UM

Browse/Search Results:  1-10 of 39 Help

Selected(0)Clear Items/Page:    Sort:
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage Journal article
Yang, Ziyuan, Kang, Ming, Teoh, Andrew Beng Jin, Gao, Chengrui, Chen, Wen, Zhang, Bob, Zhang, Yi. A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 8587-8599.
Authors:  Yang, Ziyuan;  Kang, Ming;  Teoh, Andrew Beng Jin;  Gao, Chengrui;  Chen, Wen; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.3/7.3 | Submit date:2024/10/10
Palmprint Verification  Cancellable Biometrics  Negative Database  Competition Neural Network  Replay Attacks  
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition Journal article
Wang, Yifan, Gui, Jie, Tang, Yuan Yan, Kwok, James T.. CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 7810-7823.
Authors:  Wang, Yifan;  Gui, Jie;  Tang, Yuan Yan;  Kwok, James T.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:6.3/7.3 | Submit date:2024/09/03
Cancelable Biomrtrics  Finger Vein Recognition  Convolutional Neural Network  Object Localization  Plug-and-play  Template Protection  Security And Privacy  
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks Journal article
Xu, Chongyao, Zhang, Litao, Mak, Pui In, Martins, Rui P., Law, Man Kay. Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 3927-3942.
Authors:  Xu, Chongyao;  Zhang, Litao;  Mak, Pui In;  Martins, Rui P.;  Law, Man Kay
Favorite | TC[WOS]:2 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2024/05/16
Physical Unclonable Function (Puf)  Machine Learning (Ml)  Modeling Attack  Symmetrical Obfuscated Interconnection (Soi)  Challenge Obfuscation  Reverse Engineering (Re)  
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction Journal article
Li, Shuyi, Ma, Ruijun, Zhou, Jianhang, Zhang, Bob, Wu, Lifang. Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 959-969.
Authors:  Li, Shuyi;  Ma, Ruijun;  Zhou, Jianhang;  Zhang, Bob;  Wu, Lifang
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:6.3/7.3 | Submit date:2024/05/16
Discriminative Analysis  Domain Adaptation  Finger Vein Recognition  Jointly Embedding  Low-rank Representation  
Learning Frequency-Aware Common Feature for VIS-NIR Heterogeneous Palmprint Recognition Journal article
Fei, Lunke, Su, Le, Zhang, Bob, Zhao, Shuping, Wen, Jie, Li, Xiaoping. Learning Frequency-Aware Common Feature for VIS-NIR Heterogeneous Palmprint Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 7604-7618.
Authors:  Fei, Lunke;  Su, Le;  Zhang, Bob;  Zhao, Shuping;  Wen, Jie; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:6.3/7.3 | Submit date:2024/09/03
Biometrics  Frequency-aware Feature Selection  Heterogeneous Palmprint Recognition  Vis And Nir Palmprint Images  
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning Journal article
Wu, Haiwei, Zhou, Jiantao, Zhang, Xinyu, Tian, Jinyu, Sun, Weiwei. Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 148-162.
Authors:  Wu, Haiwei;  Zhou, Jiantao;  Zhang, Xinyu;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2024/05/16
Camera Model Identification  Deep Neural Networks  Online Social Networks  Robustness  
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition Journal article
Li, Shuyi, Zhang, Bob, Wu, Lifang, Ma, Ruijun, Ning, Xin. Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 2709-2719.
Authors:  Li, Shuyi;  Zhang, Bob;  Wu, Lifang;  Ma, Ruijun;  Ning, Xin
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:6.3/7.3 | Submit date:2024/05/16
Finger-based Biometrics  Least Square Regression (Lsr)  Projection Learning  Sparse Transformation Matrix  
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach Journal article
Wang, Yuntao, Su, Zhou, Benslimane, Abderrahim, Xu, Qichao, Dai, Minghui, Li, Ruidong. Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach[J]. IEEE Transactions on Information Forensics and Security, 2023, 19, 1963-1978.
Authors:  Wang, Yuntao;  Su, Zhou;  Benslimane, Abderrahim;  Xu, Qichao;  Dai, Minghui; et al.
Favorite | TC[WOS]:3 TC[Scopus]:7  IF:6.3/7.3 | Submit date:2024/02/22
Unmanned Aerial Vehicle (Uav)  Mobile Honeypot  Collaborative Defense  Game  Reinforcement Learning  
Comprehensive Competition Mechanism in Palmprint Recognition Journal article
Yang, Ziyuan, Huangfu, Huijie, Leng, Lu, Zhang, Bob, Teoh, Andrew Beng Jin, Zhang, Yi. Comprehensive Competition Mechanism in Palmprint Recognition[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18, 5160-5170.
Authors:  Yang, Ziyuan;  Huangfu, Huijie;  Leng, Lu;  Zhang, Bob;  Teoh, Andrew Beng Jin; et al.
Favorite | TC[WOS]:13 TC[Scopus]:15  IF:6.3/7.3 | Submit date:2024/02/23
Biometric Recognition  Comprehensive Competition Mechanism  Deep Learning  Palmprint Recognition  Texture Features  
Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs Journal article
Xu, Chongyao, Zhang, Jieyun, Law, Man-Kay, Zhao, Xiaojin, Mak, Pui-In, Martins, Rui P.. Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 2188 - 2203.
Authors:  Xu, Chongyao;  Zhang, Jieyun;  Law, Man-Kay;  Zhao, Xiaojin;  Mak, Pui-In; et al.
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:6.3/7.3 | Submit date:2023/03/29
Field-programmable Gate Array (Fpga)  Hardware Reuse  Machine Learning (Ml) Attack  Multiplier  Physical Unclonable Function (Puf)  Response Stream (Rs)  Transfer Path (Tp)