Ying-Han Pang

Orcid: 0000-0002-3781-6623

According to our database1, Ying-Han Pang authored at least 46 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Smartphone-based human activity recognition using lightweight multiheaded temporal convolutional network.
Expert Syst. Appl., October, 2023

The Development of a Data Collection and Browser Fingerprinting System.
Sensors, March, 2023

Cascading Global and Local Deep Features for Smartphone-based Human Activity Classification.
Proceedings of the 12th International Conference on Software and Computer Applications, 2023

2022
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling.
Inf. Secur. J. A Glob. Perspect., 2022

In-air Hand Gesture Signature Recognition: An iHGS Database Acquisition Protocol.
F1000Research, 2022

2021
Toward forecasting future day air pollutant index in Malaysia.
J. Supercomput., 2021

Spatiotemporal spectral histogramming analysis in hand gesture signature recognition.
J. Intell. Fuzzy Syst., 2021

MSTCN: A multiscale temporal convolutional network for user independent human activity recognition.
F1000Research, 2021

Stacked deep analytic model for human activity recognition on a UCI HAR database.
F1000Research, 2021

In-air hand gesture signature using transfer learning and its forgery attack.
Appl. Soft Comput., 2021

2019
In-air hand gesture signature recognition system based on 3-dimensional imagery.
Multim. Tools Appl., 2019

Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Vision-based Human Action Recognition on Pre-trained AlexNet.
Proceedings of the 9th IEEE International Conference on Control System, 2019

2018
Enhanced independent spectral histogram representations in face recognition.
Multim. Tools Appl., 2018

Study of long short-term memory in flow-based network intrusion detection system.
J. Intell. Fuzzy Syst., 2018

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.
J. Intell. Fuzzy Syst., 2018

Localized Temporal Representation in Human Action Recognition.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

2016
Image-based handwritten signature verification using hybrid methods of discrete Radon transform, principal component analysis and probabilistic neural network.
Appl. Soft Comput., 2016

Biometric Access Control with High Dimensional Facial Features.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Locality Regularization Embedding for face verification.
Pattern Recognit., 2015

A performance analysis on packet scheduling schemes based on an exponential rule for real-time traffic in LTE.
EURASIP J. Wirel. Commun. Netw., 2015

Real time mobile application of in-air signature with Fast Dynamic Time Warping (FastDTW).
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

Intelligent web crawler for file safety inspection.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

Face recognition via semi-supervised discriminant local analysis.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

Can subspace based learning approach perform on makeup face recognition?
Proceedings of the 2015 IEEE International Conference on Control System, 2015

2014
Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform.
Secur. Commun. Networks, 2014

Wavelet Based SDA for Face Recognition.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

2013
A novel illumination normalization algorithm for face recognition.
Proceedings of the 2013 IEEE International Conference on Signal and Image Processing Applications, 2013

2012
Regularized locality preserving discriminant embedding for face recognition.
Neurocomputing, 2012

2011
Kernel Discriminant Embedding in face recognition.
J. Vis. Commun. Image Represent., 2011

2009
Neighbourhood preserving discriminant embedding in face recognition.
J. Vis. Commun. Image Represent., 2009

Analysis on Supervised Neighborhood Preserving Embedding.
IEICE Electron. Express, 2009

2008
Neighbourhood Discriminant Embedding in face recognition.
IEICE Electron. Express, 2008

Face recognition based on neighbourhood discriminant preserving embedding.
Proceedings of the 10th International Conference on Control, 2008

Neighbourhood Discriminant Locally Linear Embedding in Face Recognition.
Proceedings of the Fifth International Conference on Computer Graphics, 2008

2007
Two-Factor Cancelable Biometrics Authenticator.
J. Comput. Sci. Technol., 2007

Touch-less Fingerprint Recognition System.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

Random Projection with Robust Linear Discriminant Analysis Model in Face Recognition.
Proceedings of the 4th International Conference on Computer Graphics, 2007

2006
A Discriminant Pseudo Zernike Moments in Face Recognition.
J. Res. Pract. Inf. Technol., 2006

2005
Enhanced pseudo Zernike moments in face recognition.
IEICE Electron. Express, 2005

Binarized Revocable Biometrics in Face Recognition.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Robust Face Recognition System.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

2004
Face authentication system using pseudo Zernike moments on wavelet subband.
IEICE Electron. Express, 2004

Palmprint Verification with Moments.
Proceedings of the 12-th International Conference in Central Europe on Computer Graphics, 2004

Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

An Efficient Method for Human Face Recognition Using Wavelet Transform and Zernike Moments.
Proceedings of the 2004 International Conference on Computer Graphic, 2004


  Loading...