Остановите войну!
for scientists:
default search action
Kathy J. Horadam
- > Home > Persons > Kathy J. Horadam
Publications
- 2023
- [j31]Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Protection of Sparse Retinal Templates Using Cohort-Based Dissimilarity Vectors. IEEE Trans. Biom. Behav. Identity Sci. 5(2): 233-243 (2023) - 2022
- [c28]Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
GRETINA: A Large-Scale High-Quality Generated Retinal Image Dataset for Security and Privacy Assessment. IVCNZ 2022: 373-387 - 2021
- [j30]Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Failure of affine-based reconstruction attack in regenerating vascular feature points. IET Biom. 10(5): 497-517 (2021) - 2020
- [c27]Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Application of affine-based reconstruction to retinal point patterns. BIOSIG 2020: 231-238 - 2019
- [j29]Taher Alzahrani, Kathy J. Horadam:
Finding maximal bicliques in bipartite networks using node similarity. Appl. Netw. Sci. 4(1): 21:1-21:25 (2019) - 2018
- [j28]Johannes Kotzerke, Stephen A. Davis, Jodie McVernon, Kathy J. Horadam:
Steps to solving the infant biometric problem with ridge-based biometrics. IET Biom. 7(6): 567-572 (2018) - 2017
- [j27]V. Alvarez, Félix Gudiel, María-Belén Güemes, Kathy J. Horadam, Asha Rao:
Diagram versus bundle equivalence for ℤt × ℤ22-cocyclic Hadamard matrices. Bull. ICA 81: 63-77 (2017) - [j26]C. J. Carstens, Kathy J. Horadam:
Switching edges to randomize networks: what goes wrong and how to fix it. J. Complex Networks 5(3): 337-351 (2017) - [j25]Arathi Arakala, Stephen A. Davis, Hao Hao, Kathy J. Horadam:
Value of graph topology in vascular biometrics. IET Biom. 6(2): 117-125 (2017) - 2016
- [j24]Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Identification performance of evidential value estimation for ridge-based biometrics. EURASIP J. Inf. Secur. 2016: 24 (2016) - [c26]Scott Cox, Kathy J. Horadam, Asha Rao:
The spread of ideas in a weighted threshold network. COMPLEX NETWORKS 2016: 437-447 - 2015
- [c25]Johannes Kotzerke, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Identification performance of evidential value estimation for fingermarks. BIOSIG 2015: 97-107 - [c24]A. Hecker, C. J. Carstens, Kathy J. Horadam:
Neighbourhood Distinctiveness: An Initial Study. CompleNet 2015: 99-110 - [c23]Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph for Biometric Authentication. ICISSP (Revised Selected Papers) 2015: 199-218 - [c22]Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph - Feature Extraction and Matching. ICISSP 2015: 295-303 - [c21]Johannes Kotzerke, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Discriminating fingermarks with evidential value for forensic comparison. IWBF 2015: 1-6 - 2014
- [j22]Seyed Mehdi Lajevardi, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Hand vein authentication using biometric graph matching. IET Biom. 3(4): 302-313 (2014) - [c20]Taher Alzahrani, Kathy J. Horadam:
Analysis of two crime-related networks derived from bipartite social networks. ASONAM 2014: 890-897 - [c19]Taher Alzahrani, Kathy J. Horadam, Serdar Boztas:
Community Detection in Bipartite Networks Using Random Walks. CompleNet 2014: 157-165 - 2013
- [j21]Seyed Mehdi Lajevardi, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Retina Verification System Based on Biometric Graph Matching. IEEE Trans. Image Process. 22(9): 3625-3635 (2013) - [c17]Johannes Kotzerke, Stephen A. Davis, Kathy J. Horadam, Jodie McVernon:
Newborn and infant footprint crease pattern extraction. ICIP 2013: 4181-4185 - [c16]Jason Jeffers, Kathy J. Horadam, C. J. Carstens, Asha Rao, Serdar Boztas:
Influence Neighbourhoods in CiteSeer: A Case Study. SITIS 2013: 612-618 - 2012
- [c15]Jason Jeffers, Stephen A. Davis, Kathy J. Horadam:
Estimating individuality in feature point based retina templates. ICB 2012: 454-459 - 2011
- [j18]Arathi Arakala, Kathy J. Horadam, Jason Jeffers, Serdar Boztas:
Protection of minutiae-based templates using biocryptographic constructs in the set difference metric. Secur. Commun. Networks 4(5): 563-576 (2011) - [j17]Zhengya Xu, Hong Ren Wu, Xinghuo Yu, Kathryn Horadam, Bin Qiu:
Robust Shape-Feature-Vector-Based Face Recognition System. IEEE Trans. Instrum. Meas. 60(12): 3781-3791 (2011) - [c14]Kathy J. Horadam, Stephen A. Davis, Arathi Arakala, Jason Jeffers:
Fingerprints as Spatial Graphs: Nodes and Edges. DICTA 2011: 400-405 - [c13]Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Retina features based on vessel graph substructures. IJCB 2011: 1-6 - 2010
- [j14]Duncan Bayly, Maurice Castro, Arathi Arakala, Jason Jeffers, Kathy J. Horadam:
Fractional biometrics: safeguarding privacy in biometric applications. Int. J. Inf. Sec. 9(1): 69-82 (2010) - [c12]Jason Jeffers, Arathi Arakala, Kathy J. Horadam:
Entropy of Feature Point-Based Retina Templates. ICPR 2010: 213-216 - 2009
- [c11]Arathi Arakala, J. Shane Culpepper, Jason Jeffers, Andrew Turpin, Serdar Boztas, Kathy J. Horadam, Allison M. McKendrick:
Entropy of the Retina Template. ICB 2009: 1250-1259 - 2007
- [c8]Arathi Arakala, Jason Jeffers, Kathy J. Horadam:
Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. ICB 2007: 760-769 - 2006
- [c6]Kathy J. Horadam, Asha Rao:
Fourier Transforms from a Weighted Trace Map. ISIT 2006: 1080-1084 - 2003
- [j9]Kathy J. Horadam, Parampalli Udaya:
A New Class of Ternary Cocyclic Hadamard Codes. Appl. Algebra Eng. Commun. Comput. 14(1): 65-73 (2003) - 2002
- [j8]Kathy J. Horadam, Parampalli Udaya:
A New Construction of Central Relative (pa, pa, pa, 1)-Difference Sets. Des. Codes Cryptogr. 27(3): 281-295 (2002) - 2000
- [j4]Kathy J. Horadam, Parampalli Udaya:
Cocyclic Hadamard codes. IEEE Trans. Inf. Theory 46(4): 1545-1550 (2000)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-28 03:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint