Shao, Y Chen, S Prabhakar, J Yang
IEEE Transactions on Mobile Computing 19 (2), 466-483, 2019
Beating the artificial chaos: fighting OSN spam using its own templates
T Zhu, H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, AN Choudhary
IEEE/ACM Transactions on Networking 24 (6), 3856-3869, 2016
Condition monitoring for the roller bearings of wind turbines under variable working conditions based on the fisher score and permutation entropy
L Fu, T Zhu, K Zhu, Y Yang
Energies 12 (16), 3085, 2019
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction
M Lv, Z Hong, L Chen, T Chen, T Zhu, S Ji
IEEE Transactions on Intelligent Transportation Systems, 2020
A Regional Photovoltaic Output Prediction Method Based on Hierarchical Clustering and the mRMR Criterion
L Fu, Y Yang, X Yao, X Jiao, T Zhu
Energies 12 (20), 3817, 2019
Machine learning helps improve diagnostic ability of subclinical keratoconus using Scheimpflug and OCT imaging modalities
C Shi, M Wang, T Zhu, Y Zhang, Y Ye, J Jiang, S Chen, F Lu, M Shen
Eye and Vision 7 (1), 1-12, 2020
CONAN: A Practical Real-time APT Detection System with High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Chen, Y Cheng, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing, 2020
A Hybrid Deep Learning System for Real-World Mobile User Authentication Using Motion Sensors
T Zhu, Z Weng, G Chen, L Fu
Sensors 20 (14), 3876, 2020
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Power quality disturbance recognition using VMD-based feature extraction and heuristic feature selection
L Fu, T Zhu, G Pan, S Chen, Q Zhong, Y Wei
Applied Sciences 9 (22), 4901, 2019
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering
T Zhu, L Fu, Q Liu, Z Lin, Y Chen, T Chen
IEEE Transactions on Information Forensics and Security 16, 553-568, 2020
ESPIALCOG: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment
T Zhu, Z Weng, Q Song, Y Chen, Q Liu, Y Chen, M Lv, T Chen
IEEE Transactions on Mobile Computing, 2020
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators
Z Weng, T Chen, T Zhu, H Dong, D Zhou, O Alfarraj
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network
M Lv, D Zeng, L Chen, T Chen, T Zhu, S Ji
IEEE Transactions on Mobile Computing, 2021
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation
T Chen, Z Weng, YP Chen, C Jin, M Lv, T Zhu, J Lin
Information Security and Cryptology: 16th International Conference, Inscrypt …, 2021
A Web Shell Detection Method Based on Multiview Feature Fusion
T Zhu, Z Weng, L Fu, L Ruan
Applied Sciences 10 (18), 6274, 2020
The system can't perform the operation now. Try again later.
Articles 1–17