default search action
Yen-Lung Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Hui Zhang, Xingbo Dong, Yen-Lung Lai, Ying Zhou, Xiaoyan Zhang, Xingguo Lv, Zhe Jin, Xuejun Li:
Validating Privacy-Preserving Face Recognition Under a Minimum Assumption. CVPR 2024: 12205-12214 - [i6]Xingbo Dong, Hui Zhang, Yen-Lung Lai, Zhe Jin, Junduan Huang, Wenxiong Kang, Andrew Beng Jin Teoh:
WiFaKey: Generating Cryptographic Keys from Face in the Wild. CoRR abs/2407.14804 (2024) - 2023
- [j11]Yen-Lung Lai, Xingbo Dong, Zhe Jin, Massimo Tistarelli, Wun-She Yap, Bok-Min Goi:
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography. IEEE Trans. Inf. Forensics Secur. 18: 3101-3115 (2023) - [c11]Muhammad Jahangir, Ming Jie Lee, Ban-Hoe Kwan, Yen-Lung Lai, Zhe Jin, Tong-Yuen Chai:
Alignment-Free Iris Cancellable Template Protection Scheme Based on Code-Blocks Encoding. CCBR 2023: 291-300 - [c10]Zheng Hui Goh, Shiuan-Ni Liang, Zhe Jin, Yen-Lung Lai, Ming Jie Lee, Xin Wang:
R-IoM: Enhance Biometric Security with Redundancy-Reduced Hashcode Reliability. CCBR 2023: 340-349 - [c9]Dezhi Li, Hojin Park, Xingbo Dong, Yen-Lung Lai, Hui Zhang, Andrew Beng Jin Teoh, Zhe Jin:
Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition. PRCV (5) 2023: 57-73 - [i5]Yen-Lung Lai, Xingbo Dong, Zhe Jin:
On Computational Entanglement and Its Interpretation in Adversarial Machine Learning. CoRR abs/2309.15669 (2023) - 2022
- [j10]Zheng Hui Goh, Yandan Wang, Lu Leng, Shiuan-Ni Liang, Zhe Jin, Yen-Lung Lai, Xin Wang:
A Framework for Multimodal Biometric Authentication Systems With Template Protection. IEEE Access 10: 96388-96402 (2022) - [c8]Yen-Lung Lai, Tong-Yuen Chai, Ming Jie Lee, Bok-Min Goi:
Iriscode Matching Comparator to Improve Decidability of Human Iris Recognition. ICDSP 2022: 120-126 - 2021
- [b1]Yen-Lung Lai:
Secure Authentication with Noisy Sources. Monash University, Australia, 2021 - [j9]Yen-Lung Lai, Minyi Li, Shiuan-Ni Liang, Zhe Jin:
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources. J. Inf. Secur. Appl. 58: 102695 (2021) - [j8]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics. IEEE Trans. Dependable Secur. Comput. 18(1): 58-71 (2021) - [j7]Yen-Lung Lai, Zhe Jin, KokSheik Wong, Massimo Tistarelli:
Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes. IEEE Trans. Inf. Forensics Secur. 16: 3170-3185 (2021) - 2020
- [j6]Yen-Lung Lai, Zhe Jin:
Input-Dependent Error Sketching Model Enabled Information Theoretical Secure Sketch. IEEE Access 8: 134681-134694 (2020) - [j5]Simon Kirchgasser, Christof Kauba, Yen-Lung Lai, Zhe Jin, Andreas Uhl:
Finger Vein Template Protection Based on Alignment-Robust Feature Description and Index-of-Maximum Hashing. IEEE Trans. Biom. Behav. Identity Sci. 2(4): 337-349 (2020)
2010 – 2019
- 2019
- [j4]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
Symmetric keyring encryption scheme for biometric cryptosystem. Inf. Sci. 502: 492-509 (2019) - [c7]Simon Kirchgasser, Andreas Uhl, Yen-Lung Lai, Zhe Jin:
Finger-Vein Template Protection based on Alignment-Free Hashing. BTAS 2019: 1-10 - [c6]Yen-Lung Lai, Ming Jie Lee, Zhe Jin, KokSheik Wong:
Reversible Data Embedding For Fingerprint Minutiae Templates Authentication. ISPACS 2019: 1-2 - [i4]Yen-Lung Lai:
Secure Sketch for All Noisy Sources. CoRR abs/1911.10201 (2019) - 2018
- [j3]Kong-Yik Chee, Zhe Jin, Danwei Cai, Ming Li, Wun-She Yap, Yen-Lung Lai, Bok-Min Goi:
Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recognit. 76: 273-287 (2018) - [j2]Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. IEEE Trans. Inf. Forensics Secur. 13(2): 393-407 (2018) - [c5]Yik-Herng Khoo, Bok-Min Goi, Tong-Yuen Chai, Yen-Lung Lai, Zhe Jin:
Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint. ICAIP 2018: 6-10 - [i3]Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh:
A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems. CoRR abs/1809.11045 (2018) - 2017
- [j1]Yen-Lung Lai, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Wun-She Yap, Tong-Yuen Chai, Christian Rathgeb:
Cancellable iris template generation based on Indexing-First-One hashing. Pattern Recognit. 64: 105-117 (2017) - [c4]Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai:
Alignment-free indexing-first-one hashing with bloom filter integration. ISI 2017: 78-82 - [c3]Zhe Jin, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. MONAMI 2017: 378-389 - [i2]Zhe Jin, Yen-Lung Lai, Jung Yeon Hwang, Soohyung Kim, Andrew Beng Jin Teoh:
A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing. CoRR abs/1703.05455 (2017) - 2016
- [c2]Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap:
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. NSS 2016: 450-463 - [i1]Zhe Jin, Yen-Lung Lai, Andrew Beng Jin Teoh:
Rank Correlation Measure: A Representational Transformation for Biometric Template Protection. CoRR abs/1607.06902 (2016) - 2015
- [c1]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Wai-Kiat Chin, Yen-Lung Lai:
Local Chan-Vese segmentation for non-ideal visible wavelength iris images. TAAI 2015: 506-511
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint