Follow
Ying Han Pang
Ying Han Pang
Verified email at mmu.edu.my
Title
Cited by
Cited by
Year
Image-based handwritten signature verification using hybrid methods of discrete radon transform, principal component analysis and probabilistic neural network
SY Ooi, ABJ Teoh, YH Pang, BY Hiew
Applied Soft Computing 40, 274-282, 2016
1112016
Palmprint verification with moments
YH Pang, TBJ Andrew, NCL David, FS Hiew
UNION Agency, 2004
662004
A discriminant pseudo Zernike moments in face recognition
YH Pang, ABJ Teoh, DCL Ngo
Journal of Research and Practice in Information Technology 38 (2), 197-211, 2006
612006
An efficient method for human face recognition using wavelet transform and Zernike moments
NH Foon, YH Pang, ATB Jin, DNC Ling
Proceedings. International Conference on Computer Graphics, Imaging and …, 2004
572004
Neighbourhood preserving discriminant embedding in face recognition
PY Han, ATB Jin, FS Abas
Journal of Visual Communication and Image Representation 20 (8), 532-542, 2009
542009
Touch-less fingerprint recognition system
BY Hiew, ABJ Teoh, YH Pang
2007 IEEE Workshop on Automatic Identification Advanced Technologies, 24-29, 2007
502007
Palmprint authentication with Zernike moment invariants
YH Pang, T Connie, A Jin, D Ling
Proceedings of the 3rd IEEE International Symposium on Signal Processing and …, 2003
432003
Texture classification via extended local graph structure
HK Bashier, LS Hoe, LT Hui, MF Azli, PY Han, WK Kwee, MS Sayeed
Optik 127 (2), 638-643, 2016
412016
Digital camera based fingerprint recognition
BY Hiew, ABJ Teoh, YH Pang
2007 IEEE International Conference on Telecommunications and Malaysia …, 2007
392007
Palmprint based cancelable biometric authentication system
YH Pang, ABJ Teoh, DCL Ngo
International Journal of Signal Processing 1 (2), 98-104, 2004
382004
Study of long short-term memory in flow-based network intrusion detection system
L Nicholas, SY Ooi, YH Pang, SO Hwang, SY Tan
Journal of Intelligent & Fuzzy Systems 35 (6), 5947-5957, 2018
322018
Supervised locally linear embedding in face recognition
YH Pang, ABJ Teoh, EK Wong, FS Abas
2008 International Symposium on Biometrics and Security Technologies, 1-6, 2008
272008
Enhanced pseudo Zernike moments in face recognition
YH Pang, AT BJ, DN CL
ieice electronics express 2 (3), 70-75, 2005
272005
Face spoofing detection based on improved local graph structure
KB Housam, SH Lau, YH Pang, YP Liew, ML Chiang
2014 International Conference on Information Science & Applications (ICISA), 1-4, 2014
252014
Regularized locality preserving discriminant embedding for face recognition
YH Pang, JTA Beng, FS Abas
Neurocomputing 77 (1), 156-166, 2012
252012
A performance analysis on packet scheduling schemes based on an exponential rule for real-time traffic in LTE
EM Ang, KK Wee, YH Pang, KK Phang
EURASIP Journal on Wireless Communications and Networking 2015, 1-12, 2015
232015
Two-level scheduling framework with frame level scheduling and exponential rule in wireless network
EM Ang, KK Wee, YH Pang, SH Lau
2014 International Conference on Information Science & Applications (ICISA), 1-4, 2014
212014
Face spoofing detection using local graph structure
HK Bashier, SH Lau, PY Han, LY Ping, CM Li
2014 International Conference on Computer, Communications and Information …, 2014
202014
State of the art: a study on fall detection
G Yongli, OS Yin, PY Han
Proceedings of world academy of science, engineering and technology, 2012
202012
Decision tree with sensitive pruning in network-based intrusion detection system
YJ Chew, SY Ooi, KS Wong, YH Pang
Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020
192020
The system can't perform the operation now. Try again later.
Articles 1–20