{"id":"https://openalex.org/W2915817060","doi":"https://doi.org/10.1109/tii.2019.2900665","title":"Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram","display_name":"Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram","publication_year":2019,"publication_date":"2019-02-21","ids":{"openalex":"https://openalex.org/W2915817060","doi":"https://doi.org/10.1109/tii.2019.2900665","mag":"2915817060"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2019.2900665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2900665","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/6159","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064277907","display_name":"Wencheng Yang","orcid":"https://orcid.org/0000-0001-7800-2215"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Wencheng Yang","raw_affiliation_strings":["Security Research Institute, School of Science, Edith Cowan University, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, School of Science, Edith Cowan University, WA, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047661937","display_name":"Song Wang","orcid":"https://orcid.org/0000-0002-0239-7991"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Song Wang","raw_affiliation_strings":["School of Engineering and Mathematical Sciences, La Trobe University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Mathematical Sciences, La Trobe University, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Canberra, ACT, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026883510","display_name":"Guanglou Zheng","orcid":"https://orcid.org/0000-0002-2307-9562"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guanglou Zheng","raw_affiliation_strings":["Security Research Institute, School of Science, Edith Cowan University, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, School of Science, Edith Cowan University, WA, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007483551","display_name":"Jucheng Yang","orcid":"https://orcid.org/0000-0002-5046-2663"},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jucheng Yang","raw_affiliation_strings":["College of Computer Science and Information Engineering, Tianjin University of Science and Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Engineering, Tianjin University of Science and Technology, Tianjin, China","institution_ids":["https://openalex.org/I132369690"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038343278","display_name":"Craig Valli","orcid":"https://orcid.org/0000-0002-2298-9791"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Craig Valli","raw_affiliation_strings":["Security Research Institute, School of Science, Edith Cowan University, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, School of Science, Edith Cowan University, WA, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064277907"],"corresponding_institution_ids":["https://openalex.org/I12079687"],"apc_list":null,"apc_paid":null,"fwci":7.2977,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.97845833,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"15","issue":"7","first_page":"4244","last_page":"4253"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8253546953201294},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7473695278167725},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7316721677780151},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6756559014320374},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.614216148853302},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5743518471717834},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4891875088214874},{"id":"https://openalex.org/keywords/extreme-learning-machine","display_name":"Extreme learning machine","score":0.43832072615623474},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42842721939086914},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3756042420864105},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3344612121582031}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8253546953201294},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7473695278167725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7316721677780151},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6756559014320374},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.614216148853302},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5743518471717834},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4891875088214874},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.43832072615623474},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42842721939086914},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3756042420864105},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3344612121582031}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2019.2900665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2900665","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-7164","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/6159","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-7164","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/6159","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W86398923","https://openalex.org/W191940071","https://openalex.org/W1966602166","https://openalex.org/W1994143452","https://openalex.org/W2037340447","https://openalex.org/W2078740505","https://openalex.org/W2102780391","https://openalex.org/W2111072639","https://openalex.org/W2111634031","https://openalex.org/W2126960670","https://openalex.org/W2143748665","https://openalex.org/W2232398035","https://openalex.org/W2243366890","https://openalex.org/W2301541953","https://openalex.org/W2328254514","https://openalex.org/W2416799949","https://openalex.org/W2513262855","https://openalex.org/W2537132629","https://openalex.org/W2552276652","https://openalex.org/W2552954853","https://openalex.org/W2598896220","https://openalex.org/W2598954556","https://openalex.org/W2599632008","https://openalex.org/W2618907597","https://openalex.org/W2624181600","https://openalex.org/W2788513268","https://openalex.org/W2793410607","https://openalex.org/W2807766446","https://openalex.org/W2811014381","https://openalex.org/W2919115771","https://openalex.org/W2962744559","https://openalex.org/W2963135377","https://openalex.org/W6844346735"],"related_works":["https://openalex.org/W2067443264","https://openalex.org/W31566076","https://openalex.org/W4297902562","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W3167935049","https://openalex.org/W3103566983","https://openalex.org/W3029198973"],"abstract_inverted_index":{"With":[0],"built-in":[1],"artificial":[2,55,182,260],"intelligence":[3],"(AI),":[4],"edge":[5,23,38,43],"devices,":[6],"e.g.,":[7,58],"smart":[8],"cameras,":[9],"can":[10,67,222],"perform":[11],"tasks":[12],"like":[13],"detecting":[14],"and":[15,225],"tracking":[16],"individuals,":[17],"which":[18,177],"is":[19,81,121,164,178,215],"referred":[20],"to":[21,108,190],"as":[22],"biometrics.":[24,39],"As":[25],"a":[26,34,69,122,142,168,192,241],"driving":[27],"force":[28],"for":[29,84,127,154],"AI,":[30],"machine/deep":[31,247],"learning":[32,41,49,129,156,187,248],"plays":[33],"critical":[35],"role":[36],"in":[37,90,137],"Machine/deep":[40],"based":[42,130,157,249],"biometric":[44,85,88,111,131,144,159,250,254],"systems":[45,86],"outperform":[46],"their":[47],"nonmachine":[48],"counterpart.":[50],"However,":[51],"research":[52],"shows":[53],"that":[54,65],"neural":[56,60,119,183,261],"networks,":[57,61],"convolutional":[59],"are":[62,103,256],"invertible":[63],"such":[64],"adversaries":[66],"obtain":[68],"certain":[70],"amount":[71],"of":[72,166,172,205],"information":[73,79],"about":[74],"the":[75,91,135,149,173,203,206,234,238,245,259],"original":[76,92,110,174,207],"inputs/templates.":[77],"This":[78],"leakage":[80],"not":[82],"tolerable":[83],"because":[87],"data":[89],"(raw)":[93],"templates":[94,112,255],"cannot":[95],"be":[96,223],"reset":[97],"or":[98],"replaced.":[99],"Once":[100],"compromised,":[101,221],"they":[102],"lost":[104],"forever.":[105],"Therefore,":[106,237],"how":[107],"prevent":[109],"from":[113],"being":[114],"attacked":[115],"through":[116],"inverting":[117],"deep":[118,128,155],"networks":[120],"pressing,":[123],"but":[124],"unsolved":[125],"issue,":[126,136],"recognition.":[132],"To":[133],"address":[134],"this":[138],"paper,":[139],"we":[140],"develop":[141],"novel":[143],"template":[145,209],"protection":[146],"algorithm":[147,163],"using":[148],"binary":[150],"decision":[151],"diagram":[152],"(BDD)":[153],"finger-vein":[158,175,194,208],"systems.":[160],"The":[161,199,217],"proposed":[162,200],"capable":[165],"creating":[167],"new":[169,229],"noninvertible":[170],"version":[171,214,230],"template,":[176,219],"stacked":[179],"with":[180,227],"an":[181,264],"network-the":[184],"multilayer":[185],"extreme":[186],"machine":[188],"(ML-ELM)":[189],"generate":[191],"privacy-preserving":[193],"recognition":[195],"system,":[196],"named":[197],"BDD-ML-ELM.":[198],"BDD-ML-ELM":[201,239],"ensures":[202],"safety":[204],"even":[210],"if":[211,220],"its":[212],"transformed":[213,218],"compromised.":[216],"revoked":[224],"replaced":[226],"another":[228],"by":[231],"simply":[232],"changing":[233],"user-specific":[235],"keys.":[236],"has":[240],"clear":[242],"advantage":[243],"over":[244],"existing":[246],"systems,":[251],"whose":[252],"raw":[253],"vulnerable":[257],"when":[258],"network":[262],"suffers":[263],"inversion":[265],"attack.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
