selected publications
-
academic article
-
Yang WWang SShahzad MZhou W. A cancelable biometric authentication system based on feature-adaptive random projection.
Journal of Information Security and Applications.
58:102704-102704.
2021
Full text if available -
Shahzad MWang SDeng GYang W. Alignment-free cancelable fingerprint templates with dual protection.
Pattern Recognition.
111:107735-107735.
2021
Full text if available -
Moorfield JWang SYang WBedari AVan Der Kamp P. A Möbius transformation based model for fingerprint minutiae variations.
Pattern Recognition.
98.
2020
Full text if available -
Yang WWang SZheng GYang JValli C. A Privacy-Preserving Lightweight Biometric System for Internet of Things Security.
IEEE Communications Magazine.
57:84-89.
2019
Full text if available -
Yang WWang SHu JIbrahim AZheng GMacedo MJJohnstone MNValli C. A cancelable iris-and steganography-based user authentication system for the internet of things.
Sensors.
19.
2019
Full text if available -
Yang WWang SZheng GValli C. Impact of feature proportion on matching performance of multi-biometric systems.
ICT Express.
5:37-40.
2019
Full text if available -
Yang WWang SHu JZheng GYang JValli C. Securing deep learning based edge finger-vein biometrics with binary decision diagram.
IEEE Transactions on Industrial Informatics.
15:4244-4253.
2019
Full text if available -
Yang WWang SHu JZheng GValli C. Security and Accuracy of Fingerprint-Based Biometrics: A Review.
Symmetry.
11.
2019
Full text if available -
Yang WWang SHu JZheng GValli C. A fingerprint and finger-vein based cancelable multi-biometric system.
Pattern Recognition.
78:242-251.
2018
Full text if available -
Yang WHu JWang SWu Q. Biometrics based privacy-preserving authentication and mobile template protection.
Wireless Communications and Mobile Computing.
2018:1-17.
2018
Full text if available -
Yang WWang SZheng GChaudhry JValli C. ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.
Journal of Supercomputing.
74:4893-4909.
2018
Full text if available -
Deng GManton JHWang S. Fast Kernel Smoothing by a Low-Rank Approximation of the Kernel Toeplitz Matrix.
Journal of Mathematical Imaging and Vision.
60:1181-1195.
2018
Full text if available -
Yang WWang SHu JZheng GChaudhry JAdi EValli C. Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access.
6:36939-36947.
2018
Full text if available -
Wang SDeng GHu J. A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations.
Pattern Recognition.
61:447-458.
2017
Full text if available -
Wang SYang WHu J. Design of alignment-free cancelable fingerprint templates with zoned minutia pairs.
Pattern Recognition.
66:295-301.
2017
Full text if available -
Zhou WHu JWang S. Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases.
IEEE Transactions on Big Data.
2017
Full text if available -
Wang SHu J. A blind system identification approach to cancelable fingerprint templates.
Pattern Recognition.
54:14-22.
2016
Full text if available -
Zhou WHu JWang SPetersen IBennamoun M. Partial fingerprint indexing: a combination of local and reconstructed global features.
Concurrency and Computation: Practice and Experience.
28:2940-2957.
2016
Full text if available -
Yang WHu JWang SChen C. Mutual dependency of features in multimodal biometric systems.
Electronics Letters.
51:234-235.
2015
Full text if available -
Yang WHu JWang S. A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement.
IEEE Transactions on Information Forensics and Security.
9:1179-1192.
2014
Full text if available -
Yang WHu JWang SStojrnenovic M. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures.
Pattern Recognition.
47:1309-1320.
2014
Full text if available -
Wang SHu J. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution.
Pattern Recognition.
47:1321-1329.
2014
Full text if available -
Tan ZNagar UHe XNanda PLiu RWang SHu J. Enhancing big data security with collaborative intrusion detection.
IEEE Cloud Computing.
1:27-33.
