UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
Cross-database attack of different coding-based palmprint templates Journal article
Yang, Ziyuan, Leng, Lu, Teoh, Andrew Beng Jin, Zhang, Bob, Zhang, Yi. Cross-database attack of different coding-based palmprint templates[J]. Knowledge-Based Systems, 2023, 264, 110310.
Authors:  Yang, Ziyuan;  Leng, Lu;  Teoh, Andrew Beng Jin;  Zhang, Bob;  Zhang, Yi
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:7.2/7.4 | Submit date:2023/04/03
Palmprint Recognition  Cross-database Attack  Statistical Attack  Template Inference  Security Assessment  
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:  Ramaswamy, M.P.
Favorite |  | Submit date:2022/08/24
Efficiency  Efficacy  Norms  Assessment  Cyber-security  Greater Bay Area  
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:  Ramaswamy, M.P.
Favorite |  | Submit date:2022/08/24
Efficiency  Efficacy  Norms  Assessment  Cyber-security  Greater Bay Area