mvabund–an R package for model‐based analysis of multivariate abundance data YI Wang, U Naumann, ST Wright, DI Warton Methods in Ecology and Evolution 3 (3), 471-474, 2012 | 1365 | 2012 |
Distance‐based multivariate analyses confound location and dispersion effects DI Warton, ST Wright, Y Wang Methods in Ecology and Evolution 3 (1), 89-101, 2012 | 1069 | 2012 |
A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing Y Wang, J Hu, D Phillips IEEE Transactions on Pattern Analysis and Machine Intelligence 29 (4), 573-585, 2007 | 373 | 2007 |
Global ridge orientation modeling for partial fingerprint identification Y Wang, J Hu IEEE Transactions on Pattern Analysis and Machine Intelligence 33 (1), 72-87, 2010 | 158 | 2010 |
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields Y Wang, J Hu, F Han Applied Mathematics and Computation 185 (2), 823-833, 2007 | 132 | 2007 |
Fingerprint images encryption via multi-scroll chaotic attractors F Han, J Hu, X Yu, Y Wang Applied Mathematics and Computation 185 (2), 931-939, 2007 | 125 | 2007 |
The PIT-trap—A “model-free” bootstrap procedure for inference about regression models with discrete, multivariate responses DI Warton, L Thibaut, Y Wang PLoS One 12 (7), 2017 | 100 | 2017 |
Decision-based evasion attacks on tree ensemble classifiers F Zhang, Y Wang, S Liu, H Wang World Wide Web, 1-21, 2020 | 57 | 2020 |
GraphER: Token-Centric Entity Resolution with Graph Convolutional Neural Networks. B Li, W Wang, Y Sun, L Zhang, MA Ali, Y Wang AAAI, 8172-8179, 2020 | 42 | 2020 |
A gradient based weighted averaging method for estimation of fingerprint orientation fields Y Wang, J Hu, H Schroder IEEE International Conference on Digital Image Computing: Techniques and …, 2005 | 42 | 2005 |
Inference-based similarity search in randomized Montgomery domains for privacy-preserving biometric identification Y Wang, J Wan, J Guo, Y Cheung, PC Yuen IEEE Transactions on Pattern Analysis and Machine Intelligence 40 (7), 1611-1624, 2018 | 32 | 2018 |
Learning Binary Compact Codes for Hash-Based Fingerprint Indexing Y Wang, L Wang, YM Cheung, P Yuen IEEE Transactions on Information Forensics and Security 10 (8), 1603-1616, 2015 | 31* | 2015 |
Evolutionary optimization of file assignment for a large-scale video-on-demand system J Guo, Y Wang, KS Tang, S Chan, EWM Wong, P Taylor, M Zukerman IEEE Transactions on Knowledge and Data Engineering 20 (6), 836-850, 2008 | 21 | 2008 |
Generation of reliable PINs from fingerprints F Han, J Hu, L He, Y Wang IEEE International Conference on Communications (ICC'07), 1191-1196, 2007 | 20 | 2007 |
Model-Agnostic Adversarial Detection by Random Perturbations B Huang, Y Wang, W Wei IJCAI-19, 4689-4696, 2019 | 19 | 2019 |
Cost-sensitive label propagation for semi-supervised face recognition J Wan, Y Wang IEEE Transactions on Information Forensics and Security 14 (7), 1729-1743, 2018 | 18 | 2018 |
Gradient Correlation: Are Ensemble Classifiers More Robust Against Evasion Attacks in Practical Settings? F Zhang, Y Wang, H Wang WISE-18, 96-110, 2018 | 15 | 2018 |
Investigating correlation-based fingerprint authentication schemes for mobile devices using the J2ME technology Y Wang, J Hu, K Xi, V Bhagavatula IEEE Workshop on Automatic Identification and Advanced Technologies, 35-40, 2007 | 12 | 2007 |
Fingerprint geometric hashing based on binary minutiae cylinder codes Y Wang, L Wang, Y Cheung, PC Yuen International Conference on Pattern Recognition (ICPR'14), 690-695, 2014 | 10 | 2014 |
Group-Wise Dynamic Dropout Based on Latent Semantic Variations. Z Ke, Z Wen, W Xie, Y Wang, L Shen AAAI, 11229-11236, 2020 | 7 | 2020 |