×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
Authors
LI XIAOSHAN [1]
ZHOU YICONG [1]
YIBO BOB ZHANG [1]
Document Type
Conference paper [3]
Journal article [2]
Date Issued
2016 [1]
2011 [1]
2007 [1]
2003 [1]
2001 [1]
Language
英語English [4]
Source Publication
Computers and El... [1]
Information Scie... [1]
Lecture Notes in... [1]
Proceedings - 20... [1]
Proceedings of t... [1]
Indexed By
SCIE [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-5 of 5
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks
Journal article
Yu Shilian, Ai Ye, Xu Bo, Zhou Yicong, Li Weifeng, Liao Qingmin, Poh Norman. Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks[J]. Information Sciences, 2016, 352-353, 188-202.
Authors:
Yu Shilian
;
Ai Ye
;
Xu Bo
;
Zhou Yicong
;
Li Weifeng
; et al.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
6
|
Submit date:2018/12/21
Biometric Authentication
Brute-force
Liveness Score
Probabilistic
Spoofing Attack
Scalable process modeling based on net synthesis under cloud computing environment
Conference paper
Zhou J., Liang R., Wang Y.. Scalable process modeling based on net synthesis under cloud computing environment[C], 2011, 807-812.
Authors:
Zhou J.
;
Liang R.
;
Wang Y.
Favorite
|
TC[Scopus]:
2
|
Submit date:2018/12/22
Cloud Computing
Liveness
Net Synthesis
Process Modeling
Semantics Constrained Net
Palm Vein Extraction and Matching for Personal Authentication
Conference paper
Zhang, B., Li, Q., You, J., Bhattacharya, P.. Palm Vein Extraction and Matching for Personal Authentication[C], 2007.
Authors:
Zhang, B.
;
Li, Q.
;
You, J.
;
Bhattacharya, P.
Favorite
|
|
Submit date:2022/07/13
Palm Vein
Personal Identification
Liveness Detection
Infrared Palm Images
Multiscale Filtering
On reachability graphs of Petri nets
Journal article
Ye X., Zhou J., Song X.. On reachability graphs of Petri nets[J]. Computers and Electrical Engineering, 2003, 29(2), 263-272.
Authors:
Ye X.
;
Zhou J.
;
Song X.
Favorite
|
TC[WOS]:
27
TC[Scopus]:
38
|
Submit date:2018/12/22
Boundedness
Conservation
Coverability
Liveness
Petri Net
Reachability
Reachability Graph
Reachability Tree
Safeness
Formal object-oriented analysis and design of an online ticketing system
Conference paper
Li X., Liu Z., Guo Z.. Formal object-oriented analysis and design of an online ticketing system[C], 2001, 259-266.
Authors:
Li X.
;
Liu Z.
;
Guo Z.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2019/02/14
E-commerce
Formal Techniques
Liveness
Object-orientation
Safety
Uml