关注
Wencheng Yang
标题
引用次数
引用次数
年份
Security and accuracy of fingerprint-based biometrics: A review
W Yang, S Wang, J Hu, G Zheng, C Valli
Symmetry 11 (2), 141, 2019
2422019
A Fingerprint and Finger-vein Based Cancelable Multi-biometric System
W Yang, S Wang, J Hu, G Zheng, C Valli
Pattern Recognition 78, 242-251, 2018
2162018
A review of security standards and frameworks for IoT-based smart environments
NM Karie, NM Sahri, W Yang, C Valli, VR Kebande
IEEE Access 9, 121975-121995, 2021
1182021
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
W Yang, J Hu, S Wang, M Stojmenovic
Pattern Recognition 47 (3), 1309-1320, 2014
1062014
A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement
W Yang, J Hu, S Wang
IEEE transactions on Information Forensics and Security 9 (7), 1179-1192, 2014
952014
Design of alignment-free cancelable fingerprint templates with zoned minutia pairs
S Wang, W Yang, J Hu
Pattern Recognition 66, 295-301, 2017
892017
DEMOCO: Energy-efficient detection and monitoring for continuous objects in wireless sensor networks
JH Kim, KB Kim, SH Chauhdary, W Yang, MS Park
IEICE transactions on communications 91 (11), 3648-3656, 2008
802008
Biometrics for internet-of-things security: A review
W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli
Sensors 21 (18), 6163, 2021
792021
Cancelable fingerprint templates with delaunay triangle-based local structures
W Yang, J Hu, S Wang, J Yang
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
792013
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6 (1), 36939-36947, 2018
752018
Securing deep learning based edge finger vein biometrics with binary decision diagram
W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli
IEEE transactions on industrial Informatics 15 (7), 4244-4253, 2019
702019
An adaptive dynamic cluster-based protocol for target tracking in wireless sensor networks
W Yang, Z Fu, JH Kim, MS Park
Advances in Data and Web Management, 157-167, 2007
692007
A finger-vein based cancellable bio-cryptosystem
W Yang, J Hu, S Wang
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
552013
A cancelable biometric authentication system based on feature-adaptive random projection
W Yang, S Wang, M Shahzad, W Zhou
Journal of Information Security and Applications 58, 102704, 2021
542021
Finger-to-heart (F2H): Authentication for wireless implantable medical devices
G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ...
IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018
512018
A delaunay triangle-based fuzzy extractor for fingerprint authentication
W Yang, J Hu, S Wang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
492012
No soldiers left behind: an IoT-based low-power military mobile health system design
JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland
IEEE access 8, 201498-201515, 2020
442020
A privacy-preserving lightweight biometric system for internet of things security
W Yang, S Wang, G Zheng, J Yang, C Valli
IEEE Communications Magazine 57 (3), 84-89, 2019
422019
PRODUCE: a probability-driven unequal clustering mechanism for wireless sensor networks
JH Kim, SH Chauhdary, W Yang, DS Kim, MS Park
Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008
402008
Biometrics Based Privacy‐Preserving Authentication and Mobile Template Protection
W Yang, J Hu, S Wang, Q Wu
Wireless communications and mobile computing 2018 (1), 7107295, 2018
382018
系统目前无法执行此操作,请稍后再试。
文章 1–20