Wencheng Yang
Orcid: 0000-0001-7800-2215
According to our database1,
Wencheng Yang
authored at least 60 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning.
Future Internet, March, 2024
CAAI Trans. Intell. Technol., February, 2024
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model.
IEEE Open J. Comput. Soc., 2024
Image Vis. Comput., 2024
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences.
Array, 2024
2023
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things.
J. Inf. Secur. Appl., June, 2023
Sensors, April, 2023
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023
Proceedings of the Health Information Science - 12th International Conference, 2023
2022
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.
Sensors, 2022
Passive Inverted Ultra-Short Baseline Positioning for a Disc-Shaped Autonomous Underwater Vehicle: Design and Field Experiments.
IEEE Robotics Autom. Lett., 2022
IEEE Open J. Comput. Soc., 2022
A Privacy-Preserving ECG-Based Authentication System for Securing Wireless Body Sensor Networks.
IEEE Internet Things J., 2022
Multimedia security and privacy protection in the internet of things: research developments and challenges.
Int. J. Multim. Intell. Secur., 2022
Comput. Secur., 2022
2021
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study.
Sensors, 2021
Pattern Recognit., 2021
Pattern Recognit., 2021
A cancelable biometric authentication system based on feature-adaptive random projection.
J. Inf. Secur. Appl., 2021
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation.
CoRR, 2021
Aircraft Detection for Remote Sensing Image Based on Bidirectional and Dense Feature Fusion.
Comput. Intell. Neurosci., 2021
IEEE Access, 2021
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021
2020
Pattern Recognit., 2020
No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design.
IEEE Access, 2020
A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Digital Image Computing: Techniques and Applications, 2020
2019
IEEE J. Biomed. Health Informatics, 2019
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram.
IEEE Trans. Ind. Informatics, 2019
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019
ICT Express, 2019
IEEE Commun. Mag., 2019
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
2018
Wirel. Commun. Mob. Comput., 2018
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.
J. Supercomput., 2018
Pattern Recognit., 2018
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018
2017
Pattern Recognit., 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
2015
PhD thesis, 2015
2014
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement.
IEEE Trans. Inf. Forensics Secur., 2014
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures.
Pattern Recognit., 2014
The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2008
DEMOCO: Energy-Efficient Detection and Monitoring for Continuous Objects in Wireless Sensor Networks.
IEICE Trans. Commun., 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Progress in WWW Research and Development, 2008
PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
An Adaptive Dynamic Cluster-Based Protocol for Target Tracking in Wireless Sensor Networks.
Proceedings of the Advances in Data and Web Management, 2007
A Localized Link Quality-Aware Optimization Mechanism for Routing Protocols in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007