Image-based handwritten signature verification using hybrid methods of discrete radon transform, principal component analysis and probabilistic neural network SY Ooi, ABJ Teoh, YH Pang, BY Hiew Applied Soft Computing 40, 274-282, 2016 | 123 | 2016 |
Palmprint verification with moments YH Pang, TBJ Andrew, NCL David, FS Hiew UNION Agency, 2004 | 66 | 2004 |
A discriminant pseudo Zernike moments in face recognition YH Pang, ABJ Teoh, DCL Ngo Journal of Research and Practice in Information Technology 38 (2), 197-211, 2006 | 61 | 2006 |
An efficient method for human face recognition using wavelet transform and Zernike moments NH Foon, YH Pang, ATB Jin, DNC Ling Proceedings. International Conference on Computer Graphics, Imaging and …, 2004 | 58 | 2004 |
Neighbourhood preserving discriminant embedding in face recognition PY Han, ATB Jin, FS Abas Journal of Visual Communication and Image Representation 20 (8), 532-542, 2009 | 54 | 2009 |
Touch-less fingerprint recognition system BY Hiew, ABJ Teoh, YH Pang 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 24-29, 2007 | 53 | 2007 |
Digital camera based fingerprint recognition BY Hiew, ABJ Teoh, YH Pang 2007 IEEE International Conference on Telecommunications and Malaysia …, 2007 | 44 | 2007 |
Palmprint authentication with Zernike moment invariants YH Pang, T Connie, A Jin, D Ling Proceedings of the 3rd IEEE International Symposium on Signal Processing and …, 2003 | 43 | 2003 |
Texture classification via extended local graph structure HK Bashier, LS Hoe, LT Hui, MF Azli, PY Han, WK Kwee, MS Sayeed Optik 127 (2), 638-643, 2016 | 42 | 2016 |
Palmprint based cancelable biometric authentication system YH Pang, ABJ Teoh, DCL Ngo International Journal of Signal Processing 1 (2), 98-104, 2004 | 40 | 2004 |
Study of long short-term memory in flow-based network intrusion detection system L Nicholas, SY Ooi, YH Pang, SO Hwang, SY Tan Journal of Intelligent & Fuzzy Systems 35 (6), 5947-5957, 2018 | 37 | 2018 |
Decision tree with sensitive pruning in network-based intrusion detection system YJ Chew, SY Ooi, KS Wong, YH Pang Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020 | 27 | 2020 |
Supervised locally linear embedding in face recognition YH Pang, ABJ Teoh, EK Wong, FS Abas 2008 International Symposium on Biometrics and Security Technologies, 1-6, 2008 | 27 | 2008 |
Enhanced pseudo Zernike moments in face recognition YH Pang, AT BJ, DN CL ieice electronics express 2 (3), 70-75, 2005 | 26 | 2005 |
Face spoofing detection based on improved local graph structure KB Housam, SH Lau, YH Pang, YP Liew, ML Chiang 2014 International Conference on Information Science & Applications (ICISA), 1-4, 2014 | 25 | 2014 |
Regularized locality preserving discriminant embedding for face recognition YH Pang, JTA Beng, FS Abas Neurocomputing 77 (1), 156-166, 2012 | 25 | 2012 |
Two-level scheduling framework with frame level scheduling and exponential rule in wireless network EM Ang, KK Wee, YH Pang, SH Lau 2014 International Conference on Information Science & Applications (ICISA), 1-4, 2014 | 22 | 2014 |
A performance analysis on packet scheduling schemes based on an exponential rule for real-time traffic in LTE EM Ang, KK Wee, YH Pang, KK Phang EURASIP Journal on Wireless Communications and Networking 2015, 1-12, 2015 | 21 | 2015 |
Smartphone-based human activity recognition using lightweight multiheaded temporal convolutional network SR Sekaran, PY Han, OS Yin Expert Systems with Applications 227, 120132, 2023 | 20 | 2023 |
In-air hand gesture signature recognition system based on 3-dimensional imagery WH Khoh, YH Pang, ABJ Teoh Multimedia Tools and Applications 78 (6), 6913-6937, 2019 | 20 | 2019 |