Dr. CHENG Lee Ming (鄭利明)
Research Output
- 2019
- Published
Modular exponential multivariate sequence and its application to lightweight security design
Wang, J., Song, H., Li, J., Lin, Q. & Cheng, L., Sep 2019, In : Future Generation Computer Systems. 98, p. 435-443Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
- Published
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security
Wang, J., Li, J., Wang, H., Zhang, L. Y., Cheng, L. & Lin, Q., Aug 2019, In : IEEE Internet of Things Journal. 6, 4, p. 5892-5901Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 1 - Published
Robust Facial Landmark Localization Based on Two-Stage Cascaded Pose Regression
Tong, Z., Zhou, J., Yang, Y. & Cheng, L., 23 Jul 2019, AAAI-19 / IAAI-19 / EAAI-19 Proceedings. California, USA: AAAI Press, p. 10055-10056 (Proceedings of the AAAI Conference on Artificial Intelligence; vol. 33, no. 1).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › Not applicable › peer-review
- Published
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography
Ahmad, F. & Cheng, L., Jul 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Proceedings. Wang, G., Feng, J., Bhuiyan, M. Z. A. & Lu, R. (eds.). Springer, Cham, p. 157-165 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11611 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › Not applicable › peer-review
- Online published
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition
Ahmad, F., Cheng, L. & Khan, A., 15 May 2019, In : IEEE Transactions on Information Forensics and Security. 15, p. 184-194Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 1 - Published
Face template protection using deep LDPC codes learning
Chen, L., Zhao, G., Zhou, J., Ho, A. T. & Cheng, L., May 2019, In : IET Biometrics. 8, 3, p. 190-197Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
- 2018
- Published
Watermark extraction under print-cam process using wave atoms based blind digital watermarking
Ahmad, F. & Cheng, L., 27 Aug 2018, Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, ICVISP 2018. ACM New York, (ACM International Conference Proceeding Series).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › Not applicable › peer-review
- Published
Authenticity and copyright verification of printed images
Ahmad, F. & Cheng, L., Jul 2018, In : Signal Processing. 148, p. 322-335Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 5 - Published
Image authentication using distributed arithmetic coding
Zhou, J., Liu, F. & Cheng, L., Jun 2018, In : Multimedia Tools and Applications. 77, 12, p. 15505–15520Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
- Published
Multivariate Cryptography Based on Clipped Hopfield Neural Network
CHENG, L. M. & WANG, J., 17 Apr 2018, Patent No. US9,948,460, Priority No. 14/839,528Research output: Patents, Agreements and Assignments (RGC: 51, 52, 53) › 51_Patents granted (CityU only, data source from KTO) › Not applicable
- 2016
- Published
Wave atom transform based image hashing using distributed source coding
Yang, Y., Zhou, J., Duan, F., Liu, F. & Cheng, L., 1 Dec 2016, In : Journal of Information Security and Applications. 31, p. 75-82Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 5 - Published
Multivariate Cryptography Based on Clipped Hopfield Neural Network
WANG, J., CHENG, L. M. & Tong, S., 23 Nov 2016, In : IEEE Transactions on Neural Networks and Learning Systems. 99, p. 1 - 11Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 1 - Published
A novel client service quality measuring model and an eHealthcare mitigating approach
Cheng, L. M., Choi, W. P. C. & Wong, A. Y. M., 1 Jul 2016, In : International Journal of Medical Informatics. 91, p. e16-e31Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Wave Atoms Based Image Authentication Using Slepian-Wolf Coding
Zhou, J., Liu, F., Chen, J., Cheng, L., Yang, Y. & Duan, P., 15 Mar 2016, Proceedings - 2015 2nd International Symposium on Dependable Computing and Internet of Things, DCIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 87-92 7434474Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › Not applicable › peer-review
- Accepted/In press/Filed
基於剪裁的霍普菲爾德神經網路的多元密碼學
CHENG, L. M. & WANG, J., 20 Jan 2016, (Accepted/In press/Filed) Priority No. 2.0161E+11Research output: Patents, Agreements and Assignments (RGC: 51, 52, 53) › 51_Patents granted (CityU only, data source from KTO) › Not applicable
- 2015
- Published
A Dynamic Scalable Cryptosystem Based-on Reduced Key Size ECC
CHENG, L. M. & Wang, J., 19 Apr 2015, p. 7-11.Research output: Conference Papers (RGC: 31A, 31B, 32, 33) › 32_Refereed conference paper (no ISBN/ISSN) › Not applicable › peer-review
- Published
Digital Chip and Method of Operation Thereof
CHENG, L. M., 20 Jan 2015, Patent No. US8,938,157, Priority No. 12/710,525Research output: Patents, Agreements and Assignments (RGC: 51, 52, 53) › 51_Patents granted (CityU only, data source from KTO) › Not applicable
- Published
A FPGA implementation of facial feature extraction
Leung, H., Cheng, L. & Li, X. Y., 2015, In : Journal of Real-Time Image Processing. 10, 1, p. 135-149Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › Not applicable › peer-review
Scopus citations: 2 - Published
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks
Liu, F. & Cheng, L., 2015, Transactions on Data Hiding and Multimedia Security X. Shi, Y. Q. (ed.). Springer Berlin Heidelberg, p. 21-37 (Lecture Notes in Computer Science ; vol. LNCS 8948)(Transactions on Data Hiding and Multimedia Security; vol. TDHMS 8948).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 12_Chapter in an edited book (Author) › Not applicable › peer-review
Scopus citations: 1 - 2014
- Published
Enhanced perceptual image authentication with tamper localization and self-restoration
Liu, F., Wang, H., Cheng, L., Ho, A. T. & Li, S., 3 Sep 2014, In : Proceedings - IEEE International Conference on Multimedia and Expo. 2014-September, Septmber, 6890128.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 22_Publication in policy or professional journal › Not applicable
Scopus citations: 5