default search action
Adams Wai-Kin Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Wenwei Song, Wenxiong Kang, Adams Wai-Kin Kong, Yufeng Zhang, Yitao Qiao:
L3AM: Linear Adaptive Additive Angular Margin Loss for Video-Based Hand Gesture Authentication. Int. J. Comput. Vis. 132(9): 4073-4090 (2024) - [j36]Bingzhi Chen, Yishu Liu, Zheng Zhang, Guangming Lu, Adams Wai-Kin Kong:
TransAttUnet: Multi-Level Attention-Guided U-Net With Transformer for Medical Image Segmentation. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 55-68 (2024) - [j35]Yanling Li, Steven Tien Guan Thng, Adams Wai-Kin Kong:
Bridging the Gap Between Vitiligo Segmentation and Clinical Scores. IEEE J. Biomed. Health Informatics 28(3): 1623-1634 (2024) - [c71]Shilin Lu, Zilan Wang, Leyang Li, Yanzhu Liu, Adams Wai-Kin Kong:
MACE: Mass Concept Erasure in Diffusion Models. CVPR 2024: 6430-6440 - [c70]Jeremy Styborski, Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Exploiting Supervised Poison Vulnerability to Strengthen Self-supervised Defense. ECCV (82) 2024: 265-283 - [c69]Yan Ren, Yanling Li, Adams Wai-Kin Kong:
Adaptive Multi-task Learning for Few-Shot Object Detection. ECCV (7) 2024: 297-314 - [c68]Loh Sher En Jessica, Naheed Anjum Arafat, Wei Xian Lim, Wai Lee Chan, Adams Wai-Kin Kong:
Finite Volume Features, Global Geometry Representations, and Residual Training for Deep Learning-based CFD Simulation. ICML 2024 - [i22]Shilin Lu, Zilan Wang, Leyang Li, Yanzhu Liu, Adams Wai-Kin Kong:
MACE: Mass Concept Erasure in Diffusion Models. CoRR abs/2403.06135 (2024) - [i21]Nithish Muthuchamy Selvaraj, Xiaobao Guo, Bingquan Shen, Adams Wai-Kin Kong, Alex C. Kot:
Improving Concept Alignment in Vision-Language Concept Bottleneck Models. CoRR abs/2405.01825 (2024) - [i20]Fan Wang, Adams Wai-Kin Kong:
Certified ℓ2 Attribution Robustness via Uniformly Smoothed Attributions. CoRR abs/2405.06361 (2024) - [i19]Xiaobao Guo, Zitong Yu, Nithish Muthuchamy Selvaraj, Bingquan Shen, Adams Wai-Kin Kong, Alex C. Kot:
Benchmarking Cross-Domain Audio-Visual Deception Detection. CoRR abs/2405.06995 (2024) - [i18]Jeremy Styborski, Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Exploiting Supervised Poison Vulnerability to Strengthen Self-Supervised Defense. CoRR abs/2409.08509 (2024) - 2023
- [j34]Zechen Wang, Liangzhen Zheng, Sheng Wang, Mingzhi Lin, Zhihao Wang, Adams Wai-Kin Kong, Yuguang Mu, Yanjie Wei, Weifeng Li:
A fully differentiable ligand pose optimization framework guided by deep learning and a traditional scoring function. Briefings Bioinform. 24(1) (2023) - [j33]Xiaobao Guo, Adams Wai-Kin Kong, Alex C. Kot:
Deep Multimodal Sequence Fusion by Regularized Expressive Representation Distillation. IEEE Trans. Multim. 25: 2085-2096 (2023) - [j32]Xiaobao Guo, A. C. Kot, Adams Wai-Kin Kong:
Pace-Adaptive and Noise-Resistant Contrastive Learning for Multimodal Feature Fusion. IEEE Trans. Multim. 25: 9437-9448 (2023) - [c67]Fan Wang, Adams Wai-Kin Kong:
A Practical Upper Bound for the Worst-Case Attribution Deviations. CVPR 2023: 24616-24625 - [c66]Shilin Lu, Yanzhu Liu, Adams Wai-Kin Kong:
