Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar Computer Networks, 2016 | 302 | 2016 |
Dual-source discrimination power analysis for multi-instance contactless palmprint recognition L Leng, M Li, C Kim, X Bi Multimedia Tools and Applications 76 (1), 333-354, 2017 | 264 | 2017 |
Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain L Leng, J Zhang, MK Khan, X Chen, K Alghathbar International Journal of the Physical Sciences 5 (17), 2543-2554, 2010 | 235* | 2010 |
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition L Leng, J Zhang, J Xu, MK Khan, K Alghathbar 2010 international conference on information and communication technology …, 2010 | 235 | 2010 |
Mask-refined R-CNN: A network for refining object details in instance segmentation Y Zhang, J Chu, L Leng, J Miao Sensors 20 (4), 1010, 2020 | 180 | 2020 |
PalmHash Code vs. PalmPhasor Code L Leng, J Zhang Neurocomputing 108, 1-12, 2013 | 152 | 2013 |
Object detection based on multi-layer convolution feature fusion and online hard example mining J Chu, Z Guo, L Leng IEEE access 6, 19959-19967, 2018 | 148 | 2018 |
Alignment-free row-co-occurrence cancelable palmprint fuzzy vault L Leng, ABJ Teoh Pattern Recognition 48 (7), 2290-2303, 2015 | 114 | 2015 |
Conjugate 2DPalmHash code for secure palm-print-vein verification L Leng, M Li, ABJ Teoh Image and Signal Processing (CISP), 2013 6th International Congress on 3 …, 2013 | 85 | 2013 |
Two-directional two-dimensional random projection and its variations for face and palmprint recognition L Leng, J Zhang, G Chen, MK Khan, K Alghathbar Computational Science and Its Applications-ICCSA 2011: International …, 2011 | 81 | 2011 |
Lossless data hiding for absolute moment block truncation coding using histogram modification C Kim, D Shin, L Leng, CN Yang Journal of Real-Time Image Processing 14, 101-114, 2018 | 71 | 2018 |
A scale-adaptive object-tracking algorithm with occlusion detection Y Yuan, J Chu, L Leng, J Miao, BG Kim EURASIP Journal on Image and Video Processing 2020, 1-15, 2020 | 67 | 2020 |
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security L Leng, J Zhang Journal of Network and Computer Applications 34 (6), 1979-1989, 2011 | 67 | 2011 |
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion L Leng, ABJ Teoh, M Li, MK Khan Security and Communication Networks 7 (11), 1860-1871, 2014 | 60 | 2014 |
Separable reversible data hiding in encrypted halftone image C Kim, D Shin, L Leng, CN Yang Displays 55, 71-79, 2018 | 54 | 2018 |
Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition L Leng, ABJ Teoh, M Li, MK Khan Neurocomputing 131, 377-387, 2014 | 48 | 2014 |
Two-dimensional cancelable biometric scheme L Leng, S Zhang, X Bi, MK Khan 2012 International Conference on Wavelet Analysis and Pattern Recognition …, 2012 | 46 | 2012 |
Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection L Leng, J Zhang, MK Khan, X Chen, M Ji, K Alghathbar Scientific Research and Essays 6 (4), 784-792, 2011 | 41* | 2011 |
StoolNet for color classification of stool medical images Z Yang, L Leng, BG Kim Electronics 8 (12), 1464, 2019 | 39 | 2019 |
The role of philosophical inquiry in helping students engage in learning L Leng Frontiers in psychology 11, 519240, 2020 | 38 | 2020 |