Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Wencheng Yang

Cyber Security CRC Post Doctoral Researcher

Staff Member Details
Telephone: +61 8 6304 5210
Mobile: +61863045210
Email: w.yang@ecu.edu.au
Campus: Joondalup  
Room: JO23.302  

Wencheng Yang is a postdoctoral researcher at the Security Research Institute within the School of Science.

Background

  • 08/2015 – 12/2016 Research Assistant, The University of New South Wales, Australia
  • 07/2011 - 07/2015 PhD student, The University of New South Wales, Australia
  • 11/2010 – 07/2011 Software Engineer, Zhongxing Telecommunication Equipment (ZTE) Corporation, Shanghai, China
  • 09/2008 – 08/2010 Software Engineer, Customer-Driven Company (CDC) Software Corporation, Shanghai, China

Awards and Recognition

National and International Awards

  • 2014 Chinese Government Scholarship for Outstanding Self-financed Students Abroad

University and National Teaching Awards

  • 07/2011 – 01/2015 University International Postgraduate Award (UIPA) of UNSW
  • 2014 High Impact Journal Publication Award SEIT, UNSW

Research Areas and Interests

  • Biometric Security
  • Biometric Pattern Recognition

Qualifications

  • Doctor of Philosophy, The University of New South Wales, 2015.

Research Outputs

Journal Articles

Conference Publications

  • Yang, W., Wang, S., Johnstone, M. (2021). A Comparative Study of ML-ELM and DNN for Intrusion Detection. 2021 Australasian Computer Science Week Multiconference (7). ACM. https://doi.org/https://doi.org/10.1145/3437378.3437390.
  • Kang, J., Yang, W., Dibaei, M., Luo, G., Zheng, X. (2021). A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (1209 - 1214). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00162.

Book Chapters

Journal Articles

  • Moorfield, J., Wang, S., Yang, W., Bedari, A., Kamp, PV. (2020). A Möbius transformation based model for fingerprint minutiae variations. Pattern Recognition, 98(February 2020), Article number 107054. https://doi.org/https://doi.org/10.1016/j.patcog.2019.107054.
  • Kang, J., Yang, W., Dermody, D., Ghasemian, M., Adibi, S., Haskell-Dowland, P. (2020). No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design. IEEE Access, 8(2020), Article number 9247977. https://doi.org/10.1109/ACCESS.2020.3035812.

Conference Publications

  • Yang, W., Johnstone, M., Sikos, L., Wang, S. (2020). Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020 (12-17). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00007.
  • Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M. (2020). Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications (1-6). DICTA.

Journal Articles

  • Zheng, G., Shankaran, R., Yang, W., Valli, C., Qiao, L., Orgun, M., Mukhopadhyay, SC. (2019). A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices. IEEE Sensors Journal, 19(3), 1186-1198. https://doi.org/10.1109/JSEN.2018.2879929.
  • Yang, W., Wang, S., Zheng, G., Valli, C. (2019). Impact of feature proportion on matching performance of multi-biometric systems. ICT Express, 5(1), 37-40. https://doi.org/10.1016/j.icte.2018.03.001.
  • Zheng, G., Yang, W., Valli, C., Qiao, L., Shankaran, R., Orgun, MA., Mukhopadhyay, SC. (2019). Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE Journal of Biomedical and Health Informatics, 23(4), 1546-1557. https://doi.org/10.1109/JBHI.2018.2864796.
  • McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34. https://doi.org/10.3390/technologies7020034.
  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C. (2019). A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985. https://doi.org/https://doi.org/10.3390/s19132985.
  • Zheng, G., Yang, W., Valli, C., Shankaran, R., Abbas, H., Zhang, G., Fang, G., Chaudhry, J., Qiao, L. (2019). Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access, 7(2019), 75629-75641. https://doi.org/10.1109/ACCESS.2019.2920850.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C. (2019). Securing Deep Learning Based Edge Finger-vein Biometrics with Binary Decision Diagram. IEEE Transactions on Industrial Informatics, 15(7), 4244-4253. https://doi.org/10.1109/TII.2019.2900665.
  • Yang, W., Wang, S., Zheng, G., Yang, J., Valli, C. (2019). A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security. IEEE Communications Magazine, 57(3), 84-89. https://doi.org/10.1109/MCOM.2019.1800378.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C. (2019). Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry, 11(2), article no.141. https://doi.org/10.3390/sym11020141.

