default search action
Xingbo Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Yuhang Qiu, Honghui Chen, Xingbo Dong, Zheng Lin, Iman Yi Liao, Massimo Tistarelli, Zhe Jin:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. IEEE Trans. Inf. Forensics Secur. 20: 559-573 (2025) - 2024
- [j13]Kai Huang, Jun Chu, Lu Leng, Xingbo Dong:
TATrack: Target-aware transformer for object tracking. Eng. Appl. Artif. Intell. 127(Part B): 107304 (2024) - [j12]Kai Huang, Kai Xiao, Jun Chu, Lu Leng, Xingbo Dong:
A spatial-temporal contexts network for object tracking. Eng. Appl. Artif. Intell. 127(Part B): 107314 (2024) - [j11]Xingbo Dong, Jaewoo Park, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli, Koksheik Wong:
On the security risk of pre-image attack on cancelable biometrics. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102060 (2024) - [j10]Xingbo Dong, Jiewen Yang, Andrew Beng Jin Teoh, Dahai Yu, Xiaomeng Li, Zhe Jin:
Video-based face outline recognition. Pattern Recognit. 152: 110482 (2024) - [j9]Fengtao Nan, Bin Pu, Jiayi Pan, Yingchun Fan, Jiewen Yang, Xingbo Dong, Zhaozhao Xu, Shuihua Wang:
MFISN: Modality Fuzzy Information Separation Network for Disease Classification. IEEE Trans. Fuzzy Syst. 32(10): 5545-5556 (2024) - [j8]Xingbo Dong, Hui Zhang, Yen-Lung Lai, Zhe Jin, Junduan Huang, Wenxiong Kang, Andrew Beng Jin Teoh:
WiFaKey: Generating Cryptographic Keys From Face in the Wild. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [c22]Bin Pu, Liwen Wang, Jiewen Yang, Guannan He, Xingbo Dong, Shengli Li, Ying Tan, Ming Chen, Zhe Jin, Kenli Li, Xiaomeng Li:
M3-UDA: A New Benchmark for Unsupervised Domain Adaptive Fetal Cardiac Structure Detection. CVPR 2024: 11621-11630 - [c21]Hui Zhang, Xingbo Dong, Yen-Lung Lai, Ying Zhou, Xiaoyan Zhang, Xingguo Lv, Zhe Jin, Xuejun Li:
Validating Privacy-Preserving Face Recognition Under a Minimum Assumption. CVPR 2024: 12205-12214 - [c20]Yoon Gyo Jung, Jaewoo Park, Xingbo Dong, Hojin Park, Andrew Beng Jin Teoh, Octavia I. Camps:
Face Reconstruction Transfer Attack as Out-of-Distribution Generalization. ECCV (75) 2024: 396-413 - [c19]Bin Pu, Xingguo Lv, Jiewen Yang, Guannan He, Xingbo Dong, Yiqun Lin, Shengli Li, Tan Ying, Fei Liu, Ming Chen, Zhe Jin, Kenli Li, Xiaomeng Li:
Unsupervised Domain Adaptation for Anatomical Structure Detection in Ultrasound Images. ICML 2024 - [c18]Liwen Wang, Xiaoyan Zhang, Guannan He, Ying Tan, Shengli Li, Bin Pu, Zhe Jin, Wen Sha, Xingbo Dong:
Learning Frequency and Structure in UDA for Medical Object Detection. PRCV (14) 2024: 518-532 - [i12]Yuhang Qiu, Honghui Chen, Xingbo Dong, Zheng Lin, Iman Yi Liao, Massimo Tistarelli, Zhe Jin:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. CoRR abs/2404.08237 (2024) - [i11]Yoon Gyo Jung, Jaewoo Park, Xingbo Dong, Hojin Park, Andrew Beng Jin Teoh, Octavia I. Camps:
Face Reconstruction Transfer Attack as Out-of-Distribution Generalization. CoRR abs/2407.02403 (2024) - [i10]Xingbo Dong, Hui Zhang, Yen-Lung Lai, Zhe Jin, Junduan Huang, Wenxiong Kang, Andrew Beng Jin Teoh:
WiFaKey: Generating Cryptographic Keys from Face in the Wild. CoRR abs/2407.14804 (2024) - [i9]Zhuowen Yin, Chengru Li, Xingbo Dong:
Video RWKV:Video Action Recognition Based RWKV. CoRR abs/2411.05636 (2024) - 2023
- [j7]Xingbo Dong, Zhihui Miao, Lan Ma, Jiajun Shen, Zhe Jin, Zhenhua Guo, Andrew Beng Jin Teoh:
Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint. Comput. Secur. 125: 103026 (2023) - [j6]Yen-Lung Lai, Xingbo Dong, Zhe Jin, Massimo Tistarelli, Wun-She Yap, Bok-Min Goi:
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography. IEEE Trans. Inf. Forensics Secur. 18: 3101-3115 (2023) - [c17]Ying Zhou, Ming Jie Lee, Hui Zhang, Xingbo Dong, Zhe Jin:
Random Undersampling and Local-Global Matching Mechanism for Cancellable Biometrics Against Authentication Attack. CCBR 2023: 325-339 - [c16]Yafei Liu, Ying Zhou, Weiyu Zhou, Hui Zhang, Yufang Dong, Xingbo Dong, Zhe Jin:
SP2IN: Leveraging Fuzzy Commitment and LDPC Sum-Product Decoder for Key Generation from Face. CCBR 2023: 350-362 - [c15]Hojin Park, Jaewoo Park, Xingbo Dong, Andrew Beng Jin Teoh:
Towards Query Efficient and Generalizable Black-Box Face Reconstruction Attack. ICIP 2023: 1060-1064 - [c14]Hui Zhang, Jiewen Yang, Xingbo Dong, Xingguo Lv, Wei Jia, Zhe Jin, Xuejun Li:
A Video Face Recognition Leveraging Temporal Information Based on Vision Transformer. PRCV (5) 2023: 29-43 - [c13]Dezhi Li, Hojin Park, Xingbo Dong, Yen-Lung Lai, Hui Zhang, Andrew Beng Jin Teoh, Zhe Jin:
Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition. PRCV (5) 2023: 57-73 - [c12]Xingguo Lv, Xingbo Dong, Zhe Jin, Hui Zhang, Siyi Song, Xuejun Li:
L2DM: A Diffusion Model for Low-Light Image Enhancement. PRCV (11) 2023: 130-145 - [i8]Yen-Lung Lai, Xingbo Dong, Zhe Jin:
On Computational Entanglement and Its Interpretation in Adversarial Machine Learning. CoRR abs/2309.15669 (2023) - 2022
- [j5]Xingbo Dong, Muhammad Khurram Khan, Lu Leng, Andrew Beng Jin Teoh:
Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment. IEEE Internet Things J. 9(23): 23786-23794 (2022) - [j4]Xingbo Dong, Sangrae Cho, Youngsam Kim, Soohyung Kim, Andrew Beng Jin Teoh:
Deep rank hashing network for cancellable face identification. Pattern Recognit. 131: 108886 (2022) - [j3]Wanyan Xu, Xingbo Dong, Lan Ma, Andrew Beng Jin Teoh, Zhixian Lin:
RawFormer: An Efficient Vision Transformer for Low-Light RAW Image Enhancement. IEEE Signal Process. Lett. 29: 2677-2681 (2022) - [c11]Jiewen Yang, Xingbo Dong, Liujun Liu, Chao Zhang, Jiajun Shen, Dahai Yu:
Recurring the Transformer for Video Action Recognition. CVPR 2022: 14043-14053 - [c10]Xingbo Dong, Wanyan Xu, Zhihui Miao, Lan Ma, Chao Zhang, Jiewen Yang, Zhe Jin, Andrew Beng Jin Teoh, Jiajun Shen:
Abandoning the Bayer-Filter to See in the Dark. CVPR 2022: 17410-17419 - [i7]Xingbo Dong, Zhe Jin, KokSheik Wong:
A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code. CoRR abs/2203.01095 (2022) - [i6]Xingbo Dong, Wanyan Xu, Zhihui Miao, Lan Ma, Chao Zhang, Jiewen Yang, Zhe Jin, Andrew Beng Jin Teoh, Jiajun Shen:
Abandoning the Bayer-Filter to See in the Dark. CoRR abs/2203.04042 (2022) - [i5]Xingbo Dong, Zhihui Miao, Lan Ma, Jiajun Shen, Zhe Jin, Zhenhua Guo, Andrew Beng Jin Teoh:
Reconstruct Face from Features Using GAN Generator as a Distribution Constraint. CoRR abs/2206.04295 (2022) - 2021
- [b1]Xingbo Dong:
Towards a machine learning based identifier-free face cryptosystem. Monash University, Australia, 2021 - [j2]Xingbo Dong, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, Andrew Beng Jin Teoh:
Secure Chaff-less Fuzzy Vault for Face Identification Systems. ACM Trans. Multim. Comput. Commun. Appl. 17(3): 79:1-79:22 (2021) - [c9]Xingbo Dong, Zhe Jin, Zhenhua Guo, Andrew Beng Jin Teoh:
Towards Generating High Definition Face Images from Deep Templates. BIOSIG 2021: 71-80 - [c8]Xingbo Dong, Zhe Jin, Leshan Zhao, Zhenhua Guo:
BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template. IJCB 2021: 1-8 - [c7]Hanrui Wang, Xingbo Dong, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli:
Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack. WACV (Workshops) 2021: 70-77 - 2020
- [j1]Xingbo Dong, Soohyung Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, Andrew Beng Jin Teoh:
Open-set face identification with index-of-max hashing by learning. Pattern Recognit. 103: 107277 (2020) - [c6]Hanrui Wang, Xingbo Dong, Zhe Jin, Jean-Luc Dugelay, Massimo Tistarelli:
Cross-spectrum Face Recognition Using Subspace Projection Hashing. ICPR 2020: 615-622 - [c5]Jin Keong, Xingbo Dong, Zhe Jin, Khawla Mallat, Jean-Luc Dugelay:
Multi-spectral Facial Landmark Detection. WIFS 2020: 1-6 - [i4]Jin Keong, Xingbo Dong, Zhe Jin, Khawla Mallat, Jean-Luc Dugelay:
Multi-spectral Facial Landmark Detection. CoRR abs/2006.05196 (2020) - [i3]Hanrui Wang, Xingbo Dong, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli:
Security analysis of cancellable biometrics using constrained-optimized similarity-based attack. CoRR abs/2006.13051 (2020)
2010 – 2019
- 2019
- [c4]Xingbo Dong, Zhe Jin, Andrew Teoh Beng Jin:
A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics. BTAS 2019: 1-8 - [c3]Xingbo Dong, KokSheik Wong, Zhe Jin, Jean-Luc Dugelay:
A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing. IWBF 2019: 1-6 - [c2]Xingbo Dong, KokSheik Wong, Zhe Jin, Jean-Luc Dugelay:
A Secure Visual-thermal Fused Face Recognition System Based on Non-Linear Hashing. MMSP 2019: 1-6 - [i2]Xingbo Dong, Zhe Jin, Andrew Teoh Beng Jin:
A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics. CoRR abs/1905.03021 (2019) - [i1]Xingbo Dong, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli, KokSheik Wong:
On the Reliability of Cancelable Biometrics: Revisit the Irreversibility. CoRR abs/1910.07770 (2019) - 2018
- [c1]Xing-Bo Dong, Zhe Jin, KokSheik Wong:
A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code. APSIPA 2018: 908-915
Coauthor Index
aka: Andrew Teoh Beng Jin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-15 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint