UM

Browse/Search Results:  1-10 of 21 Help

Selected(0)Clear Items/Page:    Sort:
Semi-fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division Journal article
Peng,Fei, Liao,Tongxin, Long,Min, Li,Jin, Zhang,Wensheng, Zhou,Yicong. Semi-fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(11), 6531 - 6543.
Authors:  Peng,Fei;  Liao,Tongxin;  Long,Min;  Li,Jin;  Zhang,Wensheng; et al.
Favorite | TC[WOS]:2 TC[Scopus]:4  IF:8.3/7.1 | Submit date:2023/08/03
3d Mesh Models  Authentication  Distortion  Integrity Authentication  Location Awareness  Semi-fragile Reversible Watermarking  Signal Processing Algorithms  Solid Modeling  Spherical Crown Volume Division  Three-dimensional Displays  Watermarking  
An Entropy-Source-Preselection-Based Strong PUF With Strong Resilience to Machine Learning Attacks and High Energy Efficiency Journal article
Jiahao Liu, Yan Zhu, Chi-Hang Chan, Rui Paulo Martins. An Entropy-Source-Preselection-Based Strong PUF With Strong Resilience to Machine Learning Attacks and High Energy Efficiency[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, 69(12), 5108-5120.
Authors:  Jiahao Liu;  Yan Zhu;  Chi-Hang Chan;  Rui Paulo Martins
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:5.2/4.5 | Submit date:2023/01/28
Physically Unclonable Function (Puf)  Strong Puf  Hardware Security  Machine Learning Attacks  Authentication  Energy Efficiency  
A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER Journal article
Jiahao, Liu, Yuanzhe, Zhao, Yan, Zhu, Chi hang, Chan, Rui P., Martins. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69(12), 4898 - 4907.
Authors:  Jiahao, Liu;  Yuanzhe, Zhao;  Yan, Zhu;  Chi hang, Chan;  Rui P., Martins
Favorite | TC[WOS]:13 TC[Scopus]:16  IF:5.2/4.5 | Submit date:2023/01/28
Ber  Device Authentication  Energy Efficiency  Hardware Security  Modeling Attacks  Physically Unclonable Function (Puf)  Strong Puf  Weak Puf  
E-Key: an EEG-Based Biometric Authentication and Driving Fatigue Detection System Journal article
Xu, Tao, Wang, Hongtao, Lu, Guanyong, Wan, Feng, Deng, Mengqi, Qi, Peng, Bezerianos, Anastasios, Guan, Cuntai, Sun, Yu. E-Key: an EEG-Based Biometric Authentication and Driving Fatigue Detection System[J]. IEEE Transactions on Affective Computing, 2021, 14(2), 864-877.
Authors:  Xu, Tao;  Wang, Hongtao;  Lu, Guanyong;  Wan, Feng;  Deng, Mengqi; et al.
Favorite | TC[WOS]:30 TC[Scopus]:37  IF:9.6/11.0 | Submit date:2022/05/13
Convolutional Neural Network  Driving Fatigue  Eeg  Authentication  Biometric  
Deep Learning-Based Hyperspectral Multimodal Biometric Authentication System Using Palmprint and Dorsal Hand Vein Book chapter
出自: AI and Deep Learning in Biometric Security:CRC Press, 2021, 页码:1-22
Authors:  Zhao, S.;  Nie, W.;  Zhang, B.
Favorite |  | Submit date:2022/07/13
Multimodal Authentication System  Hyperspectral Palmprint  Hyperspectral Dorsal Hand Vein  Biometric Authentication  
A 0.04% BER Strong PUF with Cell-Bias-Based CRPs Filtering and Background Offset Calibration Journal article
Jiahao Liu, Yan Zhu, Chi-Hang Chan, Rui Paulo Martins. A 0.04% BER Strong PUF with Cell-Bias-Based CRPs Filtering and Background Offset Calibration[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2020, 67(11), 3853-3865.
Authors:  Jiahao Liu;  Yan Zhu;  Chi-Hang Chan;  Rui Paulo Martins
Favorite | TC[WOS]:8 TC[Scopus]:8  IF:5.2/4.5 | Submit date:2021/03/04
Authentication  Hardware Security  Internet Of Things  Low Power  Machine Learning Attacks  Physical Unclonable Function (Puf)  
Binary code, a flexible tool for diagnostic metabolite sequencing of medicinal plants Journal article
Qingqing Song, Jun Li, Yan Cao, Wenjing Liu, Huixia Huo, Jian-Bo Wan, Yuelin Song, Pengfei Tu. Binary code, a flexible tool for diagnostic metabolite sequencing of medicinal plants[J]. ANALYTICA CHIMICA ACTA, 2019, 1088, 89-98.
Authors:  Qingqing Song;  Jun Li;  Yan Cao;  Wenjing Liu;  Huixia Huo; et al.
Favorite | TC[WOS]:13 TC[Scopus]:14  IF:5.7/5.5 | Submit date:2020/04/22
Binary Code Sequence  Medicinal Plant Authentication  Scheduled Multiple Reaction Monitoring  “coding-decoding”workflow  Ingredients Of Traditional Chinese Medicine  Prescriptions  
Facial Multi-Characteristics and Applications Book
Zhang, B., Zhao, Q., Zhang, D.. Facial Multi-Characteristics and Applications[M]. N/A:World Scientific Publishing Co Pte Ltd, 2018.
Authors:  Zhang, B.;  Zhao, Q.;  Zhang, D.
Favorite |  | Submit date:2022/07/13
Face  Multi-characteristics  Facial Authentication  Facial Beauty Analysis  Facial Diagnosis  Facial Expression Recognition  
A DCT-based information hiding method for network authentication Conference paper
Wei Song, Shuanghui Zou, Yifei Tian, Chen Li, Su Sun, Simon Fong. A DCT-based information hiding method for network authentication[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 149-152.
Authors:  Wei Song;  Shuanghui Zou;  Yifei Tian;  Chen Li;  Su Sun; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Information Hiding  Network Authentication  Discrete Cosine Transform  Image Processing  
Robust image hashing using progressive feature selection for tampering detection Journal article
Pun, Chi-Man, Yan, Cai-Ping, Yuan, Xiao-Chen. Robust image hashing using progressive feature selection for tampering detection[J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 77(10), 11609-11633.
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite | TC[WOS]:20 TC[Scopus]:24  IF:3.0/2.9 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)