TF-ICON: Diffusion-Based Training-Free Cross-Domain Image Composition. ICCV 2023: 2294-2305 - [c65]Xiaobao Guo, Nithish Muthuchamy Selvaraj, Zitong Yu, Adams Wai-Kin Kong, Bingquan Shen, Alex C. Kot:
Audio-Visual Deception Detection: DOLOS Dataset and Parameter-Efficient Crossmodal Learning. ICCV 2023: 22078-22088 - [c64]Nithish Muthuchamy Selvaraj, Xiaobao Guo, Adams Wai-Kin Kong, Bingquan Shen, Alex C. Kot:
Adapter Incremental Continual Learning of Efficient Audio Spectrogram Transformers. INTERSPEECH 2023: 909-913 - [c63]Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Adversarial Attack for Robust Watermark Protection Against Inpainting-based and Blind Watermark Removers. ACM Multimedia 2023: 8396-8405 - [i17]Zhaoxu Li, Zitong Yu, Nithish Muthuchamy Selvaraj, Xiaobao Guo, Bingquan Shen, Adams Wai-Kin Kong, Alex C. Kot:
Flexible-modal Deception Detection with Audio-Visual Adapter. CoRR abs/2302.05727 (2023) - [i16]Nithish Muthuchamy Selvaraj, Xiaobao Guo, Adams Wai-Kin Kong, Bingquan Shen, Alex C. Kot:
Adapter Incremental Continual Learning of Efficient Audio Spectrogram Transformers. CoRR abs/2302.14314 (2023) - [i15]Fan Wang, Adams Wai-Kin Kong:
A Practical Upper Bound for the Worst-Case Attribution Deviations. CoRR abs/2303.00340 (2023) - [i14]Xiaobao Guo, Nithish Muthuchamy Selvaraj, Zitong Yu, Adams Wai-Kin Kong, Bingquan Shen, Alex C. Kot:
Audio-Visual Deception Detection: DOLOS Dataset and Parameter-Efficient Crossmodal Learning. CoRR abs/2303.12745 (2023) - [i13]Shilin Lu, Yanzhu Liu, Adams Wai-Kin Kong:
TF-ICON: Diffusion-Based Training-Free Cross-Domain Image Composition. CoRR abs/2307.12493 (2023) - [i12]Wojciech Michal Matkowski, Xiaojie Li, Adams Wai-Kin Kong:
Improving Hand Recognition in Uncontrolled and Uncooperative Environments using Multiple Spatial Transformers and Loss Functions. CoRR abs/2311.05383 (2023) - [i11]Loh Sher En Jessica, Naheed Anjum Arafat, Wei Xian Lim, Wai Lee Chan, Adams Wai-Kin Kong:
Finite Volume Features, Global Geometry Representations, and Residual Training for Deep Learning-based CFD Simulation. CoRR abs/2311.14464 (2023) - 2022
- [j31]Xingpeng Xu, Shitala Prasad, Kuanhong Cheng, Adams Wai-Kin Kong:
Using double attention for text tattoo localisation. IET Biom. 11(3): 199-214 (2022) - [c62]Yew Lee Tan, Adams Wai-Kin Kong, Jung-Jae Kim:
Pure Transformer with Integrated Experts for Scene Text Recognition. ECCV (28) 2022: 481-497 - [c61]Yi Huang, Adams Wai-Kin Kong:
Transferable Adversarial Attack based on Integrated Gradients. ICLR 2022 - [c60]Yew Lee Tan, Ernest Yu Kai Chew, Adams Wai-Kin Kong, Jung-Jae Kim, Joo Hwee Lim:
Portmanteauing Features for Scene Text Recognition. ICPR 2022: 1499-1505 - [c59]Fan Wang, Adams Wai-Kin Kong:
Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection. NeurIPS 2022 - [i10]Fan Wang, Adams Wai-Kin Kong:
Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection. CoRR abs/2205.07279 (2022) - [i9]Yi Huang, Adams Wai-Kin Kong:
Transferable Adversarial Attack based on Integrated Gradients. CoRR abs/2205.13152 (2022) - [i8]Yew Lee Tan, Adams Wai-Kin Kong, Jung-Jae Kim:
Pure Transformer with Integrated Experts for Scene Text Recognition. CoRR abs/2211.04963 (2022) - [i7]Yew Lee Tan, Ernest Yu Kai Chew, Adams Wai-Kin Kong, Jung-Jae Kim, Joo Hwee Lim:
