


default search action
Hengjian Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Md Sabuj Khan, Hengjian Li
, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. Comput. Secur. 142: 103863 (2024) - 2023
- [j15]Yanan Sun, Hengjian Li
, Nianqiang Li:
A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter. Comput. Secur. 125: 103021 (2023) - 2022
- [j14]Hengjian Li, Xiyu Wang:
One factor cancellable fingerprint scheme based on novel minimum hash signature and secure extended feature vector. Multim. Tools Appl. 81(9): 13087-13113 (2022) - 2021
- [j13]Hengjian Li
, Changzhi Yu, Xiyu Wang:
A novel 1D chaotic system for image encryption, authentication and compression in cloud. Multim. Tools Appl. 80(6): 8721-8758 (2021) - 2020
- [j12]Hengjian Li
, Jian Qiu, Andrew Beng Jin Teoh:
Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multim. Tools Appl. 79(17-18): 11947-11971 (2020)
2010 – 2019
- 2019
- [j11]Xiyu Wang, Hengjian Li
:
One-Factor Cancellable Palmprint Recognition Scheme Based on OIOM and Minimum Signature Hash. IEEE Access 7: 131338-131354 (2019) - [j10]Jian Qiu, Heng-Jian Li, Chuan Zhao:
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Comput. Secur. 82: 1-14 (2019) - [j9]Changzhi Yu, Hengjian Li, Xiyu Wang:
SVD-based image compression, encryption, and identity authentication algorithm on cloud. IET Image Process. 13(12): 2224-2232 (2019) - [c14]Jian Qiu, Hengjian Li, Xiyu Wang:
Cancelable Palmprint Feature Generation Method Based on Minimum Signature. FNSS 2019: 118-127 - [c13]Xiyu Wang, Heng-Jian Li, Jian Qiu, Changzhi Yu:
Palm vein recognition based on competitive code and DPL. ICCSP 2019: 179-183 - 2018
- [j8]Guang Feng, Hengjian Li, Jiwen Dong, Jiashu Zhang:
Face recognition based on Volterra kernels direct discriminant analysis and effective feature classification. Inf. Sci. 441: 187-197 (2018) - [c12]Xiyu Wang, Hengjian Li, Jian Qiu, Changzhi Yu:
Competition Code And LBP Palm Vein Feature-Level Fusion Using Canonical Correlation Analysis. SPAC 2018: 37-41 - 2017
- [c11]Jiwen Dong, Yunxing Gao, Hengjian Li, Tianmei Guo:
Bilateral Filtering NIN Network for Image Classification. ICIC (2) 2017: 655-665 - [c10]Changzhi Yu, Hengjian Li, Ziru Zhao, Jiwen Dong:
A High and Efficient Sparse and Compressed Sensing-Based Security Approach for Biometric Protection. ICIC (2) 2017: 666-677 - [c9]Jian Qiu, Hengjian Li, Jiwen Dong, Guang Feng:
A Privacy-preserving Cancelable Palmprint Template Generation Scheme Using Noise Data. ICIIP 2017: 29:1-29:5 - [c8]Xiaofeng Qu, Hengjian Li, Jiwen Dong:
Face Anti-spoofing Algorithm Based on Gray Level Co-occurrence Matrix and Dual Tree Complex Wavelet Transform. IDEAL 2017: 192-200 - [c7]Guang Feng, Hengjian Li, Jiwen Dong, Xi Chen:
Sparse Representation Based on Discriminant Locality Preserving Dictionary Learning for Face Recognition. IDEAL 2017: 306-314 - 2016
- [c6]Guang Feng, Hengjian Li, Jiwen Dong, Jiashu Zhang:
Direct Discriminant Analysis Using Volterra Kernels for Face Recognition. CCPR (1) 2016: 404-412 - 2015
- [j7]Zutao Zhang
, Yipeng Zheng, Hong Xu
, Hengjian Li:
A novel elevator group control algorithm based on binocular-cameras corridor passenger detection and tracking. Multim. Tools Appl. 74(6): 1761-1775 (2015) - 2014
- [j6]Ming-Quan Fan, Hong-Xia Wang, Heng-Jian Li:
A fingerprint-based audio authentication scheme using frequency domain statistical characteristic. Multim. Tools Appl. 70(3): 2255-2270 (2014) - [j5]Hengjian Li, Jiashu Zhang, Lianhai Wang:
Robust palmprint identification based on directional representations and compressed sensing. Multim. Tools Appl. 70(3): 2331-2345 (2014) - [c5]Hengjian Li, Jiwen Dong, Jinping Li, Lei Wang:
Novel palmprint representations for palmprint recognition. ICMV 2014: 944505 - [c4]Hengjian Li, Jinwen Dong, Jinping Li:
Two-dimensional direct discriminant locality preserving projection analysis for face recognition. ISBAST 2014: 18-23 - 2013
- [j4]Ming-Quan Fan, Peipei Liu, Hong-Xia Wang, Heng-Jian Li:
A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform. Int. J. Comput. Math. 90(12): 2588-2602 (2013) - [c3]Hengjian Li, Lianhai Wang, Jiashu Zhang, Zutao Zhang
:
Face recognition using sparse representation classifier with Volterra kernels. ICMV 2013: 906709 - 2012
- [j3]Song Zhao, Yan Xu, Hengjian Li, Heng Yang:
A Comparison of Lossless Compression Methods for Palmprint Images. J. Softw. 7(3): 594-598 (2012) - [j2]Hengjian Li, Lianhai Wang, Ruichao Zhang, Lu Wu:
A High Performance and Secure Palmprint Template Protection Scheme. J. Softw. 7(8): 1827-1834 (2012) - [c2]Hengjian Li, Lianhai Wang, Zutao Zhang
:
Robust Palmprint Recognition Based on Directional Representations. Intelligent Information Processing 2012: 372-381 - 2010
- [j1]Hengjian Li, Jiashu Zhang, Zutao Zhang
:
Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inf. Sci. 180(20): 3876-3893 (2010)
2000 – 2009
- 2008
- [c1]Zhao Song, Hengjian Li, Yan Xu:
A Secure and Efficient Fingerprint Images Encryption Scheme. ICYCS 2008: 2803-2808
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint