default search action
Liaojun Pang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Wenlong Li, Xi Cen, Liaojun Pang, Zhicheng X. Cao:
HyperFace: A Deep Fusion Model for Hyperspectral Face Recognition. Sensors 24(9): 2785 (2024) - [j40]Ce Gao, Kang Zhang, Weiwei Wang, Zhicheng X. Cao, Liaojun Pang, Eryun Liu, Heng Zhao:
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash. IEEE Trans. Inf. Forensics Secur. 19: 4100-4113 (2024) - 2022
- [j39]Huixian Li, Chenhao Wu, Liaojun Pang:
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability. J. Inf. Secur. Appl. 71: 103384 (2022) - [j38]Zhicheng X. Cao, Natalia A. Schmid, Shufen Cao, Liaojun Pang:
GMLM-CNN: A Hybrid Solution to SWIR-VIS Face Verification with Limited Imagery. Sensors 22(23): 9500 (2022) - [j37]Liaojun Pang, Jiong Chen, Fei Guo, Zhicheng X. Cao, Eryun Liu, Heng Zhao:
ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention. Signal Image Video Process. 16(3): 669-676 (2022) - [j36]Zhiyuan He, Jun Zhang, Liaojun Pang, Eryun Liu:
PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching. IEEE Trans. Inf. Forensics Secur. 17: 3706-3719 (2022) - [j35]Yuxing Li, Liaojun Pang, Heng Zhao, Zhicheng X. Cao, Eryun Liu, Jie Tian:
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates. IEEE Trans. Syst. Man Cybern. Syst. 52(10): 6314-6325 (2022) - [c27]Zhicheng X. Cao, Wenlong Li, Heng Zhao, Liaojun Pang:
YoloMask: An Enhanced YOLO Model for Detection of Face Mask Wearing Normality, Irregularity and Spoofing. CCBR 2022: 205-213 - [i6]Zhicheng X. Cao, Jiaxuan Zhang, Liaojun Pang:
A Bidirectional Conversion Network for Cross-Spectral Face Recognition. CoRR abs/2205.01595 (2022) - [i5]Zhicheng X. Cao, Kaituo Zhang, Liaojun Pang, Heng Zhao:
A Demographic Attribute Guided Approach to Age Estimation. CoRR abs/2205.10254 (2022) - [i4]Weiqiang Zhao, Heng Zhao, Zhicheng X. Cao, Liaojun Pang:
Composite Fixed-Length Ordered Features for Palmprint Template Protection with Diminished Performance Loss. CoRR abs/2211.04884 (2022) - 2021
- [j34]Zhicheng X. Cao, Xi Cen, Heng Zhao, Liaojun Pang:
Balancing Heterogeneous Image Quality for Improved Cross-Spectral Face Recognition. Sensors 21(7): 2322 (2021) - [j33]Yuxing Li, Heng Zhao, Zhicheng X. Cao, Eryun Liu, Liaojun Pang:
Compact and Cancelable Fingerprint Binary Codes Generation via One Permutation Hashing. IEEE Signal Process. Lett. 28: 738-742 (2021) - 2020
- [j32]Huixian Li, Jin Gao, Lingyun Wang, Liaojun Pang:
MPKC-based threshold proxy signcryption scheme. Int. Arab J. Inf. Technol. 17(2): 196-206 (2020) - [j31]Yuxing Li, Heng Zhao, Zhicheng X. Cao, Eryun Liu, Liaojun Pang:
Ordered and fixed-length bit-string fingerprint representation with minutia vicinity combined feature and spectral clustering. IET Image Process. 14(16): 4220-4228 (2020) - [i3]Liaojun Pang, Jiong Chen, Fei Guo, Zhicheng X. Cao, Heng Zhao:
ROSE: Real One-Stage Effort to Detect the Fingerprint Singular Point Based on Multi-scale Spatial Attention. CoRR abs/2003.03918 (2020) - [i2]Zhicheng X. Cao, Xi Cen, Liaojun Pang:
HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion. CoRR abs/2008.00498 (2020)
2010 – 2019
- 2019
- [j30]Liaojun Pang, Mengmeng Wei, Huixian Li:
Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC. IEEE Access 7: 24511-24526 (2019) - [j29]Liaojun Pang, Man Kou, Mengmeng Wei, Huixian Li:
Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel. IEEE Access 7: 84091-84106 (2019) - [j28]Jiong Chen, Heng Zhao, Zhicheng X. Cao, Weiqiang Zhao, Liaojun Pang:
Successive minutia-free mosaicking for small-sized fingerprint recognition. IET Image Process. 13(7): 1146-1151 (2019) - [i1]Jiong Chen, Heng Zhao, Zhicheng X. Cao, Liaojun Pang:
Singular points detection with semantic segmentation networks. CoRR abs/1911.01106 (2019) - 2018
- [j27]Huixian Li, Zhipeng Han, Liqin Wang, Liaojun Pang:
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials. IEEE Access 6: 53869-53881 (2018) - [j26]Liaojun Pang, Man Kou, Mengmeng Wei, Huixian Li:
