UM

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Online 3D ear recognition by combining global and local features Journal article
PLoS ONE, 2016,Volume: 11,Issue: 12
Authors:  Liu Y.;  Zhang B.;  Lu G.;  Zhang D.
Favorite |  | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/04/04
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
A biometric authentication model using hand gesture images Journal article
BioMedical Engineering Online, 2013,Volume: 12,Issue: 1
Authors:  Simon Fong;  Yan Zhuang;  Iztok Fister;  Iztok Fister Jr
Favorite |  | TC[WOS]:18 TC[Scopus]:28 | Submit date:2019/02/13
Biometric Authentication  Hand Gesture  Hand Sign Recognition  Machine Learning  
Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree Journal article
Journal of Biomedicine and Biotechnology, 2012,Volume: 2012
Authors:  Simon Fong;  Yan Zhuang
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2019/02/13
Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching Journal article
Journal of Biomedicine and Biotechnology, 2012,Volume: 2012
Authors:  Simon Fong;  Yan Zhuang
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/02/13
Using medical history embedded in biometrics medical card for user identity authentication: Data representation by AVT hierarchical data tree Journal article
Journal of Biomedicine and Biotechnology, 2012,Volume: 2012
Authors:  Fong,Simon;  Zhuang,Yan
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2021/03/09
Using medical history embedded in biometrics medical card for user identity authentication: Privacy preserving authentication model by features matching Journal article
Journal of Biomedicine and Biotechnology, 2012,Volume: 2012
Authors:  Fong,Simon;  Zhuang,Yan
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2021/03/09
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View | Adobe PDF | Favorite |  | TC[WOS]:259 TC[Scopus]:314 | Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid