Liaojun Pang

Orcid: 0000-0002-2388-2806

According to our database1, Liaojun Pang authored at least 74 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HyperFace: A Deep Fusion Model for Hyperspectral Face Recognition.
Sensors, May, 2024

Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash.
IEEE Trans. Inf. Forensics Secur., 2024

2022
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates.
IEEE Trans. Syst. Man Cybern. Syst., 2022

PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching.
IEEE Trans. Inf. Forensics Secur., 2022

ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention.
Signal Image Video Process., 2022

GMLM-CNN: A Hybrid Solution to SWIR-VIS Face Verification with Limited Imagery.
Sensors, 2022

Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability.
J. Inf. Secur. Appl., 2022

Composite Fixed-Length Ordered Features for Palmprint Template Protection with Diminished Performance Loss.
CoRR, 2022

A Demographic Attribute Guided Approach to Age Estimation.
CoRR, 2022

A Bidirectional Conversion Network for Cross-Spectral Face Recognition.
CoRR, 2022

YoloMask: An Enhanced YOLO Model for Detection of Face Mask Wearing Normality, Irregularity and Spoofing.
Proceedings of the Biometric Recognition - 16th Chinese Conference, 2022

2021
Compact and Cancelable Fingerprint Binary Codes Generation via One Permutation Hashing.
IEEE Signal Process. Lett., 2021

Balancing Heterogeneous Image Quality for Improved Cross-Spectral Face Recognition.
Sensors, 2021

2020
Ordered and fixed-length bit-string fingerprint representation with minutia vicinity combined feature and spectral clustering.
IET Image Process., 2020

MPKC-based threshold proxy signcryption scheme.
Int. Arab J. Inf. Technol., 2020

HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion.
CoRR, 2020

ROSE: Real One-Stage Effort to Detect the Fingerprint Singular Point Based on Multi-scale Spatial Attention.
CoRR, 2020

2019
Successive minutia-free mosaicking for small-sized fingerprint recognition.
IET Image Process., 2019

Singular points detection with semantic segmentation networks.
CoRR, 2019

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC.
IEEE Access, 2019

Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel.
IEEE Access, 2019

2018
Research on oblivious keyword search protocols with CKA security.
Int. J. Commun. Syst., 2018

Palmprint recognition using a modified competitive code with distinctive extended neighbourhood.
IET Comput. Vis., 2018

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings.
IEEE Access, 2018

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials.
IEEE Access, 2018

2017
Efficient and secure certificateless signature scheme in the standard model.
Int. J. Commun. Syst., 2017

Directed proxy signature with fast revocation proven secure in the standard model.
IET Inf. Secur., 2017

Palmprint recognition based on Harris corner detection and statistical offset matching.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
User-friendly random-grid-based visual secret sharing for general access structures.
Secur. Commun. Networks, 2016

Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model.
Int. J. Distributed Sens. Networks, 2016

Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme.
Int. J. Distributed Sens. Networks, 2016

2015
Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior.
J. Interconnect. Networks, 2015

Anonymous multi-receiver ID-based signcryption scheme.
IET Inf. Secur., 2015

Generalized Random Grid-Based Visual Secret Sharing for General Access Structures.
Comput. J., 2015

Instruction Clustering Analysis for Network Protocol's Abnormal Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Analyze Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on P2P, 2015

2014
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014

Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2014

2013
Fingerprint classification by a hierarchical classifier.
Pattern Recognit., 2013

Improvement on Meshram et al.'s ID-based cryptographic mechanism.
Inf. Process. Lett., 2013

A Trusted Network Access Protocol for WLAN Mesh Networks.
IEICE Trans. Inf. Syst., 2013

nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness.
Comput. Informatics, 2013

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An efficient authentication protocol with user anonymity for mobile networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Multi fuzzy vault based on secret sharing for deadlock restoration.
Int. J. Inf. Technol. Manag., 2012

Improved multicast key management of Chinese wireless local area network security standard.
IET Commun., 2012

Verification of Trusted Network Access Protocols in the Strand Space Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Random local region descriptor (RLRD): A new method for fixed-length feature representation of fingerprint image and its application to template protection.
Future Gener. Comput. Syst., 2012

Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Fingerprint Singular Point Detection Based on Multiple-Scale Orientation Entropy.
IEEE Signal Process. Lett., 2011

A key binding system based on n-nearest minutiae structure of fingerprint.
Pattern Recognit. Lett., 2011

Fingerprint matching by incorporating minutiae discriminability.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

A Novel Hash-based RFID Mutual Authentication Protocol.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Fast Network Traffic Anomaly Detection Based on Iteration.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wirel. Commun., 2010

Minutiae and modified Biocode fusion for fingerprint-based key generation.
J. Netw. Comput. Appl., 2010

Secure Communication Model of WSN Based on Secret Sharing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Identity Authentication Based on Fuzzy Vault and Digital Certificate.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

On Trust Degree-Based Usage Control in DRM System.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Anonymous Communication in Wireless Mesh Network.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Layer Key Management Scheme on Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Distributed Event-Triggered Trust Management for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Key Binding Based on Biometric Shielding Functions.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Attacks on a Universal Designated Verifier Signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Novel Biometric-Based Authentication Scheme with Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Multi-party Non-repudiation Protocol with Different Message Exchanged.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Improvement on WLAN Multicast Key Management Protocol.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
An Efficient Threshold Multi-group-Secret Sharing Scheme.
Proceedings of the Fuzzy Information and Engineering, 2007

2006
A Secure and Efficient Secret Sharing Scheme with General Access Structures.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing.
Appl. Math. Comput., 2005

An Improved Multi-stage (<i>t</i>, <i>n</i>)-Threshold Secret Sharing Scheme.
Proceedings of the Advances in Web-Age Information Management, 2005

A New (<i>t</i>, <i>n</i>)-Threshold Multi-secret Sharing Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...