J
Jiashu Zhang
Researcher at Southwest Jiaotong University
Publications - 166
Citations - 4692
Jiashu Zhang is an academic researcher from Southwest Jiaotong University. The author has contributed to research in topics: Adaptive filter & Digital watermarking. The author has an hindex of 36, co-authored 159 publications receiving 3941 citations.
Papers
More filters
Journal ArticleDOI
Linear Discriminant Analysis Based on L1-Norm Maximization
Fujin Zhong,Jiashu Zhang +1 more
TL;DR: This paper proposes a simple but effective robust LDA version based on L1-norm maximization, which learns a set of local optimal projection vectors by maximizing the ratio of the L2-norm-based between-class dispersion and the within- class dispersion.
Journal ArticleDOI
Improving the security of 'a flexible biometrics remote user authentication scheme'
TL;DR: An improved security patch is presented which overcomes the weakness of Lin-Lai's scheme and establishes trust between client and remote system in the form of mutual authentication.
Journal ArticleDOI
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
TL;DR: This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA that provides secure, robust, and trustworthy remote authentication of mobile users over insecure network.
Journal ArticleDOI
Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain
TL;DR: The phenomenon why the recognition rate is low without discarding the low-frequency DCT coefficients reasonably is explained and dynamic weighted discrimination power analysis (DWDPA) is proposed to enhance the discrimination power (DP) of the selected DCT coefficient.
Journal ArticleDOI
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
TL;DR: It is shown that both Ku et al.'s scheme and Yoon et al.'s scheme are still vulnerable to the guessing attack, forgery attack and denial of service (DoS) attack, and their schemes lack efficiency when users input wrong passwords.