Portmanteauing Features for Scene Text Recognition. CoRR abs/2211.05036 (2022) - 2021
- [j30]Yanzhu Liu, Yanan Wang, Adams Wai-Kin Kong:
Pixel-wise ordinal classification for salient object grading. Image Vis. Comput. 106: 104086 (2021) - [j29]Yanling Li, Adams Wai-Kin Kong, Steven Thng:
Segmenting Vitiligo on Clinical Face Images Using CNN Trained on Synthetic and Internet Images. IEEE J. Biomed. Health Informatics 25(8): 3082-3093 (2021) - [c58]Xiaobao Guo, Adams Wai-Kin Kong, Huan Zhou, Xianfeng Wang, Min Wang:
Unimodal and Crossmodal Refinement Network for Multimodal Sequence Fusion. EMNLP (1) 2021: 9143-9153 - 2020
- [j28]Xingpeng Xu, Wojciech Michal Matkowski, Adams Wai-Kin Kong:
A portrait photo-to-tattoo transform based on digital tattooing. Multim. Tools Appl. 79(33-34): 24367-24392 (2020) - [j27]Yan Ren, Adams Wai-Kin Kong, Licheng Jiao:
A survey on image and video cosegmentation: Methods, challenges and analyses. Pattern Recognit. 103: 107297 (2020) - [j26]Wojciech Michal Matkowski, Tingting Chai, Adams Wai-Kin Kong:
Palmprint Recognition in Uncontrolled and Uncooperative Environment. IEEE Trans. Inf. Forensics Secur. 15: 1601-1615 (2020) - [c57]Yi Huang, Fan Wang, Adams Wai-Kin Kong, Kwok-Yan Lam:
New Threats Against Object Detector with Non-local Block. ECCV (20) 2020: 481-497 - [c56]Wojciech Michal Matkowski, Adams Wai-Kin Kong:
Gender and Ethnicity Classification based on Palmprint and Palmar Hand Images from Uncontrolled Environment. IJCB 2020: 1-7 - [i6]Wojciech Michal Matkowski, Adams Wai-Kin Kong:
Gender and Ethnicity Classification based on Palmprint and Palmar Hand Images from Uncontrolled Environment. CoRR abs/2008.02500 (2020)
2010 – 2019
- 2019
- [j25]Wojciech Michal Matkowski, Frodo Kin Sun Chan, Adams Wai-Kin Kong:
A study on wrist identification for forensic investigation. Image Vis. Comput. 88: 96-112 (2019) - [c55]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
Adversarial Signboard against Object Detector. BMVC 2019: 231 - [c54]Swarup Pranjal, Adams Wai-Kin Kong:
Palmprint Recognition Using Realistic Animation Aided Data Augmentation. BTAS 2019: 1-9 - [c53]Wojciech Michal Matkowski, Krzysztof Matkowski, Adams Wai-Kin Kong, Cory Lloyd Hall:
The Nipple-Areola Complex for Criminal Identification. ICB 2019: 1-6 - [c52]Yanzhu Liu, Fan Wang, Adams Wai-Kin Kong:
Probabilistic Deep Ordinal Regression Based on Gaussian Processes. ICCV 2019: 5300-5308 - [c51]Wojciech Michal Matkowski, Adams Wai-Kin Kong, Han Su, Peng Chen, Rong Hou, Zhihe Zhang:
Giant Panda Face Recognition Using Small Dataset. ICIP 2019: 1680-1684 - [c50]Zhenyu Yan, Qun Song, Rui Tan, Yang Li, Adams Wai-Kin Kong:
Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. MobiCom 2019: 23:1-23:16 - [c49]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
Attacking Object Detectors Without Changing the Target Object. PRICAI (3) 2019: 3-15 - [i5]Zhenyu Yan, Qun Song, Rui Tan, Yang Li, Adams Wai-Kin Kong:
Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. CoRR abs/1902.07057 (2019) - [i4]Wojciech Michal Matkowski, Adams Wai-Kin Kong, Han Su, Peng Chen, Rong Hou, Zhihe Zhang:
