Research Publications - Cybersecurity

Select a Topic:​ All Motion Analysis Character Animation Interaction Modelling Video Analysis Action Recognition 3D Reconstruction Healthcare Diagnosis Virtual Reality Environment Sensing Surface Modelling Face Modelling Responsible AI Robotics Crowd Modelling Hands and Gestures Surveillance Cybersecurity Medical Imaging

Sort By:​YearTypeCitationImpact Factor

Our research on cybersecurity covers adversarial attacks in deep neural networks, biometrics for verification using face and hand features, and secure protocols for authentication.

Insterested in our research? Consider joining us.


Citations 50+

A Secure Authentication Protocol for Multi-Server-Based e-Healthcare using a Fuzzy Commitment Scheme
A Secure Authentication Protocol for Multi-Server-Based e-Healthcare using a Fuzzy Commitment Scheme  Impact Factor: 3.4 Citation: 69#
IEEE Access, 2019
Subhas Barman, Hubert P. H. Shum, Samiran Chattopadhyay and Debasis Samanta
Webpage Cite This Paper

Citations 20+

Multiview Discriminative Marginal Metric Learning for Makeup Face Verification
Multiview Discriminative Marginal Metric Learning for Makeup Face Verification  Impact Factor: 5.5 Top 25% Journal in Computer Science, Artificial Intelligence Citation: 20#
Neurocomputing, 2019
Lining Zhang, Hubert P. H. Shum, Li Liu, Guodong Guo and Ling Shao
Webpage Cite This Paper

Citations 10+

LMZMPM: Local Modified Zernike Moment Per-Unit Mass for Robust Human Face Recognition
LMZMPM: Local Modified Zernike Moment Per-Unit Mass for Robust Human Face Recognition  Impact Factor: 6.3 Top 25% Journal in Engineering, Electrical & Electronic Citation: 18#
IEEE Transactions on Information Forensics and Security (TIFS), 2021
Arindam Kar, Sourav Pramanik, Arghya Chakraborty, Debotosh Bhattacharjee, Edmond S. L. Ho and Hubert P. H. Shum
Webpage Cite This Paper
Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed Gradient
Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed Gradient  H5-Index: 291# Core A* Conference Citation: 12#
Proceedings of the 2023 IEEE/CVF International Conference on Computer Vision (ICCV), 2023
Zhengzhi Lu, He Wang, Ziyi Chang, Guoan Yang and Hubert P. H. Shum
Webpage Cite This Paper Supplementary Material GitHub YouTube
Two-Stage Human Verification using HandCAPTCHA and Anti-Spoofed Finger Biometrics with Feature Selection
Two-Stage Human Verification using HandCAPTCHA and Anti-Spoofed Finger Biometrics with Feature Selection  Impact Factor: 7.5 Top 25% Journal in Computer Science, Artificial Intelligence Citation: 11#
Expert Systems with Applications (ESWA), 2021
Asish Bera, Debotosh Bhattacharjee and Hubert P. H. Shum
Webpage Cite This Paper
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications  Impact Factor: 3.4 Citation: 10#
IEEE Access, 2020
Munmun Bhattacharya, Sandip Roy, Kamlesh Mistry, Hubert P. H. Shum and Samiran Chattopadhyay
Webpage Cite This Paper

Citations 5+

Spoofing Detection on Hand Images Using Quality Assessment
Spoofing Detection on Hand Images Using Quality Assessment  Impact Factor: 3.0
Multimedia Tools and Applications (MTAP), 2021
Asish Bera, Ratnadeep Dey, Debotosh Bhattacharjee, Mita Nasipuri and Hubert P. H. Shum
Webpage Cite This Paper

Citations 0+

One-Index Vector Quantization Based Adversarial Attack on Image Classification
One-Index Vector Quantization Based Adversarial Attack on Image Classification  Impact Factor: 3.9
Pattern Recognition Letters (PRL), 2024
Haiju Fan, Xiaona Qin, Shuang Chen, Hubert P. H. Shum and Ming Li
Webpage Cite This Paper


† According to Journal Citation Reports 2023
‡ According to Core Ranking 2023
# According to Google Scholar 2024


 

RSS Feed