Остановите войну!
for scientists:
default search action
Qiong Li
Publications
- 2022
- [j94]Jiameng Yao, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, Nan Chen:
An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 24(7): 911 (2022) - 2015
- [j23]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystem based on score-level fusion. Int. J. Comput. Appl. Technol. 51(2): 120-130 (2015) - [j21]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multim. Tools Appl. 74(13): 4469-4486 (2015) - [j19]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xuehu Yan, Xiamu Niu:
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9(Supplement-1): 99-109 (2015) - 2014
- [j17]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystems: fusion strategy and template security. J. Electronic Imaging 23(2): 023001 (2014) - [j16]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Tiejun Zhang, Xiamu Niu:
Toward accurate localization and high recognition performance for noisy iris images. Multim. Tools Appl. 71(3): 1411-1430 (2014) - [j15]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multim. Tools Appl. 72(3): 2339-2358 (2014) - 2013
- [j13]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Ning Wang, Xiamu Niu:
Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns. IEICE Trans. Inf. Syst. 96-D(8): 1886-1889 (2013) - [j12]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification. J. Electronic Imaging 22(2): 023013 (2013) - [c54]Ahmed A. Abd El-Latif, Ning Wang, Jialiang Peng, Qiong Li, Xiamu Niu:
A new encryption scheme for color images based on quantum chaotic system in transform domain. ICDIP 2013: 88781S - [c53]Jialiang Peng, Qiong Li, Ning Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
An effective preprocessing method for finger vein recognition. ICDIP 2013: 887808 - [c52]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. ISBAST 2013: 217-223 - 2012
- [c50]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qiong Li, Xiamu Niu:
A new image encryption based on chaotic systems and singular value decomposition. ICDIP 2012: 83343F - [c49]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif:
An accurate iris location method for low quality iris images. ICDIP 2012: 833411 - [c48]Tiejun Zhang, Ahmed A. Abd El-Latif, Ning Wang, Qiong Li, Xiamu Niu:
A new image segmentation method via fusing NCut eigenvectors maps. ICDIP 2012: 833430 - [c45]Jialiang Peng, Ning Wang, Ahmed A. Abd El-Latif, Qiong Li, Xiamu Niu:
Finger-vein Verification Using Gabor Filter and SIFT Feature Matching. IIH-MSP 2012: 45-48 - 2011
- [c40]Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. IIH-MSP 2011: 101-104
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint