Zhihao Shen

ORCID: 0000-0002-8389-3988
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Human Mobility and Location-Based Analysis
  • Biometric Identification and Security
  • Caching and Content Delivery
  • Green IT and Sustainability
  • Advanced Malware Detection Techniques
  • Traffic Prediction and Management Techniques
  • Innovative Human-Technology Interaction
  • IoT and Edge/Fog Computing
  • Digital Media Forensic Detection
  • Bone fractures and treatments
  • Vehicular Ad Hoc Networks (VANETs)
  • Indoor and Outdoor Localization Technologies
  • Age of Information Optimization
  • Interactive and Immersive Displays
  • Multimodal Machine Learning Applications
  • Recommender Systems and Techniques
  • Data Management and Algorithms
  • Robotics and Sensor-Based Localization
  • Space Satellite Systems and Control
  • Expert finding and Q&A systems
  • Inertial Sensor and Navigation
  • Sentiment Analysis and Opinion Mining
  • Automated Road and Building Extraction
  • Voice and Speech Disorders

Xi'an Jiaotong University
2019-2024

North China University of Science and Technology
2020

With the wide use of smartphones, more private data are collected and saved in smartphones. This raises higher requirements for secure effective user authentication scheme. Continuous leverages behavioral biometrics as identity information shows promising characteristics verification a continuous passive means. However, most studies require users to operate smartphones specific mobile application or perform user-defined touch operations. paper on wild, where it is hard characterize touching...

10.1109/tifs.2022.3160361 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

This paper aims to predict the apps a user will open on her mobile device next. Such an information is essential for many smartphone operations, e.g., app pre-loading and content pre-caching, save energy. However, it hard build explicit model that accurately depicts affecting factors their mechanism of time-varying usage behavior. presents deep reinforcement learning framework, named as DeepAPP, which learns model-free predictive neural network from historical data. Meanwhile, online...

10.1145/3356250.3360038 article EN 2019-11-05

Touch behavior biometric has been widely studied for continuous authentication on mobile devices, which provides a more secure in an implicit process. However, the existing touch biometric-based systems suffer from two issues. First, representation methods are hard to characterize operations under complex usage context. Second, accuracy of models is inclined degrade over time long-term real-life scenario due change data distribution caused by varying behavior. Toward this end, article, we...

10.1109/jiot.2023.3289935 article EN IEEE Internet of Things Journal 2023-06-27

Map matching for cellular data is to transform a sequence of cell tower locations trajectory on road map. It an essential processing step many applications, such as traffic optimization and human mobility analysis. However, most current map approaches are based Hidden Markov Models (HMMs) that have heavy computation overhead consider high-order information. This paper presents fast framework data, named DMM, which adopts recurrent neural network (RNN) identify the most-likely roads given...

10.1145/3372224.3421461 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2020-09-18

This paper aims to predict a set of apps user will open on her mobile device in the next time slot. Such an information is essential for many smartphone operations, e.g., app pre-loading and content pre-caching, improve experience. However, it hard build explicit model that accurately captures complex environment context predicts at one time. presents deep reinforcement learning framework, named as DeepAPP, which learns model-free predictive neural network from historical usage data....

10.1109/tmc.2021.3093619 article EN IEEE Transactions on Mobile Computing 2021-06-30

Continuous authentication, which provides identity verification using behavioral biometrics in an implicit and transparent manner, has shown potentials for protecting privacy. As the most common way of human-computer interaction, touch behavior pattern each user been proven distinctive widely adopted continuous authentication. However, based solutions rely on touchscreen signals obtained from high-level application programming interfaces, are hard to characterize fine-grained appearance...

10.1109/tkde.2023.3277879 article EN IEEE Transactions on Knowledge and Data Engineering 2023-05-19

This paper presents a novel map matching framework that adopts deep learning techniques to sequence of cell tower locations trajectory on road network. Map is an essential pre-processing step for many applications, such as traffic optimization and human mobility analysis. However, most recent approaches are based hidden Markov models (HMMs) or neural networks hard consider high-order location information heuristics observed from real driving scenarios. In this paper, we develop reinforcement...

10.1109/tkde.2024.3383881 article EN IEEE Transactions on Knowledge and Data Engineering 2024-04-01

10.1109/infocom53939.2023.10228935 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2023-05-17

Retrieving similar trajectories from a large trajectory dataset is important for variety of applications, like transportation planning and mobility analysis. Unlike previous works based on fine-grained GPS trajectories, this paper investigates the feasibility identifying cellular data observed by mobile infrastructure, which provide more comprehensive coverage. To handle localization errors low sample rates data, we develop holistic system, cellSim, seamlessly integrates map matching search....

10.48550/arxiv.1907.12371 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Smartphones have become the most important devices for users to communicate and interact with different forms of media, at same time stored a large amount sensitive private data. The security protection such data has increasingly critical. As sensor technology rapid developed, diversity sensors on smartphones greatly increased (e.g., motion touchscreen sensor), empowering provide continuous implicit user authentication by capturing behavioral biometrics. Unfortunately, it remains challenge...

10.1109/jiot.2023.3314717 article EN IEEE Internet of Things Journal 2023-09-13

In a refrigeration unit, the amount of refrigerant has substantial influence on entire system. To predict in refrigerators with best performance, this study used refrigerator data collected real time via Internet Things, which were screened to include only effective parameters related compressor and properties (based their practical significance research background) cleaned by applying longitudinal dimensionality reduction transverse reduction. Then, basis an idealized model for data,...

10.1155/2020/1743973 article EN cc-by Complexity 2020-02-03

Large Vision-Language Model (LVLM) has seen burgeoning development and increasing attention recently. In this paper, we propose a novel framework, camo-perceptive vision-language framework (CPVLF), to explore whether LVLM can generalize the challenging camouflaged object detection (COD) scenario in training-free manner. During process of generalization, find that due hallucination issues within LVLM, it erroneously perceive objects scenes, producing counterfactual concepts. Moreover, as is...

10.48550/arxiv.2311.11273 preprint EN public-domain arXiv (Cornell University) 2023-01-01

Retrieving similar trajectories aims to search for the that are close a query trajectory in spatio-temporal domain from large dataset. This is critical variety of applications, like transportation planning and mobility analysis. Unlike previous studies perform retrieval on fine-grained GPS data or single cellular carrier, we investigate feasibility finding multiple carriers, which provide more comprehensive coverage population space. To handle issues spatial bias coarse granularity,...

10.1145/3613245 article EN ACM Transactions on Sensor Networks 2023-08-03

Objective To evaluate the clinical effect of a novel computer-assisted navigation technique for intraoperative correction femoral rotation deformity in diaphyseal fractures. Methods From November 2015 to 2016, system (BrainLAB, Germany) was used antegrade in-tramedullary nailing 13 patients with shaft fracture intraoperatively restore normal length and fractured femur. They were 11 men 2 women, an average age 38.2 years. The injury affected left side 5 cases right 8. According...

10.3760/cma.j.issn.1671-7600.2017.04.003 article EN Zhonghua chuangshang guke zazhi 2017-04-15
Coming Soon ...