Giant Panda Face Recognition Using Small Dataset. CoRR abs/1905.11163 (2019) - [i3]Wojciech Michal Matkowski, Krzysztof Matkowski, Adams Wai-Kin Kong, Cory Lloyd Hall:
The Nipple-Areola Complex for Criminal Identification. CoRR abs/1905.11651 (2019) - [i2]Wojciech Michal Matkowski, Frodo Kin Sun Chan, Adams Wai-Kin Kong:
A Study on Wrist Identification for Forensic Investigation. CoRR abs/1910.03213 (2019) - [i1]Wojciech Michal Matkowski, Tingting Chai, Adams Wai-Kin Kong:
Palmprint Recognition in Uncontrolled and Uncooperative Environment. CoRR abs/1911.12514 (2019) - 2018
- [j24]Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
A further study of low resolution androgenic hair patterns as a soft biometric trait. Image Vis. Comput. 69: 125-142 (2018) - [c48]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
From the Perspective of CNN to Adversarial Iris Images. BTAS 2018: 1-10 - [c47]Yanzhu Liu, Adams Wai-Kin Kong, Chi Keong Goh:
A Constrained Deep Neural Network for Ordinal Regression. CVPR 2018: 831-839 - [c46]Shitala Prasad, Adams Wai-Kin Kong:
Using Object Information for Spotting Text. ECCV (16) 2018: 559-576 - [c45]Peicong Yu, Adams Wai-Kin Kong:
A Meta-Recognition Based Skin Marks Matching Algorithm with Feature Fusion for Forensic Identification. ICB 2018: 111-117 - 2017
- [j23]Xiaojie Li, Adams Wai-Kin Kong:
A multi-model restoration algorithm for recovering blood vessels in skin images. Image Vis. Comput. 61: 40-53 (2017) - [j22]Frodo Kin-Sun Chan, Xiaojie Li, Adams Wai-Kin Kong:
A Study of Distinctiveness of Skin Texture for Forensic Applications Through Comparison With Blood Vessels. IEEE Trans. Inf. Forensics Secur. 12(8): 1900-1915 (2017) - [c44]Yanzhu Liu, Adams Wai-Kin Kong, Chi Keong Goh:
Deep Ordinal Regression Based on Data Relationship for Small Datasets. IJCAI 2017: 2372-2378 - 2016
- [j21]Chaoying Tang, Hengyi Zhang, Adams Wai-Kin Kong:
Using multiple models to uncover blood vessel patterns in color images for forensic analysis. Inf. Fusion 32: 26-39 (2016) - [j20]Abhik Datta, Adams Wai-Kin Kong, Kin-Choong Yow:
A Fully Automatic Method for Gridding Bright Field Images of Bead-Based Microarrays. IEEE J. Biomed. Health Informatics 20(4): 1148-1159 (2016) - [c43]Yi Huang, Adams Wai-Kin Kong:
Using a CNN ensemble for detecting pornographic and upskirt images. BTAS 2016: 1-7 - [c42]Qingyong Xu, Soham Ghosh, Xingpeng Xu, Yi Huang, Adams Wai-Kin Kong:
Tattoo detection based on CNN and remarks on the NIST database. ICB 2016: 1-7 - [c41]Xingpeng Xu, Adams Wai-Kin Kong:
A geometric-based tattoo retrieval system. ICPR 2016: 3019-3024 - [c40]Yanzhu Liu, Xiaojie Li, Adams Wai-Kin Kong, Chi Keong Goh:
Learning from small data: A pairwise approach for ordinal regression. SSCI 2016: 1-6 - 2015
- [j19]Adams Wai-Kin Kong:
A Statistical Analysis of IrisCode and Its Security Implications. IEEE Trans. Pattern Anal. Mach. Intell. 37(3): 513-528 (2015) - [j18]Arfika Nurhudatiana, Adams Wai-Kin Kong:
On Criminal Identification in Color Skin Images Using Skin Marks (RPPVSM) and Fusion With Inferred Vein Patterns. IEEE Trans. Inf. Forensics Secur. 10(5): 916-931 (2015) - [c39]Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. EISIC 2015: 137-140 - [c38]Xiaojie Li, Adams Wai-Kin Kong:
