Security and accuracy of fingerprint-based biometrics: A review W Yang, S Wang, J Hu, G Zheng, C Valli Symmetry 11 (2), 141, 2019 | 242 | 2019 |
A Fingerprint and Finger-vein Based Cancelable Multi-biometric System W Yang, S Wang, J Hu, G Zheng, C Valli Pattern Recognition 78, 242-251, 2018 | 216 | 2018 |
A review of security standards and frameworks for IoT-based smart environments NM Karie, NM Sahri, W Yang, C Valli, VR Kebande IEEE Access 9, 121975-121995, 2021 | 118 | 2021 |
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures W Yang, J Hu, S Wang, M Stojmenovic Pattern Recognition 47 (3), 1309-1320, 2014 | 106 | 2014 |
A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement W Yang, J Hu, S Wang IEEE transactions on Information Forensics and Security 9 (7), 1179-1192, 2014 | 95 | 2014 |
Design of alignment-free cancelable fingerprint templates with zoned minutia pairs S Wang, W Yang, J Hu Pattern Recognition 66, 295-301, 2017 | 89 | 2017 |
DEMOCO: Energy-efficient detection and monitoring for continuous objects in wireless sensor networks JH Kim, KB Kim, SH Chauhdary, W Yang, MS Park IEICE transactions on communications 91 (11), 3648-3656, 2008 | 80 | 2008 |
Biometrics for internet-of-things security: A review W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli Sensors 21 (18), 6163, 2021 | 79 | 2021 |
Cancelable fingerprint templates with delaunay triangle-based local structures W Yang, J Hu, S Wang, J Yang Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 79 | 2013 |
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli IEEE Access 6 (1), 36939-36947, 2018 | 75 | 2018 |
Securing deep learning based edge finger vein biometrics with binary decision diagram W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli IEEE transactions on industrial Informatics 15 (7), 4244-4253, 2019 | 70 | 2019 |
An adaptive dynamic cluster-based protocol for target tracking in wireless sensor networks W Yang, Z Fu, JH Kim, MS Park Advances in Data and Web Management, 157-167, 2007 | 69 | 2007 |
A finger-vein based cancellable bio-cryptosystem W Yang, J Hu, S Wang Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 55 | 2013 |
A cancelable biometric authentication system based on feature-adaptive random projection W Yang, S Wang, M Shahzad, W Zhou Journal of Information Security and Applications 58, 102704, 2021 | 54 | 2021 |
Finger-to-heart (F2H): Authentication for wireless implantable medical devices G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ... IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018 | 51 | 2018 |
A delaunay triangle-based fuzzy extractor for fingerprint authentication W Yang, J Hu, S Wang 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 49 | 2012 |
No soldiers left behind: an IoT-based low-power military mobile health system design JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland IEEE access 8, 201498-201515, 2020 | 44 | 2020 |
A privacy-preserving lightweight biometric system for internet of things security W Yang, S Wang, G Zheng, J Yang, C Valli IEEE Communications Magazine 57 (3), 84-89, 2019 | 42 | 2019 |
PRODUCE: a probability-driven unequal clustering mechanism for wireless sensor networks JH Kim, SH Chauhdary, W Yang, DS Kim, MS Park Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008 | 40 | 2008 |
Biometrics Based Privacy‐Preserving Authentication and Mobile Template Protection W Yang, J Hu, S Wang, Q Wu Wireless communications and mobile computing 2018 (1), 7107295, 2018 | 38 | 2018 |