What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenxiong Kang
Google Scholar
ORCID:
0000-0001-9023-7252
13
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
A Random-Binding-Based Bio-Hashing Template Protection Method for Palm Vein Recognition.
Tianming Xie
Wenxiong Kang
2025
journals/tifs
RSNet: Region-Specific Network for Contactless Palm Vein Authentication.
Dacan Luo
Junduan Huang
Weili Yang
M. Saad Shakeel
Wenxiong Kang
2024
journals/tifs
Robust and Accurate Hand Gesture Authentication With Cross-Modality Local-Global Behavior Analysis.
Yufeng Zhang
Wenxiong Kang
Wenwei Song
2024
journals/tifs
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions.
Dacan Luo
Yitao Qiao
Di Xie
Shifeng Zhang
Wenxiong Kang
2023
journals/tifs
Depthwise Temporal Non-Local Network for Faster and Better Dynamic Hand Gesture Authentication.
Wenwei Song
Wenxiong Kang
2023
journals/tifs
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication.
Junduan Huang
An Zheng
M. Saad Shakeel
Weili Yang
Wenxiong Kang
2022
journals/tifs
Study on Reflection-Based Imaging Finger Vein Recognition.
Zejun Zhang
Fei Zhong
Wenxiong Kang
2021
journals/tifs
Dynamic-Hand-Gesture Authentication Dataset and Benchmark.
Chang Liu
Yulin Yang
Xingyan Liu
Linpu Fang
Wenxiong Kang
2020
journals/tifs
Study of a Full-View 3D Finger Vein Verification Technique.
Wenxiong Kang
Hongda Liu
Wei Luo
Feiqi Deng
2019
journals/tifs
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition.
Wenxiong Kang
Yuting Lu
Dejian Li
Wei Jia
2018
journals/tifs
Finger Vein Presentation Attack Detection Using Total Variation Decomposition.
Xinwei Qiu
Wenxiong Kang
Senping Tian
Wei Jia
Zhixing Huang
2018
journals/tifs
Information Divergence-Based Matching Strategy for Online Signature Verification.
Lei Tang
Wenxiong Kang
Yuxun Fang
2014
journals/tifs
Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern.
Wenxiong Kang
Qiuxia Wu
Coauthors
An Zheng
(1)
Chang Liu
(1)
Dacan Luo
(2)
Dejian Li
(1)
Di Xie
(1)
Fei Zhong
(1)
Feiqi Deng
(1)
Hongda Liu
(1)
Junduan Huang
(2)
Lei Tang
(1)
Linpu Fang
(1)
M. Saad Shakeel
(2)
Qiuxia Wu
(1)
Senping Tian
(1)
Shifeng Zhang
(1)
Tianming Xie
(1)
Wei Jia
(2)
Wei Luo
(1)
Weili Yang
(2)
Wenwei Song
(2)
Wenxiong Kang
(13)
Xingyan Liu
(1)
Xinwei Qiu
(1)
Yitao Qiao
(1)
Yufeng Zhang
(1)
Yulin Yang
(1)
Yuting Lu
(1)
Yuxun Fang
(1)
Zejun Zhang
(1)
Zhixing Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to