×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [13]
Institute of Chi... [3]
INSTITUTE OF MIC... [2]
THE STATE KEY LA... [1]
INSTITUTE OF COL... [1]
Authors
LEUNG CHUNG HANG [2]
RUI PAULO DA SIL... [2]
FONG SIMON JAMES [2]
PUN CHI MAN [2]
ZHOU YICONG [2]
ZHU YAN [2]
More...
Document Type
Journal article [17]
Conference paper [2]
Book [1]
Book chapter [1]
Date Issued
2023 [1]
2022 [2]
2021 [2]
2020 [1]
2019 [1]
2018 [1]
More...
Language
英語English [19]
Source Publication
IEEE Transaction... [2]
AI and Deep Lear... [1]
ANALYTICA CHIMIC... [1]
Advanced Science... [1]
BDIOT2017: Proce... [1]
BioMedical Engin... [1]
More...
Indexed By
SCIE [11]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 21
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Semi-fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division
Journal article
Peng,Fei, Liao,Tongxin, Long,Min, Li,Jin, Zhang,Wensheng, Zhou,Yicong. Semi-fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(11), 6531 - 6543.
Authors:
Peng,Fei
;
Liao,Tongxin
;
Long,Min
;
Li,Jin
;
Zhang,Wensheng
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
4
IF:
8.3
/
7.1
|
Submit date:2023/08/03
3d Mesh Models
Authentication
Distortion
Integrity Authentication
Location Awareness
Semi-fragile Reversible Watermarking
Signal Processing Algorithms
Solid Modeling
Spherical Crown Volume Division
Three-dimensional Displays
Watermarking
An Entropy-Source-Preselection-Based Strong PUF With Strong Resilience to Machine Learning Attacks and High Energy Efficiency
Journal article
Jiahao Liu, Yan Zhu, Chi-Hang Chan, Rui Paulo Martins. An Entropy-Source-Preselection-Based Strong PUF With Strong Resilience to Machine Learning Attacks and High Energy Efficiency[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, 69(12), 5108-5120.
Authors:
Jiahao Liu
;
Yan Zhu
;
Chi-Hang Chan
;
Rui Paulo Martins
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
IF:
5.2
/
4.5
|
Submit date:2023/01/28
Physically Unclonable Function (Puf)
Strong Puf
Hardware Security
Machine Learning Attacks
Authentication
Energy Efficiency
A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER
Journal article
Jiahao, Liu, Yuanzhe, Zhao, Yan, Zhu, Chi hang, Chan, Rui P., Martins. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69(12), 4898 - 4907.
Authors:
Jiahao, Liu
;
Yuanzhe, Zhao
;
Yan, Zhu
;
Chi hang, Chan
;
Rui P., Martins
Favorite
|
TC[WOS]:
13
TC[Scopus]:
16
IF:
5.2
/
4.5
|
Submit date:2023/01/28
Ber
Device Authentication
Energy Efficiency
Hardware Security
Modeling Attacks
Physically Unclonable Function (Puf)
Strong Puf
Weak Puf
E-Key: an EEG-Based Biometric Authentication and Driving Fatigue Detection System
Journal article
Xu, Tao, Wang, Hongtao, Lu, Guanyong, Wan, Feng, Deng, Mengqi, Qi, Peng, Bezerianos, Anastasios, Guan, Cuntai, Sun, Yu. E-Key: an EEG-Based Biometric Authentication and Driving Fatigue Detection System[J]. IEEE Transactions on Affective Computing, 2021, 14(2), 864-877.
Authors:
Xu, Tao
;
Wang, Hongtao
;
Lu, Guanyong
;
Wan, Feng
;
Deng, Mengqi
; et al.