Identifying Critical Factors Influencing Quality of Blood Vessel Information in JPEG Compressed Skin Images. SSCI 2015: 210-217 - 2014
- [j17]Han Su, Adams Wai-Kin Kong:
A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification. IEEE Trans. Inf. Forensics Secur. 9(4): 666-680 (2014) - [c37]Hengyi Zhang, Chaoying Tang, Xiaojie Li, Adams Wai-Kin Kong:
A study of similarity between genetically identical body vein patterns. CIBIM 2014: 151-159 - [c36]Nhat Quang Huynh, Xingpeng Xu, Adams Wai-Kin Kong, Sathyan Subbiah:
A preliminary report on a full-body imaging system for effectively collecting and processing biometric traits of prisoners. CIBIM 2014: 167-174 - [c35]Yanzhu Liu, Xiaojie Li, Adams Wai-Kin Kong:
Speeding up the knowledge-based deblocking method for efficient forensic analysis. CIBIM 2014: 185-194 - [c34]Hamid Reza Sharifzadeh, Hengyi Zhang, Adams Wai-Kin Kong:
Vein Pattern Visualization through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation. ICPR 2014: 160-165 - [c33]Md. Rabiul Islam, Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
A Preliminary Study of Lower Leg Geometry as a Soft Biometric Trait for Forensic Investigation. ICPR 2014: 427-431 - [c32]Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification. ICPR 2014: 495-500 - 2013
- [j16]Arfika Nurhudatiana, Adams Wai-Kin Kong, Keyan Matinpour, Deborah Chon, Lisa Altieri, Siu-Yeung Cho, Noah Craft:
The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns. IEEE Trans. Inf. Forensics Secur. 8(6): 998-1012 (2013) - [j15]Adams Wai-Kin Kong:
Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security Implications. IEEE Trans. Image Process. 22(3): 1148-1160 (2013) - [c31]Abhik Datta, Adams Wai-Kin Kong, Soumita Ghosh, Dieter Trau:
A fast point pattern matching algorithm for robust spatially addressable bead encoding. BIBE 2013: 1-7 - [c30]Arfika Nurhudatiana, Adams Wai-Kin Kong, Lisa Altieri, Noah Craft:
Automated identification of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM). ICASSP 2013: 2984-2988 - [c29]Xiaojie Li, Adams Wai-Kin Kong:
Restoring blood vessel patterns from JPEG compressed skin images for forensic analysis. WIFS 2013: 19-24 - [p2]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
An Introduction to the IrisCode Theory. Handbook of Iris Recognition 2013: 321-336 - 2012
- [j14]Adams Wai-Kin Kong:
IrisCode Decompression Based on the Dependence between Its Bit Pairs. IEEE Trans. Pattern Anal. Mach. Intell. 34(3): 506-520 (2012) - [c28]Hengyi Zhang, Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:
Matching vein patterns from color images for forensic investigation. BTAS 2012: 77-84 - [c27]Chaoying Tang, Hengyi Zhang, Adams Wai-Kin Kong, Noah Craft:
Visualizing vein patterns from color skin images based on image mapping for forensics analysis. ICPR 2012: 2387-2390 - 2011
- [j13]Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:
Using a Knowledge-Based Approach to Remove Blocking Artifacts in Skin Images for Forensic Analysis. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1038-1049 (2011) - [c26]Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:
