Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Wencheng Yang

Cyber Security CRC Post Doctoral Researcher

Contact Information Telephone: +61 8 6304 5210, Mobile: +61863045210, Email: w.yang@ecu.edu.au, Campus: Joondalup, Room: JO23320
Staff Member Details
Telephone: +61 8 6304 5210
Mobile: +61863045210
Email: w.yang@ecu.edu.au
Campus: Joondalup  
Room: JO23320  

 

Wencheng Yang is a postdoctoral researcher at the Security Research Institute within the School of Science.

Background

  • 08/2015 – 12/2016 Research Assistant, The University of New South Wales, Australia
  • 07/2011 - 07/2015 PhD student, The University of New South Wales, Australia
  • 11/2010 – 07/2011 Software Engineer, Zhongxing Telecommunication Equipment (ZTE) Corporation, Shanghai, China
  • 09/2008 – 08/2010 Software Engineer, Customer-Driven Company (CDC) Software Corporation, Shanghai, China

Awards and Recognition

National and International Awards

  • 2014 Chinese Government Scholarship for Outstanding Self-financed Students Abroad

University and National Teaching Awards

  • 07/2011 – 01/2015 University International Postgraduate Award (UIPA) of UNSW
  • 2014 High Impact Journal Publication Award SEIT, UNSW

Research Areas and Interests

  • Biometric Security
  • Biometric Pattern Recognition

Qualifications

  • Doctor of Philosophy, The University of New South Wales, 2015.

Research

Recent Research Grants

  • Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework,  Defence Science and Technology Group of the Department of Defence,  Competitive Evaluation Research Agreement (CERA) Program,  2017 - 2018,  $128,226.
  • Design of a Biometric Protection System using Feature Transformation Techniques,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,700.

Recent Publications (within the last five years)

Journal Articles

  • Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2018), A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251, DOI: 10.1016/j.patcog.2018.01.026.
  • Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C., (2018), ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909, DOI: 10.1007/s11227-018-2266-0.
  • Yang, W., Hu, J., Wang, S., Wu, Q., (2018), Biometrics based Privacy-Preserving Authentication and Mobile Template Protection. Wireless Communications and Mobile Computing, 2018(2018), article no.7107295, Hindawi Publishing Corporation, DOI: 10.1155/2018/7107295.
  • Wang, S., Yang, W., Hu, J., (2017), Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs. Pattern Recognition, 66(1 June 2017), 295-301, Elsevier, DOI: 10.1016/j.patcog.2017.01.019.
  • Yang, W., Hu, J., Wang, S., Chen, C., (2015), Mutual dependency of features in multimodal biometric systems. Electronics Letters, 51(3), 234-235, DOI: 10.1049/el.2014.4182.
  • Yang, W., Hu, J., Wang, S., Stojmenovic, M., (2014), An alignment-free fingerprint bio-cryptosytem based on modified Voronoi neighbor structures. Pattern Recognition, 47(3), 1309-1320, Elsevier, DOI: 10.1016/j.patcog.2013.10.001.
  • Yang, W., Hu, J., Wang, S., (2014), A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. IEEE Transactions on Information Forensics and Security, 9(7), 1179-1192, DOI: 10.1109/TIFS.2014.2328095.

Conference Publications

  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  • Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA., (2017), From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017), 1-5, IEEE.
  • Macedo, M., Yang, W., Zheng, G., Johnstone, M., (2017), A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference, 108-115, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a84f3ca95b4b.
  • Yang, W., Hu, J., Fernandes, C., Sivaraman, V., Wu, Q., (2016), Vulnerability analysis of iPhone 6. Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 457-463, Piscataway, N.J., IEEE, DOI: 10.1109/PST.2016.7907000.
  • Yang, W., Wang, S., (2014), The effect of spurious and missing minutiae on Delaunay Triangulation based on its application to fingerprint authentication. 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, 995-999, IEEE, DOI: 10.1109/FSKD.2014.6980975.
Skip to top of page