Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems., , , , , and . CoRR, (2018)Secure Chaff-less Fuzzy Vault for Face Identification Systems., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (3): 79:1-79:22 (2021)Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources., , , and . J. Inf. Secur. Appl., (2021)Cancellable speech template via random binary orthogonal matrices projection hashing., , , , , , and . Pattern Recognit., (2018)Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation., , , and . Pattern Recognit., (2016)Open-set face identification with index-of-max hashing by learning., , , , , and . Pattern Recognit., (2020)A Revocable Fingerprint Template for Security and Privacy Preserving., , , and . KSII Trans. Internet Inf. Syst., 4 (6): 1327-1342 (2010)A Framework Integrating Heterogeneous Databases for the Completion of Gene Networks., , , , and . IEEE Access, (2019)Range-Aided LiDAR-Inertial Multi-Vehicle Mapping in Degenerate Environment., and . CoRR, (2023)Pose-guided matching based on deep learning for assessing quality of action on rehabilitation training., , , , , and . Biomed. Signal Process. Control., 72 (Part): 103323 (2022)