2014
Full text if available -
Zhou WHu JWang SPetersen IBennamoun M. Performance evaluation of large 3D fingerprint databases.
Electronics Letters.
50:1060-1061.
2014
Full text if available -
Wang SHu J. Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?.
Wireless Communications and Mobile Computing.
13:204-210.
2013
Full text if available -
Wang SHu J. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach.
Pattern Recognition.
45:4129-4137.
2012
Full text if available -
Ross RDevlin JWang S. Toward Refocused Optical Mouse Sensors for Outdoor Optical Flow Odometry.
IEEE Sensors Journal.
12:1925-1932.
2012
Full text if available -
Ahmad THu JWang S. Pair-polar coordinate-based cancelable fingerprint templates.
Pattern Recognition.
44:2555-2564.
2011
Full text if available -
Wang SCao JHu J. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
Journal of Network and Computer Applications.
34:116-120.
2011
Full text if available -
Wang SSong WangManton JH. A Cross-Relation-Based Frequency-Domain Method for Blind SIMO-OFDM Channel Estimation.
IEEE Signal Processing Letters.
16:865-868.
2009
Full text if available -
Wang SManton JH. Blind Channel Estimation for Non-CP OFDM Systems Using Multiple Receive Antennas.
IEEE Signal Processing Letters.
16:299-302.
2009
Full text if available -
Wang SManton JH. Blind SIMO channel identification using FFT/IFFT.
Signal Processing.
88:3007-3010.
2008
Full text if available -
Wang SDevlin JC. Blind multichannel identification using overlap-save filtering.
Electronics Letters.
44:483-483.
2008
Full text if available -
Wang SManton JTay DBHZhang CDevlin JC. An FFT-Based Method for Blind Identification of FIR SIMO Channels.
IEEE Signal Processing Letters.
14:437-440.
2007
Full text if available -
Wang SXie LZhang C. Mixed H2/H∞ deconvolution of uncertain periodic FIR channels.
Signal Processing.
81:2089-2103.
2001
Full text if available -
Xie LWang SDu CZhang C. H∞ deconvolution of periodic channels.
Signal Processing.
80:2365-2378.
2000
Full text if available -
Wang SZhang C. Minimal realization for lifted periodic filters.
Circuits, Systems and Signal Processing.
19:411-421.
2000
Full text if available -
Zhang CWang S. Model matching for discrete-time periodic systems with time-varying relative degree and order.
Systems and Control Letters.
39:301-312.
2000
Full text if available -
Wang SSong WangLihua XieCishen Zhang. H/sub 2/ optimal inverse of periodic FIR digital filters.
IEEE Transactions on Signal Processing.
48:2696-2700.
2000
Full text if available -
Wang SZhang C. Invertibility and inverses of linear time-varying digital filters.
IEEE Transactions on Circuits and Systems, Part 2: Express Briefs.
47:1126-1131.
2000
Full text if available -
Wang SZhang C. Minimum order input–output equation for LTV digital filters with time-varying state dimension.
Signal Processing.
76:301-309.
1999
Full text if available -
Wang SCishen ZhangSong WangYu Fan Zheng. Minimum order input-output equation for linear time-varying digital filters.
IEEE Signal Processing Letters.
5:171-173.
1998
Full text if available
-
Yang WWang SShahzad MZhou W. A cancelable biometric authentication system based on feature-adaptive random projection.
Journal of Information Security and Applications.
58:102704-102704.
2021
-
chapter
-
Tran QWang SOu RHu J. Double-layer secret-sharing system involving privacy preserving biometric authentication.
153-170.
2017
-
Zhou WHu JWang SPetersen IBennamoun M. 3D Fingerprints: A Survey.
459-485.
2015
-
Tran QWang SOu RHu J. Double-layer secret-sharing system involving privacy preserving biometric authentication.
153-170.
2017
-
comment
-
Yang WWang S. Fingerprint and face scanners aren’t as secure as we think they are.