Uncovering vein patterns from color skin images for forensic analysis. CVPR 2011: 665-672 - [c25]Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:
A knowledge-based algorithm to remove blocking artifacts in skin images for forensic analysis. ICASSP 2011: 1928-1931 - [c24]Arfika Nurhudatiana, Adams Wai-Kin Kong, Keyan Matinpour, Siu-Yeung Cho, Noah Craft:
Fundamental statistics of relatively permanent pigmented or vascular skin marks for criminal and victim identification. IJCB 2011: 1-6 - 2010
- [j12]Adams Wai-Kin Kong, David Zhang, Mohamed S. Kamel:
An Analysis of IrisCode. IEEE Trans. Image Process. 19(2): 522-532 (2010) - [c23]Adams Wai-Kin Kong:
An alternative Gabor filtering scheme. ICIP 2010: 1925-1928
2000 – 2009
- 2009
- [j11]Adams Wai-Kin Kong, David Dapeng Zhang, Mohamed S. Kamel:
A survey of palmprint recognition. Pattern Recognit. 42(7): 1408-1418 (2009) - [c22]Adams Wai-Kin Kong:
An Analysis of Gabor Detection. ICIAR 2009: 64-72 - 2008
- [j10]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
Three measures for secure palmprint identification. Pattern Recognit. 41(4): 1329-1337 (2008) - [c21]Adams Wai-Kin Kong:
An evaluation of Gabor orientation as a feature for face recognition. ICPR 2008: 1-4 - 2007
- [b1]Adams Wai-Kin Kong:
Palmprint Identification Based on Generalization of IrisCode. University of Waterloo, Ontario, Canada, 2007 - [p1]Guangming Lu, David Zhang, Adams Wai-Kin Kong, Qingmin Liao:
Palmprint Identification by Fused Wavelet Characteristics. Image Pattern Recognition 2007: 225-242 - 2006
- [j9]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
Palmprint identification using feature-level fusion. Pattern Recognit. 39(3): 478-487 (2006) - [j8]Adams Wai-Kin Kong, King Hong Cheung, David Zhang, Mohamed S. Kamel, Jane You:
An analysis of BioHashing and its variants. Pattern Recognit. 39(7): 1359-1368 (2006) - [j7]Adams Wai-Kin Kong, David Zhang, Guangming Lu:
A study of identical twins' palmprints for personal verification. Pattern Recognit. 39(11): 2149-2156 (2006) - [j6]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
Analysis of Brute-Force Break-Ins of a Palmprint Authentication System. IEEE Trans. Syst. Man Cybern. Part B 36(5): 1201-1205 (2006) - [c20]King Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You:
Revealing the Secret of FaceHashing. ICB 2006: 106-112 - [c19]Adams Wai-Kin Kong, David Zhang, Guangming Lu:
A Study of Identical Twins' Palmprints for Personal Authentication. ICB 2006: 668-674 - [c18]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
An Anatomy of IrisCode for Precise Phase Representation. ICPR (4) 2006: 429-432 - [c17]King Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You:
Does EigenPalm work? A System and Evaluation Perspective. ICPR (4) 2006: 445-448 - 2005
- [j5]David Zhang, Guangming Lu, Adams Wai-Kin Kong, Michael Wong:
Online Palmprint Identification System for Civil Applications. J. Comput. Sci. Technol. 20(1): 70-76 (2005) - [c16]Adams Wai-Kin Kong, David Zhang, Mohamed Kamel:
A Study of Brute-Force Break-ins of a Palmprint Verification System. AVBPA 2005: 447-454 - [c15]King Hong Cheung, Adams Wai-Kin Kong, Jane You, David Zhang:
