Feature extraction and learning approaches for cancellable biometrics: A survey

W Yang, S Wang, J Hu, X Tao… - CAAI Transactions on …, 2024 - Wiley Online Library
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

Heuristic objective for facial expression recognition

H Li, X **ao, X Liu, J Guo, G Wen, P Liang - The Visual Computer, 2023 - Springer
Facial expression recognition has been widely used in lots of fields such as health care and
intelligent robot systems. However, recognizing facial expression in the wild is still very …

Deep learning for iris recognition: a review

Y Yin, S He, R Zhang, H Chang, X Han… - arxiv preprint arxiv …, 2023 - arxiv.org
Iris recognition is a secure biometric technology known for its stability and privacy. With no
two irises being identical and little change throughout a person's lifetime, iris recognition is …

Deep learning-based authentication for insider threat detection in critical infrastructure

A Budžys, O Kurasova, V Medvedev - Artificial Intelligence Review, 2024 - Springer
In today's cyber environment, threats such as data breaches, cyberattacks, and unauthorized
access threaten national security, critical infrastructure, and financial stability. This research …

A novel technique for fingerprint template security in biometric authentication systems

A Ali, VS Baghel, S Prakash - The Visual Computer, 2023 - Springer
The deployment of biometrics spans over almost every application that incorporates user
authentication. Fingerprint biometrics in particular is by far the most popular choice in …

A hybrid ranking algorithm for secure and efficient iris template protection

AHY Mohammed, RA Dziyauddin, N Kamaruddin… - Computers & …, 2025 - Elsevier
Indexing methods are mostly used to protect sensitive biometric data stored in templates. As
such, iris template protection has been used as a way of securing the efficiency of biometric …

Acupuncture indication knowledge bases: meridian entity recognition and classification based on ACUBERT

TC Xu, J Wen, L Wang, YY Huang, ZJ Zhu, Q Zhu… - Database, 2024 - academic.oup.com
In acupuncture diagnosis and treatment, non-quantitative clinical descriptions have limited
the development of standardized treatment methods. This study explores the effectiveness …

Abnormalities detection from wireless capsule endoscopy images based on embedding learning with triplet loss

S Charfi, M El Ansari, L Koutti, A Ellahyani… - Multimedia Tools and …, 2024 - Springer
Deep learning techniques can accurately detect and grade abnormal findings on images
from Wireless Capsule Endoscopy (WCE). However, the prediction accuracy of handcrafted …

DGAG: A Novel Approach That Detects Green Areas With Geolocation From Large‐Scale Satellite Imaging Instance Segmentation and GIS Application

M Taşyürek, FN Kılıçkaya, C Öztürk - Transactions in GIS, 2024 - Wiley Online Library
Advancements in space exploration and computing have accelerated progress in remote
sensing studies, where imaging satellites capture extensive datasets globally, particularly in …