Login / Signup
Mimi Wang
ORCID
Publication Activity (10 Years)
Years Active: 2013-2022
Publications (10 Years): 27
Top Topics
Petri Net
Evaluation Method
Transaction Systems
Keystroke Dynamics
Top Venues
IEEE Access
计算机科学
SMC
BIC-TA
</>
Publications
</>
Lizhen Zhang
,
Guochun Li
,
Mimi Wang
,
Ying Zheng
,
Liwei Huang
,
Yulin Chen
The Design of Epidemic Prevention Robot Based on Deep Learning.
ICISCAE
(2022)
Mimi Wang
,
Xudong He
,
Peihai Zhao
A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance.
Big Data
(2022)
Mimi Wang
The Cultivation of Students' Multiple Practical Ability Under the Multimodal Blended Teaching Mode.
Int. J. Emerg. Technol. Learn.
17 (12) (2022)
Mimi Wang
,
Peihai Zhao
A Measure Consistency Method for Overlapping Correspondence of Workflow Nets Based on Relation Profiles Partner Matrix.
IEEE Access
9 (2021)
Peihai Zhao
,
Mimi Wang
Mobile behavior trusted certification based on multivariate behavior sequences.
Neurocomputing
419 (2021)
Mimi Wang
,
Xudong He
,
Peihai Zhao
Process Model Enhancement Through Capturing Important Behaviors and Rating Trace Variants.
IEEE Access
9 (2021)
Peihai Zhao
,
Xiaoyan Chang
,
Mimi Wang
A Novel Multivariate Time-Series Anomaly Detection Approach Using an Unsupervised Deep Neural Network.
IEEE Access
9 (2021)
Mimi Wang
,
Zhijun Ding
,
Peihai Zhao
Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
IEEE Access
8 (2020)
Bo Dang
,
Changzan Liu
,
Ling Yang
,
Gang Wang
,
Mimi Wang
,
Zhiping Ren
,
Ruirong Dang
EMD-Based Borehole TEM Array Signal Denoising and Baseline Wander Correction for NDT of Downhole Casings.
IEEE Access
8 (2020)
Dongxiang Chen
,
Zhijun Ding
,
Chungang Yan
,
Mimi Wang
A behavioral authentication method for mobile based on browsing behaviors.
IEEE CAA J. Autom. Sinica
7 (6) (2020)
Mimi Wang
,
Zhijun Ding
,
Peihai Zhao
,
WangYang Yu
,
Changjun Jiang
A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems.
IEEE Trans. Syst. Man Cybern. Syst.
50 (10) (2020)
Mimi Wang
,
Zhijun Ding
,
Guanjun Liu
,
Changjun Jiang
,
Mengchu Zhou
Measurement and Computation of Profile Similarity of Workflow Nets Based on Behavioral Relation Matrix.
IEEE Trans. Syst. Man Cybern. Syst.
50 (10) (2020)
Peihai Zhao
,
Zhijun Ding
,
Mimi Wang
,
Ruihao Cao
Behavior Analysis for Electronic Commerce Trading Systems: A Survey.
IEEE Access
7 (2019)
Mimi Wang
,
Guanjun Liu
,
Peihai Zhao
,
Chungang Yan
,
Changjun Jiang
Behavior consistency computation for workflow nets with unknown correspondence.
IEEE CAA J. Autom. Sinica
5 (1) (2018)
Dongxiang Chen
,
Zhijun Ding
,
Chungang Yan
,
Mimi Wang
一种综合多因素的网页浏览行为认证方法 (Authentication Method Synthesizing Multi-factors for Web Browsing Behavior).
计算机科学
45 (2) (2018)
Peihai Zhao
,
Mimi Wang
基于三维行为关系图的模型一致性检测方法 (Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph).
计算机科学
45 (6) (2018)
Mimi Wang
,
Zhijun Ding
,
Changjun Jiang
,
Peihai Zhao
A Process-Profile-Based Method to Measure Consistency of E-Commerce System.
IEEE Access
6 (2018)
Mimi Wang
,
Peihai Zhao
Decomposition of Petri nets based on the behavior relation matrix.
ICNC-FSKD
(2017)
Leifeng He
,
Guanjun Liu
,
Mimi Wang
A Sufficient and Necessary Condition to Decide Compatibility for Simple Circuit Inter-organization Workflow Nets.
APSCC
(2016)
Peihai Zhao
,
Mimi Wang
,
Xianwen Fang
基于网进程的模型一致性分析方法 (Consistency Analysis Method of Models Based on Net Process).
计算机科学
43 (11) (2016)
Xiaoshuang Song
,
Peihai Zhao
,
Mimi Wang
,
ChunGang Yan
A continuous identity verification method based on free-text keystroke dynamics.
SMC
(2016)
Lei Ma
,
ChunGang Yan
,
Peihai Zhao
,
Mimi Wang
A kind of mouse behavior authentication method on dynamic soft keyboard.
SMC
(2016)
Hongbo Zhang
,
ChunGang Yan
,
Peihai Zhao
,
Mimi Wang
Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users.
SMC
(2016)
Mimi Wang
,
GuanJun Liu
,
ChunGang Yan
,
Changjun Jiang
Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack.
SpaCCS
(2016)
Qiang Liu
,
Mimi Wang
,
Peihai Zhao
,
Chungang Yan
,
Zhijun Ding
A behavioral authentication method for mobile gesture against resilient user posture.
ICSAI
(2016)
Mimi Wang
,
GuanJun Liu
,
Changjun Jiang
,
ChunGang Yan
Computation of Secure Consistency for Real Systems.
SpaCCS
(2016)
Yujie Wang
,
Peihai Zhao
,
Mimi Wang
基于键盘行为进行用户识别的方法与应用 (Method of User Identification Based on Keystroke Behavior and its Application).
计算机科学
42 (11) (2015)
Xiangwei Liu
,
Mimi Wang
,
Lu Liu
The Analysis of Change Region About Networked Control System Based on the Behavior Profile.
BIC-TA
(2013)
Xianwen Fang
,
Mimi Wang
,
Shenbing Wu
A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles.
BIC-TA
(2013)