An Analysis on Invertibility of Cancelable Biometrics based on BioHashing. CISST 2005: 40-45 - [c14]King Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You, Ho-Wang Lam:
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing. KES (3) 2005: 1168-1172 - [c13]David Zhang, Guangming Lu, Adams Wai-Kin Kong, Michael Wong:
A Novel Personal Authentication System Using Palmprint Technology. PReMI 2005: 147-156 - [c12]King Hong Cheung, Adams Wai-Kin Kong, Jane You, Qin Li, David Zhang, Prabir Bhattacharya:
A new approach to appearance-based face recognition. SMC 2005: 1686-1691 - 2004
- [j4]Jane You, Adams Wai-Kin Kong, David Zhang, King Hong Cheung:
On hierarchical palmprint coding with multiple features for personal identification in large databases. IEEE Trans. Circuits Syst. Video Technol. 14(2): 234-243 (2004) - [c11]David Zhang, Guangming Lu, Adams Wai-Kin Kong, Michael Wong:
Palmprint Authentication System for Civil Applications. ECCV Workshop BioAW 2004: 217-228 - [c10]Jane You, Adams Wai-Kin Kong, David Zhang, King Hong Cheung:
A New Approach to Personal Identification in Large Databases by Hierarchical Palmprint Coding with Multi-features. ICBA 2004: 739-745 - [c9]Adams Wai-Kin Kong, David Zhang:
Feature-Level Fusion for Effective Palmprint Authentication. ICBA 2004: 761-767 - [c8]King Hong Cheung, Jane You, Adams Wai-Kin Kong, David Zhang:
A study of aggregated 2D Gabor features on appearance-based face recognition. ICIG 2004: 310-313 - [c7]Adams Wai-Kin Kong, David Zhang:
Competitive Coding Scheme for Palmprint Verification. ICPR (1) 2004: 520-523 - [c6]David Zhang, Guangming Lu, Adams Wai-Kin Kong, Michael Wong:
Palmprint Authentication Technologies, Systems and Applications. SINOBIOMETRICS 2004: 78-89 - 2003
- [j3]Adams Wai-Kin Kong, David Zhang:
Detecting Eyelash and Reflection for Accurate Iris Segmentation. Int. J. Pattern Recognit. Artif. Intell. 17(6): 1025-1034 (2003) - [j2]David Zhang, Adams Wai-Kin Kong, Jane You, Michael Wong:
Online Palmprint Identification. IEEE Trans. Pattern Anal. Mach. Intell. 25(9): 1041-1050 (2003) - [j1]Adams Wai-Kin Kong, David Zhang, Wenxin Li:
Palmprint feature extraction using 2-D Gabor filters. Pattern Recognit. 36(10): 2339-2347 (2003) - [c5]King Hong Cheung, Adams Wai-Kin Kong, Jane You, David Zhang:
An Integration of Principal Component Analysis and Self-Organizing Map for Effective Palmprint Retrieval. CAINE 2003: 101-104 - [c4]Jane You, Adams Wai-Kin Kong, David Zhang, King Hong Cheung:
On Hierarchical Palmprint Coding with Multi-Features for Personal Identification in Large Databases. CAINE 2003: 105-108 - [c3]King Hong Cheung, Adams Wai-Kin Kong, Jane You, David Zhang:
On Effective Palmprint Retrieval for Personal Identification. CISST 2003: 111-117 - [c2]Jane You, David Zhang, King Hong Cheung, Adams Wai-Kin Kong:
A New Approach to Personal Identification Via Hierarchical Palmprint Coding. CISST 2003: 531-537 - 2002
- [c1]Adams Wai-Kin Kong, David Zhang:
Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication. ICPR (3) 2002: 807-810
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint