The SCEAS System
Navigation Menu

Search the dblp DataBase


Jiashu Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
    Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:270-285 [Conf]
  2. Muhammad Khurram Khan, Jiashu Zhang
    Securing Biometric Templates for Reliable Identity Authentication. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:723-732 [Conf]
  3. Jiashu Zhang, Zutao Zhang
    Application of a Strong Tracking Finite-Difference Extended Kalman Filter to Eye Tracking. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1170-1179 [Conf]
  4. Jiashu Zhang, Lei Tian, Heng-Ming Tai
    A new watermarking method based on chaotic maps. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:939-942 [Conf]
  5. Jiashu Zhang, L. Zhang, Heng-Ming Tai
    Efficient video object segmentation using adaptive background registration and edge-based change detection techniques. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1467-1470 [Conf]
  6. Ling Xie, Jiashu Zhang, Hong-jie He
    NDFT-based Audio Watermarking Scheme with High Security. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:270-273 [Conf]
  7. Zutao Zhang, Jiashu Zhang
    Driver Fatigue Detection Based Intelligent Vehicle Control. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:1262-1265 [Conf]
  8. Muhammad Khurram Khan, Jiashu Zhang
    Enhancing the Transmission Security of Content-Based Hidden Biometric Data. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:214-223 [Conf]
  9. Muhammad Khurram Khan, Jiashu Zhang
    An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:260-268 [Conf]
  10. Hong-jie He, Jiashu Zhang, Heng-Ming Tai
    A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:422-432 [Conf]
  11. Muhammad Khurram Khan, Jiashu Zhang, Lei Tian
    Protecting Biometric Data for Personal Identification. [Citation Graph (0, 0)][DBLP]
    SINOBIOMETRICS, 2004, pp:629-638 [Conf]
  12. Haiquan Zhao, Jiashu Zhang, Mingyuan Xie, Xiangping Zeng
    Neural Legendre Orthogonal Polynomial Adaptive Equalizer. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:710-713 [Conf]
  13. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang
    Robust Hiding of Fingerprint-Biometric Data into Audio Signals. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:702-712 [Conf]
  14. Muhammad Khurram Khan, Jiashu Zhang
    An Intelligent Fingerprint-Biometric Image Scrambling Scheme. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:1141-1151 [Conf]

  15. Fuzzy Database Mining and Information Retrieval A Chaos-Based Fragile Watermarking Scheme with Recovery. [Citation Graph (, )][DBLP]

  16. Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. [Citation Graph (, )][DBLP]

  17. Block-Chain Based Fragile Watermarking Scheme with Superior Localization. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002