Bian Yang

Orcid: 0000-0001-6189-1976

According to our database1, Bian Yang authored at least 123 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Novel and Efficient Privacy-Preserving Continuous Authentication.
Cryptogr., March, 2024

E2F-Net: Eyes-to-Face Inpainting via StyleGAN Latent Space.
CoRR, 2024

ChatGPT and biometrics: an assessment of face recognition, gender detection, and age estimation capabilities.
CoRR, 2024

2023
Privacy-preserving continuous authentication using behavioral biometrics.
Int. J. Inf. Sec., December, 2023

IRL-Net: Inpainted Region Localization Network via Spatial Attention.
IEEE Access, 2023

SecHealth: Enhancing EHR Security in Digital Health Transformation.
Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology, 2023

Multi-Party Privacy Policy Management in the Context of Health Monitoring: An Exploratory Study.
Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology, 2023

Threats and Risk on Using Digital Technologies for Remote Health Care Process.
Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology, 2023

Behaviour coding approach for assessing pitfalls in a questionnaire instrument towards assessing healthcare security practice.
Proceedings of the 5th International Conference on Management Science and Industrial Engineering, 2023


Synthetic Face Generation Through Eyes-to-Face Inpainting.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and Indonesia.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

The Impact of Linkability On Privacy Leakage.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
Investigation into Phishing Risk Behaviour among Healthcare Staff.
Inf., 2022

A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals.
Inf., 2022

Differential Privacy Preservation in Robust Continual Learning.
IEEE Access, 2022

E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs.
IEEE Access, 2022

A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare.
Proceedings of the 7th International Conference on Sustainable Information Engineering and Technology, 2022

Keynote Talk: Understanding the Needs in a Future Digital Healthcare.
Proceedings of the 7th International Conference on Sustainable Information Engineering and Technology, 2022

Improving Stress Detection Using Weighted Score-Level Fusion of Multiple Sensor.
Proceedings of the 7th International Conference on Sustainable Information Engineering and Technology, 2022

Response Center Services: An Exploratory Study.
Proceedings of the pHealth 2022 - Proceedings of the 19th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2022

Information Security Risk for Welfare Technology and Personal Healthcare Devices.
Proceedings of the pHealth 2022 - Proceedings of the 19th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2022

An Overview on Security and Privacy of Data in IoMT Devices: Performance Metrics, Merits, Demerits, and Challenges.
Proceedings of the pHealth 2022 - Proceedings of the 19th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2022

Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Analysing digital evidence towards enhancing healthcare security practice: The KID model.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Municipal Cybersecurity - A Neglected Research Area? A Survey of Current Research.
Proceedings of the International Conference on Cybersecurity, 2022

An access control and authentication scheme for secure data sharing in the decentralized cloud storage system.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

PriMe: A Novel Privacy Measuring Framework for Online Social Networks.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
Correction to: A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

Reinforcing Health Data Sharing Through Data Democratization.
Proceedings of the pHealth 2021 - Proceedings of the 18th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2021

Continuous Stress Detection of Hospital Staff Using Smartwatch Sensors and Classifier Ensemble.
Proceedings of the pHealth 2021 - Proceedings of the 18th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2021

Assessing the effect of human factors in healthcare cyber security practice: An empirical study.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Your Privacy Preference Matters: A Qualitative Study Envisioned for Homecare.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Privacy Modelling in Contact Tracing.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Psychological influences on drivers' yielding behavior at the crosswalk of intersections.
Cogn. Technol. Work., 2020

Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review.
Proceedings of the Intelligent Systems and Applications, 2020

On the predictability of biometric honey templates, based on Bayesian inference.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

PassGAN Based Honeywords System for Machine-Generated Passwords Database.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Comparative analysis of machine learning methods for analyzing security practice in electronic health records' logs.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey.
Proceedings of the pHealth 2019 - Proceedings of the 16th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2019

Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Framework for Healthcare Security Practice Analysis, Modeling and Incentivization.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Managing Private Credentials by Privacy-Preserving Biometrics.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Message from the SDIM 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Towards an Operable Evaluation System for Evidence of Identity.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Development of a Three-Dimensional Multimode Visual Immersive System With Applications in Telepresence.
IEEE Syst. J., 2017

Biometric template protection based on Bloom filters and honey templates.
IET Biom., 2017

A Novel Binarization Scheme for Real-Valued Biometric Feature.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Fingerprint Indexing Algorithm on Encrypted Domain.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Crowd-Sourced Air Quality and Physical Activity Monitoring by a Low-Cost Mobile Platform.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

What Make You Sure that Health Informatics Is Secure.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

