Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("KONG, Adams")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 15 of 15

  • Page / 1
Export

Selection :

  • and

Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security ImplicationsKONG, Adams Wai-Kin.IEEE transactions on image processing. 2013, Vol 22, Num 3-4, pp 1148-1160, issn 1057-7149, 13 p.Article

IrisCode Decompression Based on the Dependence between Its Bit PairsKONG, Adams Wai-Kin.IEEE transactions on pattern analysis and machine intelligence. 2012, Vol 34, Num 3, pp 506-520, issn 0162-8828, 15 p.Article

A study of identical twins' palmprints for personal authenticationKONG, Adams; ZHANG, David; GUANGMING LU et al.Lecture notes in computer science. 2006, pp 668-674, issn 0302-9743, isbn 3-540-31111-4, 1Vol, 7 p.Conference Paper

A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim IdentificationHAN SU; WAI KIN KONG, Adams.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 666-680, issn 1556-6013, 15 p.Article

A survey of palmprint recognitionKONG, Adams; ZHANG, David; KAMEL, Mohamed et al.Pattern recognition. 2009, Vol 42, Num 7, pp 1408-1418, issn 0031-3203, 11 p.Article

Three measures for secure palmprint identificationKONG, Adams; ZHANG, David; KAMEL, Mohamed et al.Pattern recognition. 2008, Vol 41, Num 4, pp 1329-1337, issn 0031-3203, 9 p.Article

A novel personal authentication system using palmprint technologyZHANG, David; GUANGMING LU; KONG, Adams Wai-Kin et al.Lecture notes in computer science. 2005, pp 147-156, issn 0302-9743, isbn 3-540-30506-8, 1Vol, 10 p.Conference Paper

An Analysis of IrisCodeKONG, Adams W. K; ZHANG, David; KAMEL, Mohamed S et al.IEEE transactions on image processing. 2010, Vol 19, Num 2, pp 522-532, issn 1057-7149, 11 p.Article

An analysis on accuracy of cancelable biometrics based on biohashingCHEUNG, King-Hong; KONG, Adams; ZHANG, David et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28894-5, vol3, 1168-1172Conference Paper

Revealing the secret of facehashingCHEUNG, King-Hong; KONG, Adams; ZHANG, David et al.Lecture notes in computer science. 2006, pp 106-112, issn 0302-9743, isbn 3-540-31111-4, 1Vol, 7 p.Conference Paper

A study of brute-force break-ins of a palmprint verification systemKONG, Adams; ZHANG, David; KAMEL, Mohamed et al.Lecture notes in computer science. 2005, pp 447-454, issn 0302-9743, isbn 3-540-27887-7, 8 p.Conference Paper

Feature-level fusion for effective palmprint authenticationKONG, Adams Wai-Kin; ZHANG, David.Lecture notes in computer science. 2004, pp 761-767, issn 0302-9743, isbn 3-540-22146-8, 7 p.Conference Paper

The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed PatternsNURHUDATIANA, Arfika; KONG, Adams Wai-Kin; MATINPOUR, Keyan et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 998-1012, issn 1556-6013, 15 p.Article

Palmprint authentication system for civil applicationsZHANG, David; GUANGMING LU; KONG, Adams Wai-Kin et al.Lecture notes in computer science. 2004, pp 217-228, issn 0302-9743, isbn 3-540-22499-8, 12 p.Conference Paper

Palmprint authentication technologies, systems and applicationsZHANG, David; GUANGMING LU; KONG, Adams Wai-Kin et al.Lecture notes in computer science. 2004, pp 78-89, issn 0302-9743, isbn 3-540-24029-2, 12 p.Conference Paper

  • Page / 1