Zhe Jin

Orcid: 0000-0003-4501-7992

According to our database1, Zhe Jin authored at least 94 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A knowledge-guided and traditional Chinese medicine informed approach for herb recommendation.
Frontiers Inf. Technol. Electron. Eng., October, 2023

Multi-task Pre-training with Soft Biometrics for Transfer-learning Palmprint Recognition.
Neural Process. Lett., June, 2023

MPS-FFA: A multiplane and multiscale feature fusion attention network for Alzheimer's disease prediction with structural MRI.
Comput. Biol. Medicine, May, 2023

Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2023

On Computational Entanglement and Its Interpretation in Adversarial Machine Learning.
CoRR, 2023

UMS-VINS: United Monocular-Stereo Features for Visual-Inertial Tightly Coupled Odometry.
CoRR, 2023

Range-Aided LiDAR-Inertial Multi-Vehicle Mapping in Degenerate Environment.
CoRR, 2023

Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint.
Comput. Secur., 2023

A Video Face Recognition Leveraging Temporal Information Based on Vision Transformer.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

L<sup>2</sup>DM: A Diffusion Model for Low-Light Image Enhancement.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Random Undersampling and Local-Global Matching Mechanism for Cancellable Biometrics Against Authentication Attack.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

Adversarial Face Example Generation in AMBTC Compressed Domain.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

SP<sup>2</sup>IN: Leveraging Fuzzy Commitment and LDPC Sum-Product Decoder for Key Generation from Face.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

Alignment-Free Iris Cancellable Template Protection Scheme Based on Code-Blocks Encoding.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

R-IoM: Enhance Biometric Security with Redundancy-Reduced Hashcode Reliability.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

2022
Review of Generative Adversarial Networks in mono- and cross-modal biomedical image registration.
Frontiers Neuroinformatics, August, 2022

Alignment-Robust Cancelable Biometric Scheme for Iris Verification.
IEEE Trans. Inf. Forensics Secur., 2022

Reinforced Palmprint Reconstruction Attacks in Biometric Systems.
Sensors, 2022

Reconstruct Face from Features Using GAN Generator as a Distribution Constraint.
CoRR, 2022

Pose-guided matching based on deep learning for assessing quality of action on rehabilitation training.
Biomed. Signal Process. Control., 2022

A Framework for Multimodal Biometric Authentication Systems With Template Protection.
IEEE Access, 2022

Shadow Knowledge Distillation: Bridging Offline and Online Knowledge Transfer.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Teacher-free Distillation via Regularizing Intermediate Representation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Boosting Online Feature Transfer via Separable Feature Fusion.
Proceedings of the International Joint Conference on Neural Networks, 2022

SLD-MAP: Surfel-Line Real-time Dense Mapping.
Proceedings of the 17th International Conference on Control, 2022

Abandoning the Bayer-Filter to See in the Dark.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Secure Chaff-less Fuzzy Vault for Face Identification Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics.
IEEE Trans. Dependable Secur. Comput., 2021

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities.
J. Netw. Comput. Appl., 2021

Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources.
J. Inf. Secur. Appl., 2021

A Tokenless Cancellable Scheme for Multimodal Biometric Systems.
Comput. Secur., 2021

Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision Workshops, 2021

BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition.
Proceedings of the 16th IEEE International Conference on Automatic Face and Gesture Recognition, 2021

Towards Generating High Definition Face Images from Deep Templates.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
Finger Vein Template Protection Based on Alignment-Robust Feature Description and Index-of-Maximum Hashing.
IEEE Trans. Biom. Behav. Identity Sci., 2020

De-Skewing LiDAR Scan for Refinement of Local Mapping.
Sensors, 2020

Open-set face identification with index-of-max hashing by learning.
Pattern Recognit., 2020

Security analysis of cancellable biometrics using constrained-optimized similarity-based attack.
CoRR, 2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020

Structure-based virtual screening of influenza virus RNA polymerase inhibitors from natural compounds: Molecular dynamics simulation and MM-GBSA calculation.
Comput. Biol. Chem., 2020

Input-Dependent Error Sketching Model Enabled Information Theoretical Secure Sketch.
IEEE Access, 2020

A Novel Deep Neural Networks Model Based on Prime Numbers for Y DNA Haplogroup Prediction.
IEEE Access, 2020

Multi-spectral Facial Landmark Detection.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Cross-spectrum Face Recognition Using Subspace Projection Hashing.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme.
Symmetry, 2019

Traditional Chinese medicine clinical records classification with BERT and domain specific corpora.
J. Am. Medical Informatics Assoc., 2019

Symmetric keyring encryption scheme for biometric cryptosystem.
Inf. Sci., 2019

On the Reliability of Cancelable Biometrics: Revisit the Irreversibility.
CoRR, 2019

A Framework Integrating Heterogeneous Databases for the Completion of Gene Networks.
IEEE Access, 2019

A Secure Visual-thermal Fused Face Recognition System Based on Non-Linear Hashing.
Proceedings of the 21st IEEE International Workshop on Multimedia Signal Processing, 2019

Named Entity Recognition in Traditional Chinese Medicine Clinical Cases Combining BiLSTM-CRF with Knowledge Graph.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing.
Proceedings of the 7th International Workshop on Biometrics and Forensics, 2019

Mixing Binary Face and Fingerprint based on Extended Feature Vector (EFV) Hashing.
Proceedings of the 2019 International Symposium on Intelligent Signal Processing and Communication Systems, 2019

Reversible Data Embedding For Fingerprint Minutiae Templates Authentication.
Proceedings of the 2019 International Symposium on Intelligent Signal Processing and Communication Systems, 2019

What Do Developers Discuss about Biometric APIs?
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Finger-Vein Template Protection based on Alignment-Free Hashing.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
A Topic Modeling Approach for Traditional Chinese Medicine Prescriptions.
IEEE Trans. Knowl. Data Eng., 2018

Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2018

Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognit., 2018

An alignment-free cancelable fingerprint template for bio-cryptosystems.
J. Netw. Comput. Appl., 2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems.
CoRR, 2018

One-factor Cancellable Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV) Hashing.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Cancellable iris template generation based on Indexing-First-One hashing.
Pattern Recognit., 2017

A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing.
CoRR, 2017

A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Bayesian Networks with Structural Restrictions: Parallelization, Performance, and Efficient Cross-Validation.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Incorporating Knowledge Graph Embeddings into Topic Modeling.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication.
IEEE Trans. Syst. Man Cybern. Syst., 2016

Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation.
Pattern Recognit., 2016

Rank Correlation Measure: A Representational Transformation for Biometric Template Protection.
CoRR, 2016

Iris Cancellable Template Generation Based on Indexing-First-One Hashing.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Dynamic Pico Switch On/Off Algorithm for Energy Saving in Heterogeneous Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Small-angle approximation attack on angle-based many-to-one functions for biometric templates.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template.
Secur. Commun. Networks, 2014

A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template.
Pattern Recognit. Lett., 2014

Non-invertible analysis on Graph-based Hamming Embedding Transform for protecting fingerprint minutiae.
Proceedings of the International Conference on Electronics, Information and Communications, 2014

2013
Argument on biometrics identity-based encryption schemes.
Secur. Commun. Networks, 2013

2012
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012

Fingerprint template protection with minutiae-based bit-string for security and privacy preserving.
Expert Syst. Appl., 2012

2011
Fingerprint template protection with Minutia Vicinity Decomposition.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2010
A Revocable Fingerprint Template for Security and Privacy Preserving.
KSII Trans. Internet Inf. Syst., 2010

The Effects of Individual Differences in Two Persons on the Distributed and Cooperative KJ Method in an Anonymous Environment.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

2009
Behavioral Modeling of RF Power amplifiers Using Modified Volterra Series.
J. Circuits Syst. Comput., 2009

Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing.
Proceedings of the Visual Informatics: Bridging Research and Practice, 2009

A Prototype Implementation of PPX: Pretty Printer for XML.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009


  Loading...