Bian Yang

According to our database1, Bian Yang authored at least 80 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Psychological influences on drivers' yielding behavior at the crosswalk of intersections.
Cogn. Technol. Work., 2020

2019
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey.
Proceedings of the pHealth 2019 - Proceedings of the 16th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2019

Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Framework for Healthcare Security Practice Analysis, Modeling and Incentivization.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

2018
Managing Private Credentials by Privacy-Preserving Biometrics.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Message from the SDIM 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Towards an Operable Evaluation System for Evidence of Identity.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Development of a Three-Dimensional Multimode Visual Immersive System With Applications in Telepresence.
IEEE Systems Journal, 2017

Biometric template protection based on Bloom filters and honey templates.
IET Biom., 2017

A Novel Binarization Scheme for Real-Valued Biometric Feature.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Fingerprint Indexing Algorithm on Encrypted Domain.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Crowd-Sourced Air Quality and Physical Activity Monitoring by a Low-Cost Mobile Platform.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

What Make You Sure that Health Informatics Is Secure.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

Message from the NETSAP and SIMICE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Multibiometrics and Data Fusion Standardization.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Towards generating protected fingerprint templates based on bloom filters.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction.
Proceedings of the IEEE International Conference on Identity, 2015

Using Honey Templates to Augment Hash Based Biometric Template Protection.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Message from the SIMICE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Protected Honey Face Templates.
Proceedings of the BIOSIG 2015, 2015

A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation.
Proceedings of the BIOSIG 2015, 2015

2014
Erasable Photograph Tagging: A Mobile Application Framework Employing Owner's Voice.
IEICE Trans. Inf. Syst., 2014

A novel approach used for measuring fingerprint orientation of arch fingerprint.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Cloud Password Manager Using Privacy-Preserved Biometrics.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Improved face recognition at a distance using light field camera & super resolution schemes.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Multi-face Recognition at a Distance Using Light-Field Camera.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Lightweight Quality Metrics for Smartphone Camera Based Fingerprint Samples.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Robust "On-the-Fly" person identification using Sparse Representation.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Qualifying fingerprint samples captured by smartphone cameras.
Proceedings of the IEEE International Conference on Image Processing, 2013

Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms.
Proceedings of the Image Analysis and Recognition - 10th International Conference, 2013

Comparative evaluation of super-resolution techniques for multi-face recognition using light-field camera.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

A new perspective - Face recognition with light-field camera.
Proceedings of the International Conference on Biometrics, 2013

A novel image fusion scheme for robust multiple face recognition with light-field camera.
Proceedings of the 16th International Conference on Information Fusion, 2013

Towards standardizing trusted evidence of identity.
Proceedings of the DIM'13, 2013

Quality Assessment for Fingerprints Collected by Smartphone Cameras.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Robust iris recognition using light-field camera.
Proceedings of the Colour and Visual Computing Symposium, 2013

Scaling-robust fingerprint verification with smartphone camera in real-life scenarios.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Combining Iris and Periocular Recognition Using Light Field Camera.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

2012
Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level.
Sensors, 2012

Privacy Implications of Identity References in Biometrics Databases.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Generalized fingerprint minutiae vicinities.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Criteria towards metrics for benchmarking template protection algorithms.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

2011
Raster image representation of fingerprint minutiae.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Fusion in fingerprint authentication: two finger types vs. two scanner types.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Fingerprint Recognition with Embedded Cameras on Mobile Phones.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Augmented fingerprint minutiae vicinity.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
A Secure Steganography Method based on Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2010

GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test.
EURASIP J. Inf. Secur., 2010

Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels.
Proceedings of the IEEE International Conference on Systems, 2010

Encrypting Fingerprint Minutiae Templates by Random Quantization.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Joint reversible data hiding and image encryption.
Proceedings of the Media Forensics and Security II, 2010

Robust minutiae hash for fingerprint template protection.
Proceedings of the Media Forensics and Security II, 2010

A Novel and Secure Image Interpolation Methods for Image Disguise.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Fusion in Fingerprint Authentication: Two Finger Scenarios.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Renewable Minutiae Templates with Tunable Size and Security.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

GUC100 Multi-scanner Fingerprint Database for In-House (Semi-public) Performance and Interoperability Evaluation.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Impact of Finger Type in Fingerprint Authentication.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Dynamic random projection for biometric template protection.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
A fast SVD based video watermarking algorithm compatible with MPEG2 Standard.
Soft Comput., 2009

Biometric template protection - The need for open standards.
Datenschutz und Datensicherheit, 2009

Geometric-Aligned Cancelable Fingerprint Templates.
Proceedings of the Image Analysis and Processing, 2009

Stress Test of Roadway Network Capacity.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
JPEG Encryption with File Size Preservation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Compressed domain robust hashing for AAC audio.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

2007
MDCT-Based Perceptual Hashing for Compressed Audio Content Identification.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

An Improved Multi-stage Vector Quantization for Image Coding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Block Mean Value Based Image Perceptual Hashing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

SVD Based Robust Image Content Retrieval.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

SVD Based Blind Video Watermarking Algorithm.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Integer-DCT-based reversible image watermarking by adaptive coefficient modification.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

High-capacity reversible watermarking for 2D vector data.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Approaching optimal value expansion for reversible watermarking.
Proceedings of the 7th workshop on Multimedia & Security, 2005

2004
Integer DCT-based reversible watermarking for images using companding technique.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Reversible image watermarking by histogram modification for integer DCT coefficients.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Reversible watermarking of 2D-vector data.
Proceedings of the 6th workshop on Multimedia & Security, 2004


  Loading...