Wei Qi Yan

Wei Qi Yan is an Associate Professor with the Auckland University of Technology (AUT). Dr Yan’s expertise is in digital surveillance, security and forensics, he is leading the Computer and Communications Security (CCS) Research Group at AUT. Dr Yan was an exchange computer scientist between the Royal Society of New Zealand (RSNZ) and the Chinese Academy of Sciences, he is the Chair of the ACM Multimedia Chapter of New Zealand, a Member of the ACM, a Senior Member of the IEEE, TC members of the IEEE. Dr Yan is a guest adjunct Professor with PhD supervision of the State Key Laboratory of Information Security (SKLOIS) China, a visiting Professor of the National University of Singapore and University of Auckland New Zealand.

Publications

Blockchain for Security of Cloud-Based Online Auction
Yun Shu, Jian Yu, Wei Qi Yan. © 2021. 18 pages.
Online auction is one of the most successful internet business models. However, auction fraud has become the highest threat and hazard to the future of this business model. The...
A Framework for Image Encryption on Frequency Domain
Zhe Liu, Mee Loong Yang, Wei Qi Yan. © 2021. 11 pages.
In this chapter, the authors propose an improved image encryption algorithm based on digital watermarking. The algorithm combines discrete wavelet transform (DWT), discrete...
BP-Neural Network for Plate Number Recognition
Jia Wang, Wei Qi Yan. © 2020. 11 pages.
The License Plate Recognition (LPR) as one crucial part of intelligent traffic systems has been broadly investigated since the boosting of computer vision techniques. The...
Comparative Evaluations of Human Behavior Recognition Using Deep Learning
Jia Lu, Wei Qi Yan. © 2020. 14 pages.
With the cost decrease of security monitoring facilities such as cameras, video surveillance has been widely applied to public security and safety such as banks, transportation...
Gait Recognition Using Deep Learning
Chaoran Liu, Wei Qi Yan. © 2020. 13 pages.
Gait recognition mainly uses different postures of each individual to perform identity authentication. In the existing methods, the full-cycle gait images are used for feature...
Design and Implementation of Visual Blockchain With Merkle Tree
Rui Hu, Wei Qi Yan. © 2020. 14 pages.
Although our communities are paying extensive attention to the blockchain technology, it is still far away from realistic applications. Thus, this red-hot technology could be...
Multiple Flames Recognition Using Deep Learning
Chen Xin, Minh Nguyen, Wei Qi Yan. © 2020. 12 pages.
Identifying fire flames is based on object recognition which has valuable applications in intelligent surveillance. This chapter focuses on flame recognition using deep learning...
CVSS: A Cloud-Based Visual Surveillance System
Lei Zhou, Wei Qi Yan, Yun Shu, Jian Yu. © 2019. 14 pages.
A large amount of surveillance videos and images need sufficient storage. In this article, an architecture of cloud-based surveillance systems and its modules will be designed...
Progressive Scrambling for Social Media
Wei Qi Yan, Xiaotian Wu, Feng Liu. © 2019. 20 pages.
Despite research work achieving progress in preserving the privacy of user profiles and visual surveillance, correcting problems in social media have not taken a great step. The...
State Actor Model for Cloud-Based Online Auction
Yun Shu, Jian Yu, Wei Qi Yan. © 2019. 19 pages.
In recent decades, internet auctions have become the most significant e-commerce business model worldwide. With the rapid rise of cloud computing over the last few years, the...
Blockchain for Security of Cloud-Based Online Auction
Yun Shu, Jian Yu, Wei Qi Yan. © 2019. 22 pages.
Online auction is one of the most successful internet business models. However, auction fraud has become the highest threat and hazard to the future of this business model. The...
A Framework for Image Encryption on Frequency Domain
Zhe Liu, Mee Loong Yang, Wei Qi Yan. © 2019. 13 pages.
In this chapter, the authors propose an improved image encryption algorithm based on digital watermarking. The algorithm combines discrete wavelet transform (DWT), discrete...
An Empirical Study for Human Behavior Analysis
Jia Lu, Jun Shen, Wei Qi Yan, Boris Bačić. © 2018. 18 pages.
This paper presents an empirical study for human behavior analysis based on three distinct feature extraction techniques: Histograms of Oriented Gradients (HOG), Local Binary...
Attack Graph Analysis for Network Anti-Forensics
Rahul Chandran, Wei Q. Yan. © 2014. 23 pages.
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With...
Digital Image Forensics Using Multi-Resolution Histograms
Jin Liu, Hefei Ling, Fuhao Zou, WeiQi Yan, Zhengding Lu. © 2012. 13 pages.
In this paper, the authors investigate the prospect of using multi-resolution histograms (MRH) in conjunction with digital image forensics, particularly in the detection of two...
Digital Image Splicing Using Edges
Jonathan Weir, Raymond Lau, WeiQi Yan. © 2012. 12 pages.
In this paper, the authors splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge...
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank
Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu, WeiQi Yan. © 2012. 13 pages.
This paper introduces a new technique for palmprint recognition based on Fisher Linear Discriminant Analysis (FLDA) and Gabor filter bank. This method involves convolving a...
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank
Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu, WeiQi Yan. © 2010. 15 pages.
This paper introduces a new technique for palmprint recognition based on Fisher Linear Discriminant Analysis (FLDA) and Gabor filter bank. This method involves convolving a...
Digital Image Forensics Using Multi-Resolution Histograms
Jin Liu, Hefei Ling, Fuhao Zou, WeiQi Yan, Zhengding Lu. © 2010. 14 pages.
In this paper, the authors investigate the prospect of using multi-resolution histograms (MRH) in conjunction with digital image forensics, particularly in the detection of two...
Digital Image Splicing Using Edges
Jonathan Weir, Raymond Lau, WeiQi Yan. © 2010. 13 pages.
In this paper, the authors splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge...
International Journal of Digital Crime and Forensics (IJDCF)
Feng Liu. Est. 2009.
The International Journal of Digital Crime and Forensics (IJDCF) provides state-of-the-art coverage in the development of legal evidence found in computers and electronic storage...