Journal Articles

  • Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C. (2018). Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403. https://doi.org/10.1109/ACCESS.2018.2799522.
  • Yang, W., Hu, J., Wang, S., Wu, Q. (2018). Biometrics based Privacy-Preserving Authentication and Mobile Template Protection. Wireless Communications and Mobile Computing, 2018(2018), article no.7107295. https://doi.org/10.1155/2018/7107295.
  • Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C. (2018). ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909. https://doi.org/10.1007/s11227-018-2266-0.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C. (2018). A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251. https://doi.org/10.1016/j.patcog.2018.01.026.

Conference Publications

  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C. (2018). Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (291-298). Springer. https://doi.org/10.1007/978-3-319-90775-8_23.

Journal Articles

Conference Publications

  • Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA. (2017). From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017) (1-5). IEEE. https://doi.org/10.1109/ISCIT.2017.8261228.
  • Macedo, M., Yang, W., Zheng, G., Johnstone, M. (2017). A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference (108-115). Edith Cowan University. https://doi.org/10.4225/75/5a84f3ca95b4b.

Conference Publications

  • Yang, W., Hu, J., Fernandes, C., Sivaraman, V., Wu, Q. (2016). Vulnerability analysis of iPhone 6. Proceedings of the 14th Annual Conference on Privacy, Security and Trust (457-463). IEEE. https://doi.org/10.1109/PST.2016.7907000.

Journal Articles

  • Yang, W., Hu, J., Wang, S., Chen, C. (2015). Mutual dependency of features in multimodal biometric systems. Electronics Letters, 51(3), 234-235. https://doi.org/10.1049/el.2014.4182.

Journal Articles

  • Yang, W., Hu, J., Wang, S., Stojmenovic, M. (2014). An alignment-free fingerprint bio-cryptosytem based on modified Voronoi neighbor structures. Pattern Recognition, 47(3), 1309-1320. https://doi.org/10.1016/j.patcog.2013.10.001.
  • Yang, W., Hu, J., Wang, S. (2014). A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. IEEE Transactions on Information Forensics and Security, 9(7), 1179-1192. https://doi.org/10.1109/TIFS.2014.2328095.

Conference Publications

  • Yang, W., Wang, S. (2014). The effect of spurious and missing minutiae on Delaunay Triangulation based on its application to fingerprint authentication. 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (995-999). IEEE. https://doi.org/10.1109/FSKD.2014.6980975.

Conference Publications

  • Yang, W., Hu, J., Wang, S. (2013). A Finger-Vein Based Cancellable Bio-cryptosystem. Network and System Security 7th International Conference Proceedings (784-790). Springer. https://doi.org/10.1007/978-3-642-38631-2_71.
  • Yang, W., Hu, J., Yang, J., Wang, S., Shu, L. (2013). Biometrics for securing mobile payments: Benefits, challenges and solutions. Proceedings of the 2013 6th International Congress on Image and Signal Processing (1699-1704). IEEE. https://doi.org/10.1109/CISP.2013.6743950.
  • Yang, W., Hu, J., Wang, S., Yang, J. (2013). Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. Cyberspace Safety and Security 5th International Symposium, CSS 2013 Proceedings (81-91). Springer. https://doi.org/10.1007/978-3-319-03584-0_7.
  • Yang, W., Hu, J., Wang, S. (2013). A Delaunay triangle group based fuzzy vault with cancellability. Proceedings of the 2013 6th International Congress on Image and Signal Processing (CISP) (1676-1681). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CISP.2013.6743946.

Conference Publications

  • Yang, W., Hu, J., Wang, S. (2012). A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012) (66-70). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/TrustCom.2012.23.
  • Yang, W., Xi, K., Li, C. (2012). A cancellable and fuzzy fingerprint scheme for mobile computing security. Numerical Analysis and Applied Mathematics ICNAAM 2012: International Conference of Numerical Analysis and Applied Mathematics (6p.). American Institution of Physics. https://doi.org/10.1063/1.4756448.
  • Yang, W., Hu, J., Stojmenovic, M. (2012). NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check. Proceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA) (866-870). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIEA.2012.6360846.

Research Projects

  • 1.4 Network Forensics and Responses to Emerging Threats, Cyber Security Research Centre Ltd, Postdoctoral Research Fellowship, 2019 ‑ 2022, $537,763.
  • Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework, Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 ‑ 2018, $97,729.
  • Design of a Biometric Protection System using Feature Transformation Techniques, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,700.

Research Student Supervision

Associate Supervisor

  • Doctor of Philosophy, Cybersecurity in public sector healthcare - Developing a new approach
No data available
Skip to top of page