The Conversation.
2019
-
Yang WWang S. Fingerprint and face scanners aren’t as secure as we think they are.
The Conversation.
2019
-
conference paper
-
Yang WJohnstone MNSikos LFWang S. Security and forensics in the Internet of Things: research advances and challenges.
Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020.
12-17.
2020
Full text if available -
Tran QNHu JWang S. Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure.
2018 IEEE Global Communications Conference (GLOBECOM).
1-6.
2018
Full text if available -
Yang WZheng GIbrahim AChaudhry JWang SHu JValli C. Application of 3D Delaunay triangulation in fingerprint authentication system.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
291-298.
2018
Full text if available -
Yang WHu JWang S. The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication.
2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
995-999.
2014
Full text if available -
Zhou WHu JPetersen IWang SBennamoun M. A Benchmark 3D Fingerprint Database.
2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
935-940.
2014
Full text if available -
Zhou WHu JWang SPetersen IBennamoun M. Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features.
Lecture Notes in Computer Science.
377-388.
2014
Full text if available -
Chen CWang CYang TLin DWang SHu J. Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings: 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
989-994.
2014
Full text if available -
Zhou WHu JPetersen IWang SBennamoun M. Performance Evaluation of 2D to 3D Fingerprint Recognition.
2013 6th International Congress on Image and Signal Processing (CISP), Vols 1-3.
1736-1741.
2014
Full text if available -
Yang WHu JWang S. A Delaunay Triangle Group Based Fuzzy Vault with Cancellability.
2013 6th International Congress on Image and Signal Processing (CISP), Vols 1-3.
1676-1681.
2013
Full text if available -
Wang SHu J. A Hadamard Transform-Based Method for the Design of Cancellable Fingerprint Templates.
2013 6th International Congress on Image and Signal Processing (CISP), Vols 1-3.
1682-1687.
2013
Full text if available -
Yang WHu JWang S. A finger-vein based cancellable bio-cryptosystem.
Lecture Notes in Computer Science.
784-790.
2013
Full text if available -
Yang WHu JYang JWang SShu L. Biometrics for Securing Mobile Payments: Benefits, Challenges and Solutions.
2013 6th International Congress on Image and Signal Processing (CISP), Vols 1-3.
1699-1704.
2013
Full text if available -
Yang WHu JWang SYang J. Cancelable fingerprint templates with Delaunay triangle-based local structures.
Lecture Notes in Computer Science.
81-91.
2013
Full text if available -
Yang WHu JWang S. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
66-70.
2012
Full text if available -
Ahmad THu JWang S. String-based Cancelable Fingerprint Templates.
2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA).
1028-1033.
2011
Full text if available -
Wang SRoss RManton JH. Zero prefix precoder-based blind SIMO channel estimation.
IEEE International Conference on Control and Automation, ICCA.
1033-1035.
2009
Full text if available -
Wang SSong WangManton JH. Blind multichannel identification via frequency selection.
2007 International Symposium on Communications and Information Technologies.
1113-1116.
2007
Full text if available -
Wang SManton JH. A Low Complexity Frequency-domain Approach to SIMO System Identification.
2006 9th International Conference on Control, Automation, Robotics and Vision.
49-52.
2006
Full text if available -
Wang SManton JH. A low complexity frequency-domain approach to SIMO system identification.
2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5.
2269-+.
2006
-
Zhang CWang SXie L. Stable linear d-step ahead predictors with periodic compensation.
Proceedings of the World Congress on Intelligent Control and Automation (WCICA).
2954-2959.
2000
-
Wang SSong WangCishen ZhangLihua Xie. H/sub 2/ optimal inverse of periodic FIR digital filters.
ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
395-398.
1999
Full text if available
-
Yang WJohnstone MNSikos LFWang S. Security and forensics in the Internet of Things: research advances and challenges.
Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020.
12-17.
2020