Message from the NETSAP and SIMICE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Multibiometrics and Data Fusion Standardization.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Towards generating protected fingerprint templates based on bloom filters.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction.
Proceedings of the IEEE International Conference on Identity, 2015

Using Honey Templates to Augment Hash Based Biometric Template Protection.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Message from the SIMICE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Protected Honey Face Templates.
Proceedings of the BIOSIG 2015, 2015

A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation.
Proceedings of the BIOSIG 2015, 2015

2014
Erasable Photograph Tagging: A Mobile Application Framework Employing Owner's Voice.
IEICE Trans. Inf. Syst., 2014

A novel approach used for measuring fingerprint orientation of arch fingerprint.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Cloud Password Manager Using Privacy-Preserved Biometrics.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Improved face recognition at a distance using light field camera & super resolution schemes.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Multi-face Recognition at a Distance Using Light-Field Camera.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Lightweight Quality Metrics for Smartphone Camera Based Fingerprint Samples.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Robust "On-the-Fly" person identification using Sparse Representation.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Qualifying fingerprint samples captured by smartphone cameras.
Proceedings of the IEEE International Conference on Image Processing, 2013

Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms.
Proceedings of the Image Analysis and Recognition - 10th International Conference, 2013

Comparative evaluation of super-resolution techniques for multi-face recognition using light-field camera.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

A new perspective - Face recognition with light-field camera.
Proceedings of the International Conference on Biometrics, 2013

A novel image fusion scheme for robust multiple face recognition with light-field camera.
Proceedings of the 16th International Conference on Information Fusion, 2013

Towards standardizing trusted evidence of identity.
Proceedings of the DIM'13, 2013

Quality Assessment for Fingerprints Collected by Smartphone Cameras.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Robust iris recognition using light-field camera.
Proceedings of the Colour and Visual Computing Symposium, 2013

Scaling-robust fingerprint verification with smartphone camera in real-life scenarios.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Combining Iris and Periocular Recognition Using Light Field Camera.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

2012
Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level.
Sensors, 2012

Privacy Implications of Identity References in Biometrics Databases.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Generalized fingerprint minutiae vicinities.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Criteria towards metrics for benchmarking template protection algorithms.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Collecting fingerprints for recognition using mobile phone cameras.
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012

2011
Raster image representation of fingerprint minutiae.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Fusion in fingerprint authentication: two finger types vs. two scanner types.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Fingerprint Recognition with Embedded Cameras on Mobile Phones.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Augmented fingerprint minutiae vicinity.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
A Secure Steganography Method based on Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2010

GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test.
EURASIP J. Inf. Secur., 2010

Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels.
Proceedings of the IEEE International Conference on Systems, 2010

Encrypting Fingerprint Minutiae Templates by Random Quantization.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Joint reversible data hiding and image encryption.
Proceedings of the Media Forensics and Security II, 2010

Robust minutiae hash for fingerprint template protection.
Proceedings of the Media Forensics and Security II, 2010

A Novel and Secure Image Interpolation Methods for Image Disguise.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Fusion in Fingerprint Authentication: Two Finger Scenarios.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Renewable Minutiae Templates with Tunable Size and Security.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

GUC100 Multi-scanner Fingerprint Database for In-House (Semi-public) Performance and Interoperability Evaluation.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Impact of Finger Type in Fingerprint Authentication.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Dynamic random projection for biometric template protection.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
A fast SVD based video watermarking algorithm compatible with MPEG2 Standard.
Soft Comput., 2009

Biometric template protection - The need for open standards.
Datenschutz und Datensicherheit, 2009

Geometric-Aligned Cancelable Fingerprint Templates.
Proceedings of the Image Analysis and Processing, 2009

Transparent and perceptually enhanced JPEG image encryption.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Stress Test of Roadway Network Capacity.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
JPEG Encryption with File Size Preservation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Compressed domain robust hashing for AAC audio.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

2007
MDCT-Based Perceptual Hashing for Compressed Audio Content Identification.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

An Improved Multi-stage Vector Quantization for Image Coding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Block Mean Value Based Image Perceptual Hashing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

SVD Based Robust Image Content Retrieval.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

SVD Based Blind Video Watermarking Algorithm.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Integer-DCT-based reversible image watermarking by adaptive coefficient modification.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

High-capacity reversible watermarking for 2D vector data.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Approaching optimal value expansion for reversible watermarking.
Proceedings of the 7th workshop on Multimedia & Security, 2005

2004
Integer DCT-based reversible watermarking for images using companding technique.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Reversible image watermarking by histogram modification for integer DCT coefficients.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Reversible watermarking of 2D-vector data.
Proceedings of the 6th workshop on Multimedia & Security, 2004


  Loading...