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings. IEEE Access 6: 78123-78135 (2018) - [j25]Weiqiang Zhao, Liaojun Pang, Kai Xiao, Hua Wang, Zhicheng X. Cao, Heng Zhao:
Palmprint recognition using a modified competitive code with distinctive extended neighbourhood. IET Comput. Vis. 12(8): 1151-1162 (2018) - [j24]Zhengtao Jiang, Ling Liu, Liaojun Pang:
Research on oblivious keyword search protocols with CKA security. Int. J. Commun. Syst. 31(15) (2018) - 2017
- [j23]Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li:
Directed proxy signature with fast revocation proven secure in the standard model. IET Inf. Secur. 11(3): 168-176 (2017) - [j22]Liaojun Pang, Yufei Hu, Yi Liu, Kedong Xu, Huixian Li:
Efficient and secure certificateless signature scheme in the standard model. Int. J. Commun. Syst. 30(5) (2017) - [c26]Hua Wang, Kai Xiao, Weiqiang Zhao, Liaojun Pang, Heng Zhao:
Palmprint recognition based on Harris corner detection and statistical offset matching. CISP-BMEI 2017: 1-5 - 2016
- [j21]Liaojun Pang, Huiyang Zhao, Xia Zhou, Huixian Li:
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model. Int. J. Distributed Sens. Networks 12(1): 3205206:1-3205206:12 (2016) - [j20]Huixian Li, Liaojun Pang:
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme. Int. J. Distributed Sens. Networks 12(5): 5235714:1-5235714:12 (2016) - [j19]Liaojun Pang, Deyu Miao, Chunfeng Lian:
User-friendly random-grid-based visual secret sharing for general access structures. Secur. Commun. Networks 9(10): 966-976 (2016) - 2015
- [j18]Chunfeng Lian, Liaojun Pang, Jimin Liang:
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. Comput. J. 58(10): 2426-2442 (2015) - [j17]Liaojun Pang, Lu Gao, Huixian Li, Yumin Wang:
Anonymous multi-receiver ID-based signcryption scheme. IET Inf. Secur. 9(3): 194-201 (2015) - [j16]Yanjing Hu, Qingqi Pei, Liaojun Pang:
Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior. J. Interconnect. Networks 15(3-4): 1540002:1-1540002:19 (2015) - [c25]Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Analyze Network Protocol's Hidden Behavior. 3PGCIC 2015: 403-406 - [c24]Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Instruction Clustering Analysis for Network Protocol's Abnormal Behavior. 3PGCIC 2015: 791-794 - 2014
- [j15]Huixian Li, Liaojun Pang:
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 8(1): 8-11 (2014) - [j14]Liaojun Pang, Huixian Li, Li-wei He, Ali Alramadhan, Yumin Wang:
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing. Int. J. Commun. Syst. 27(11): 3244-3254 (2014) - 2013
- [j13]Liaojun Pang, Huixian Li:
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. Comput. Informatics 32(3): 441-460 (2013) - [j12]Yuelei Xiao, Yumin Wang, Liaojun Pang, Shichong Tan:
A Trusted Network Access Protocol for WLAN Mesh Networks. IEICE Trans. Inf. Syst. 96-D(12): 2865-2869 (2013) - [j11]Liaojun Pang, Huixian Li, Qingqi Pei, Yumin Wang:
Improvement on Meshram et al.'s ID-based cryptographic mechanism. Inf. Process. Lett. 113(19-21): 789-792 (2013) - [j10]Kai Cao, Liaojun Pang, Jimin Liang, Jie Tian:
Fingerprint classification by a hierarchical classifier. Pattern Recognit. 46(12): 3186-3197 (2013) - [c23]Huixian Li, Yafang Yang, Liaojun Pang:
An efficient authentication protocol with user anonymity for mobile networks. WCNC 2013: 1842-1847 - [c22]Liaojun Pang, Liwei He, Qingqi Pei, Yumin Wang:
Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. WCNC 2013: 1870-1875 - 2012
- [j9]Eryun Liu, Heng Zhao, Jimin Liang, Liaojun Pang, Hongtao Chen, Jie Tian:
Random local region descriptor (RLRD): A new method for fixed-length feature representation of fingerprint image and its application to template protection. Future Gener. Comput. Syst. 28(1): 236-243 (2012) - [j8]Yuelei Xiao, Yumin Wang, Liaojun Pang:
Verification of Trusted Network Access Protocols in the Strand Space Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(3): 665-668 (2012) - [j7]Liaojun Pang, Huixian Li, Qingqi Pei:
