Liaojun Pang
Orcid: 0000-0002-2388-2806
According to our database1,
Liaojun Pang
authored at least 74 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sensors, May, 2024
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash.
IEEE Trans. Inf. Forensics Secur., 2024
2022
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates.
IEEE Trans. Syst. Man Cybern. Syst., 2022
PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching.
IEEE Trans. Inf. Forensics Secur., 2022
ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention.
Signal Image Video Process., 2022
Sensors, 2022
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability.
J. Inf. Secur. Appl., 2022
Composite Fixed-Length Ordered Features for Palmprint Template Protection with Diminished Performance Loss.
CoRR, 2022
YoloMask: An Enhanced YOLO Model for Detection of Face Mask Wearing Normality, Irregularity and Spoofing.
Proceedings of the Biometric Recognition - 16th Chinese Conference, 2022
2021
Compact and Cancelable Fingerprint Binary Codes Generation via One Permutation Hashing.
IEEE Signal Process. Lett., 2021
Sensors, 2021
2020
Ordered and fixed-length bit-string fingerprint representation with minutia vicinity combined feature and spectral clustering.
IET Image Process., 2020
CoRR, 2020
ROSE: Real One-Stage Effort to Detect the Fingerprint Singular Point Based on Multi-scale Spatial Attention.
CoRR, 2020
2019
IET Image Process., 2019
Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC.
IEEE Access, 2019
IEEE Access, 2019
2018
Int. J. Commun. Syst., 2018
Palmprint recognition using a modified competitive code with distinctive extended neighbourhood.
IET Comput. Vis., 2018
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings.
IEEE Access, 2018
IEEE Access, 2018
2017
Int. J. Commun. Syst., 2017
IET Inf. Secur., 2017
Palmprint recognition based on Harris corner detection and statistical offset matching.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017
2016
Secur. Commun. Networks, 2016
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model.
Int. J. Distributed Sens. Networks, 2016
Int. J. Distributed Sens. Networks, 2016
2015
J. Interconnect. Networks, 2015
Comput. J., 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2014
2013
Inf. Process. Lett., 2013
IEICE Trans. Inf. Syst., 2013
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness.
Comput. Informatics, 2013
Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
2012
Int. J. Inf. Technol. Manag., 2012
Improved multicast key management of Chinese wireless local area network security standard.
IET Commun., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Random local region descriptor (RLRD): A new method for fixed-length feature representation of fingerprint image and its application to template protection.
Future Gener. Comput. Syst., 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
IEEE Signal Process. Lett., 2011
Pattern Recognit. Lett., 2011
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
IEEE Trans. Wirel. Commun., 2010
J. Netw. Comput. Appl., 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Fuzzy Information and Engineering, 2007
2006
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006
2005
Appl. Math. Comput., 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005