Favorite
|
TC[WOS]:
30
TC[Scopus]:
37
IF:
9.6
/
11.0
|
Submit date:2022/05/13
Convolutional Neural Network
Driving Fatigue
Eeg
Authentication
Biometric
Deep Learning-Based Hyperspectral Multimodal Biometric Authentication System Using Palmprint and Dorsal Hand Vein
Book chapter
出自: AI and Deep Learning in Biometric Security:CRC Press, 2021, 页码:1-22
Authors:
Zhao, S.
;
Nie, W.
;
Zhang, B.
Favorite
|
|
Submit date:2022/07/13
Multimodal Authentication System
Hyperspectral Palmprint
Hyperspectral Dorsal Hand Vein
Biometric Authentication
A 0.04% BER Strong PUF with Cell-Bias-Based CRPs Filtering and Background Offset Calibration
Journal article
Jiahao Liu, Yan Zhu, Chi-Hang Chan, Rui Paulo Martins. A 0.04% BER Strong PUF with Cell-Bias-Based CRPs Filtering and Background Offset Calibration[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2020, 67(11), 3853-3865.
Authors:
Jiahao Liu
;
Yan Zhu
;
Chi-Hang Chan
;
Rui Paulo Martins
Favorite
|
TC[WOS]:
8
TC[Scopus]:
8
IF:
5.2
/
4.5
|
Submit date:2021/03/04
Authentication
Hardware Security
Internet Of Things
Low Power
Machine Learning Attacks
Physical Unclonable Function (Puf)
Binary code, a flexible tool for diagnostic metabolite sequencing of medicinal plants
Journal article
Qingqing Song, Jun Li, Yan Cao, Wenjing Liu, Huixia Huo, Jian-Bo Wan, Yuelin Song, Pengfei Tu. Binary code, a flexible tool for diagnostic metabolite sequencing of medicinal plants[J]. ANALYTICA CHIMICA ACTA, 2019, 1088, 89-98.
Authors:
Qingqing Song
;
Jun Li
;
Yan Cao
;
Wenjing Liu
;
Huixia Huo
; et al.
Favorite
|
TC[WOS]:
13
TC[Scopus]:
14
IF:
5.7
/
5.5
|
Submit date:2020/04/22
Binary Code Sequence
Medicinal Plant Authentication
Scheduled Multiple Reaction Monitoring
“coding-decoding”workflow
Ingredients Of Traditional Chinese Medicine
Prescriptions
Facial Multi-Characteristics and Applications
Book
Zhang, B., Zhao, Q., Zhang, D.. Facial Multi-Characteristics and Applications[M]. N/A:World Scientific Publishing Co Pte Ltd, 2018.
Authors:
Zhang, B.
;
Zhao, Q.
;
Zhang, D.
Favorite
|
|
Submit date:2022/07/13
Face
Multi-characteristics
Facial Authentication
Facial Beauty Analysis
Facial Diagnosis
Facial Expression Recognition
A DCT-based information hiding method for network authentication
Conference paper
Wei Song, Shuanghui Zou, Yifei Tian, Chen Li, Su Sun, Simon Fong. A DCT-based information hiding method for network authentication[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 149-152.
Authors:
Wei Song
;
Shuanghui Zou
;
Yifei Tian
;
Chen Li
;
Su Sun
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Information Hiding
Network Authentication
Discrete Cosine Transform
Image Processing
Robust image hashing using progressive feature selection for tampering detection
Journal article
Pun, Chi-Man, Yan, Cai-Ping, Yuan, Xiao-Chen. Robust image hashing using progressive feature selection for tampering detection[J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 77(10), 11609-11633.
Authors:
Pun, Chi-Man
;
Yan, Cai-Ping
;
Yuan, Xiao-Chen
Favorite
|
TC[WOS]:
20
TC[Scopus]:
24
IF:
3.0
/
2.9
|
Submit date:2018/10/30
Robust Image Hashing
Progressive Feature Point Selection
Tampering Detection
Image Authentication
Horizontal Location-context Hashing (Hlch)
Vertical Location-context Hashing (Vlch)