Improved multicast key management of Chinese wireless local area network security standard. IET Commun. 6(9): 1126-1130 (2012) - [j6]Hongtao Chen, Heng Zhao, Liaojun Pang, Jimin Liang, Jie Tian:
Multi fuzzy vault based on secret sharing for deadlock restoration. Int. J. Inf. Technol. Manag. 11(1/2): 50-60 (2012) - [c21]Huixian Li, Jinshun Hu, Liwei He, Liaojun Pang:
Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard. CIS 2012: 678-682 - 2011
- [j5]Eryun Liu, Heng Zhao, Jimin Liang, Liaojun Pang, Min Xie, Hongtao Chen, Yanhua Li, Peng Li, Jie Tian:
A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognit. Lett. 32(5): 666-675 (2011) - [j4]Hongtao Chen, Liaojun Pang, Jimin Liang, Eryun Liu, Jie Tian:
Fingerprint Singular Point Detection Based on Multiple-Scale Orientation Entropy. IEEE Signal Process. Lett. 18(11): 679-682 (2011) - [c20]Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang:
A Novel Hash-based RFID Mutual Authentication Protocol. CIS 2011: 774-778 - [c19]Hua Jiang, Liaojun Pang:
Fast Network Traffic Anomaly Detection Based on Iteration. CIS 2011: 1006-1010 - [c18]Kai Cao, Eryun Liu, Liaojun Pang, Jimin Liang, Jie Tian:
Fingerprint matching by incorporating minutiae discriminability. IJCB 2011: 1-6 - 2010
- [j3]Eryun Liu, Jimin Liang, Liaojun Pang, Min Xie, Jie Tian:
Minutiae and modified Biocode fusion for fingerprint-based key generation. J. Netw. Comput. Appl. 33(3): 221-235 (2010) - [j2]Zhihong Liu, Jianfeng Ma, Qingqi Pei, Liaojun Pang, YoungHo Park:
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks. IEEE Trans. Wirel. Commun. 9(8): 2643-2653 (2010) - [c17]Fen Li, Quan Liu, Qingqi Pei, Liaojun Pang:
On Trust Degree-Based Usage Control in DRM System. CIS 2010: 298-301 - [c16]Fen Li, Quan Liu, Liaojun Pang, Qingqi Pei:
Identity Authentication Based on Fuzzy Vault and Digital Certificate. CIS 2010: 441-445 - [c15]Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li:
Secure Communication Model of WSN Based on Secret Sharing. CIS 2010: 483-487
2000 – 2009
- 2009
- [c14]Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang:
Key Binding Based on Biometric Shielding Functions. IAS 2009: 19-22 - [c13]Yanping Li, Liaojun Pang, Yuming Wang:
Attacks on a Universal Designated Verifier Signature Scheme. IAS 2009: 27-30 - [c12]Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng:
Distributed Event-Triggered Trust Management for Wireless Sensor Networks. IAS 2009: 291-294 - [c11]Huixian Li, Liaojun Pang:
A Novel Biometric-Based Authentication Scheme with Privacy Protection. IAS 2009: 295-298 - [c10]Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang:
Layer Key Management Scheme on Wireless Sensor Networks. IAS 2009: 427-431 - [c9]Yanping Li, Liaojun Pang:
Multi-party Non-repudiation Protocol with Different Message Exchanged. IAS 2009: 491-494 - [c8]Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao:
Anonymous Communication in Wireless Mesh Network. CIS (2) 2009: 416-420 - 2008
- [c7]Huixian Li, Liaojun Pang:
Improvement on WLAN Multicast Key Management Protocol. CIS (2) 2008: 419-424 - [c6]Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. ISECS 2008: 22-26 - [c5]Yong Zeng, Jianfeng Ma, Lihua Dong, Liaojun Pang, Yuanbo Guo:
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. MSN 2008: 208-211 - 2007
- [c4]Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai:
An Efficient Threshold Multi-group-Secret Sharing Scheme. ICFIE 2007: 911-918 - 2006
- [c3]Liao-Jun Pang, Hui-Xian Li, Yu-Min Wang:
A Secure and Efficient Secret Sharing Scheme with General Access Structures. FSKD 2006: 646-649 - 2005
- [j1]Liao-Jun Pang, Yu-Min Wang:
A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing. Appl. Math. Comput. 167(2): 840-848 (2005) - [c2]Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:
A New (t, n)-Threshold Multi-secret Sharing Scheme. CIS (2) 2005: 421-426 - [c1]Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:
An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. WAIM 2005: 267-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 00:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint