Select Publications
Preprints
2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, http://dx.doi.org/10.1109/OJCS.2022.3199755
,2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, http://arxiv.org/abs/2207.00587v1
,2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, http://arxiv.org/abs/2206.12885v1
,2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, http://dx.doi.org/10.1109/JIOT.2022.3204246
,2021, Impact of Background Music on the Performance of Laparoscopy Teams, http://dx.doi.org/10.21203/rs.3.rs-1050433/v1
,2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, http://dx.doi.org/10.48550/arxiv.2003.05088
,2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, http://dx.doi.org/10.48550/arxiv.2003.05071
,2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, http://dx.doi.org/10.48550/arxiv.1911.12989
,2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, http://dx.doi.org/10.48550/arxiv.1908.09539
,2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, http://dx.doi.org/10.48550/arxiv.1810.03323
,2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, http://dx.doi.org/10.48550/arxiv.1809.07912
,2017, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages, http://dx.doi.org/10.1101/162081
,2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, http://dx.doi.org/10.48550/arxiv.1703.10355
,