


default search action
Kathy J. Horadam
Person information
- affiliation: RMIT University, School of Science, Melbourne, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j31]Mahshid Sadeghpour
, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam
:
Protection of Sparse Retinal Templates Using Cohort-Based Dissimilarity Vectors. IEEE Trans. Biom. Behav. Identity Sci. 5(2): 233-243 (2023) - 2022
- [c28]Mahshid Sadeghpour
, Arathi Arakala
, Stephen A. Davis
, Kathy J. Horadam
:
GRETINA: A Large-Scale High-Quality Generated Retinal Image Dataset for Security and Privacy Assessment. IVCNZ 2022: 373-387 - 2021
- [j30]Mahshid Sadeghpour
, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Failure of affine-based reconstruction attack in regenerating vascular feature points. IET Biom. 10(5): 497-517 (2021) - 2020
- [c27]Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Application of affine-based reconstruction to retinal point patterns. BIOSIG 2020: 231-238
2010 – 2019
- 2019
- [j29]Taher Alzahrani, Kathy J. Horadam
:
Finding maximal bicliques in bipartite networks using node similarity. Appl. Netw. Sci. 4(1): 21:1-21:25 (2019) - 2018
- [j28]Johannes Kotzerke
, Stephen A. Davis, Jodie McVernon, Kathy J. Horadam:
Steps to solving the infant biometric problem with ridge-based biometrics. IET Biom. 7(6): 567-572 (2018) - 2017
- [j27]V. Alvarez, Félix Gudiel, María-Belén Güemes, Kathy J. Horadam, Asha Rao:
Diagram versus bundle equivalence for ℤt × ℤ22-cocyclic Hadamard matrices. Bull. ICA 81: 63-77 (2017) - [j26]C. J. Carstens, Kathy J. Horadam:
Switching edges to randomize networks: what goes wrong and how to fix it. J. Complex Networks 5(3): 337-351 (2017) - [j25]Arathi Arakala, Stephen A. Davis, Hao Hao, Kathy J. Horadam:
Value of graph topology in vascular biometrics. IET Biom. 6(2): 117-125 (2017) - 2016
- [j24]Johannes Kotzerke
, Hao Hao, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Identification performance of evidential value estimation for ridge-based biometrics. EURASIP J. Inf. Secur. 2016: 24 (2016) - [c26]Scott Cox, Kathy J. Horadam, Asha Rao
:
The spread of ideas in a weighted threshold network. COMPLEX NETWORKS 2016: 437-447 - 2015
- [c25]Johannes Kotzerke, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Identification performance of evidential value estimation for fingermarks. BIOSIG 2015: 97-107 - [c24]A. Hecker, C. J. Carstens, Kathy J. Horadam:
Neighbourhood Distinctiveness: An Initial Study. CompleNet 2015: 99-110 - [c23]Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph for Biometric Authentication. ICISSP (Revised Selected Papers) 2015: 199-218 - [c22]Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph - Feature Extraction and Matching. ICISSP 2015: 295-303 - [c21]Johannes Kotzerke, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Discriminating fingermarks with evidential value for forensic comparison. IWBF 2015: 1-6 - 2014
- [j23]Kathy J. Horadam, M. A. Nyblom:
Distances between sets based on set commonality. Discret. Appl. Math. 167: 310-314 (2014) - [j22]Seyed Mehdi Lajevardi
, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Hand vein authentication using biometric graph matching. IET Biom. 3(4): 302-313 (2014) - [c20]Taher Alzahrani, Kathy J. Horadam:
Analysis of two crime-related networks derived from bipartite social networks. ASONAM 2014: 890-897 - [c19]Taher Alzahrani, Kathy J. Horadam, Serdar Boztas
:
Community Detection in Bipartite Networks Using Random Walks. CompleNet 2014: 157-165 - [c18]Kathy J. Horadam, Mercè Villanueva
:
Relationships Between CCZ and EA Equivalence Classes and Corresponding Code Invariants. SETA 2014: 3-17 - 2013
- [j21]Seyed Mehdi Lajevardi
, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Retina Verification System Based on Biometric Graph Matching. IEEE Trans. Image Process. 22(9): 3625-3635 (2013) - [c17]Johannes Kotzerke, Stephen A. Davis, Kathy J. Horadam, Jodie McVernon
:
Newborn and infant footprint crease pattern extraction. ICIP 2013: 4181-4185 - [c16]Jason Jeffers, Kathy J. Horadam, C. J. Carstens, Asha Rao
, Serdar Boztas
:
Influence Neighbourhoods in CiteSeer: A Case Study. SITIS 2013: 612-618 - 2012
- [j20]Kathy J. Horadam, Russell East:
Partitioning CCZ classes into EA classes. Adv. Math. Commun. 6(1): 95-106 (2012) - [c15]Jason Jeffers, Stephen A. Davis, Kathy J. Horadam:
Estimating individuality in feature point based retina templates. ICB 2012: 454-459 - 2011
- [j19]David G. Farmer, Kathy J. Horadam:
Equivalence classes of multiplicative central (pn, pn, pn, 1)-relative difference sets. Cryptogr. Commun. 3(1): 17-28 (2011) - [j18]Arathi Arakala, Kathy J. Horadam, Jason Jeffers, Serdar Boztas
:
Protection of minutiae-based templates using biocryptographic constructs in the set difference metric. Secur. Commun. Networks 4(5): 563-576 (2011) - [j17]Zhengya Xu, Hong Ren Wu
, Xinghuo Yu
, Kathryn Horadam, Bin Qiu:
Robust Shape-Feature-Vector-Based Face Recognition System. IEEE Trans. Instrum. Meas. 60(12): 3781-3791 (2011) - [c14]Kathy J. Horadam, Stephen A. Davis, Arathi Arakala, Jason Jeffers:
Fingerprints as Spatial Graphs: Nodes and Edges. DICTA 2011: 400-405 - [c13]Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Retina features based on vessel graph substructures. IJCB 2011: 1-6 - 2010
- [j16]Dane L. Flannery, Kathy J. Horadam:
Guest editorial for the special issue on design theory. Cryptogr. Commun. 2(2): 127-128 (2010) - [j15]Kathy J. Horadam:
Hadamard matrices and their applications: Progress 2007-2010. Cryptogr. Commun. 2(2): 129-154 (2010) - [j14]Duncan Bayly, Maurice Castro, Arathi Arakala, Jason Jeffers, Kathy J. Horadam:
Fractional biometrics: safeguarding privacy in biometric applications. Int. J. Inf. Sec. 9(1): 69-82 (2010) - [c12]Jason Jeffers, Arathi Arakala, Kathy J. Horadam:
Entropy of Feature Point-Based Retina Templates. ICPR 2010: 213-216
2000 – 2009
- 2009
- [c11]Arathi Arakala, J. Shane Culpepper
, Jason Jeffers, Andrew Turpin, Serdar Boztas
, Kathy J. Horadam, Allison M. McKendrick
:
Entropy of the Retina Template. ICB 2009: 1250-1259 - 2008
- [j13]Kathy J. Horadam, David G. Farmer:
Bundles, presemifields and nonlinear functions. Des. Codes Cryptogr. 49(1-3): 79-94 (2008) - [j12]Yu Qing Chen, Kathy J. Horadam, Wei-Hung Liu:
Relative difference sets fixed by inversion (III) - Cocycle theoretical approach. Discret. Math. 308(13): 2764-2775 (2008) - [j11]Hongwei Luo, Kathy J. Horadam:
Simulation and Measurement of Complex Network Growth: the Interplay of Uniform and Preferential Attachment. Fundam. Informaticae 84(1): 61-79 (2008) - [c10]David G. Farmer, Kathy J. Horadam:
Presemifield bundles over GF(p3). ISIT 2008: 2613-2616 - [c9]Kathy J. Horadam:
EA and CCZ Equivalence of Functions over GF(2n). WAIFI 2008: 134-143 - 2007
- [c8]Arathi Arakala, Jason Jeffers, Kathy J. Horadam:
Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. ICB 2007: 760-769 - 2006
- [c7]Kathy J. Horadam:
A Theory of Highly Nonlinear Functions. AAECC 2006: 87-100 - [c6]Kathy J. Horadam, Asha Rao
:
Fourier Transforms from a Weighted Trace Map. ISIT 2006: 1080-1084 - 2005
- [j10]Wei-Hung Liu, Yu Qing Chen, Kathy J. Horadam:
Relative difference sets fixed by inversion (ii) - character theoretical approach. J. Comb. Theory A 111(2): 175-189 (2005) - [c5]Kathy J. Horadam:
A generalised Hadamard transform. ISIT 2005: 1006-1008 - [i1]Kathy J. Horadam:
A Generalised Hadamard Transform. CoRR abs/cs/0508104 (2005) - 2003
- [j9]Kathy J. Horadam, Parampalli Udaya
:
A New Class of Ternary Cocyclic Hadamard Codes. Appl. Algebra Eng. Commun. Comput. 14(1): 65-73 (2003) - [c4]Kathy J. Horadam:
Differentially 2-Uniform Cocycles - The Binary Case. AAECC 2003: 150-157 - [c3]Kathy J. Horadam:
Differential Uniformity for Arrays. IMACC 2003: 115-124 - 2002
- [j8]Kathy J. Horadam, Parampalli Udaya:
A New Construction of Central Relative (pa, pa, pa, 1)-Difference Sets. Des. Codes Cryptogr. 27(3): 281-295 (2002) - 2000
- [j7]A. A. I. Perera, Kathy J. Horadam:
Factorisation of semiregular relative difference sets. Australas. J Comb. 22: 141-150 (2000) - [j6]Warwick de Launey, Dane L. Flannery, Kathy J. Horadam:
Cocyclic Hadamard matrices and difference sets. Discret. Appl. Math. 102(1-2): 47-61 (2000) - [j5]Kathy J. Horadam:
An introduction to cocyclic generalised Hadamard matrices. Discret. Appl. Math. 102(1-2): 115-131 (2000) - [j4]Kathy J. Horadam, Parampalli Udaya
:
Cocyclic Hadamard codes. IEEE Trans. Inf. Theory 46(4): 1545-1550 (2000)
1990 – 1999
- 1999
- [c2]Kathy J. Horadam:
Sequences from Cycles. AAECC 1999: 121-130 - 1998
- [j3]A. A. I. Perera, Kathy J. Horadam:
Cocyclic Generalised Hadamard Matrices and Central Relative Difference Sets. Des. Codes Cryptogr. 15(2): 187-200 (1998) - 1997
- [c1]Kathy J. Horadam, A. A. I. Perera:
Codes from Cocycles. AAECC 1997: 151-163 - 1995
- [j2]A. Baliga, Kathy J. Horadam:
Cocyclic Hadamard matrices over ℤt × ℤ22. Australas. J Comb. 11: 123-134 (1995) - 1993
- [j1]Warwick de Launey, Kathy J. Horadam:
A Weak Difference Set Construction for Higher Dimensional Designs. Des. Codes Cryptogr. 3(1): 75-87 (1993)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint