scispace - formally typeset
J

Jiashu Zhang

Researcher at Southwest Jiaotong University

Publications -  166
Citations -  4692

Jiashu Zhang is an academic researcher from Southwest Jiaotong University. The author has contributed to research in topics: Adaptive filter & Digital watermarking. The author has an hindex of 36, co-authored 159 publications receiving 3941 citations.

Papers
More filters
Journal ArticleDOI

Linear Discriminant Analysis Based on L1-Norm Maximization

TL;DR: This paper proposes a simple but effective robust LDA version based on L1-norm maximization, which learns a set of local optimal projection vectors by maximizing the ratio of the L2-norm-based between-class dispersion and the within- class dispersion.
Journal ArticleDOI

Improving the security of 'a flexible biometrics remote user authentication scheme'

TL;DR: An improved security patch is presented which overcomes the weakness of Lin-Lai's scheme and establishes trust between client and remote system in the form of mutual authentication.
Journal ArticleDOI

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

TL;DR: This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA that provides secure, robust, and trustworthy remote authentication of mobile users over insecure network.
Journal ArticleDOI

Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain

TL;DR: The phenomenon why the recognition rate is low without discarding the low-frequency DCT coefficients reasonably is explained and dynamic weighted discrimination power analysis (DWDPA) is proposed to enhance the discrimination power (DP) of the selected DCT coefficient.
Journal ArticleDOI

Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards

TL;DR: It is shown that both Ku et al.'s scheme and Yoon et al.'s scheme are still vulnerable to the guessing attack, forgery attack and denial of service (DoS) attack, and their schemes lack efficiency when users input wrong passwords.