Cascade high gain predictors for a class of nonlinear systems T Ahmed-Ali, E Cherrier, F Lamnabhi-Lagarrigue IEEE Transactions on Automatic Control 57 (1), 221-226, 2011 | 134 | 2011 |
Observers-based synchronization and input recovery for a class of nonlinear chaotic models E Cherrier, M Boutayeb, J Ragot IEEE Transactions on Circuits and Systems I: Regular Papers 53 (9), 1977-1988, 2006 | 89 | 2006 |
A review on authentication methods SZS Idrus, E Cherrier, C Rosenberger, JJ Schwartzmann Australian Journal of Basic and Applied Sciences 7 (5), 95-107, 2013 | 80 | 2013 |
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords SZS Idrus, E Cherrier, C Rosenberger, P Bours Computers & Security 45, 147-155, 2014 | 74 | 2014 |
Preimage attack on biohashing P Lacharme, E Cherrier, C Rosenberger 2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013 | 61 | 2013 |
High-gain observer for a class of time-delay nonlinear systems M Farza, A Sboui, E Cherrier, M M'Saad International Journal of Control 83 (2), 273-280, 2010 | 51 | 2010 |
Soft biometrics database: A benchmark for keystroke dynamics biometric systems SZS Idrus, E Cherrier, C Rosenberger, P Bours 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), 1-8, 2013 | 47 | 2013 |
Challenge-based speaker recognition for mobile authentication M Baloul, E Cherrier, C Rosenberger 2012 BIOSIG-Proceedings of the International Conference of Biometrics …, 2012 | 47 | 2012 |
Soft biometrics for keystroke dynamics SZS Idrus, E Cherrier, C Rosenberger, P Bours Image Analysis and Recognition: 10th International Conference, ICIAR 2013 …, 2013 | 45 | 2013 |
Cascade high gain observers for nonlinear systems with delayed output measurement T Ahmed-Ali, E Cherrier, M M'Saad Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held …, 2009 | 39 | 2009 |
Adaptive biometric systems: Review and perspectives PH Pisani, A Mhenni, R Giot, E Cherrier, N Poh, ... ACM Computing Surveys (CSUR) 52 (5), 1-38, 2019 | 35 | 2019 |
An Overview on Privacy Preserving Biometrics R Belguechi, V Alimi, E Cherrier, P Lacharme, C Rosenberger Intech Book on Biometrics, ISBN, 978-953, 2011 | 35 | 2011 |
Estimation de l'état et des entrées inconnues pour une classe de systèmes non linéaires E Cherrier Institut National Polytechnique de Lorraine (INPL), 2006 | 34 | 2006 |
Operational bio‐hash to preserve privacy of fingerprint minutiae templates R Belguechi, E Cherrier, C Rosenberger, S Ait-Aoudia IET biometrics 2 (2), 76-84, 2013 | 28 | 2013 |
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password A Mhenni, E Cherrier, C Rosenberger, NEB Amara Computers & Security 83, 151-166, 2019 | 25 | 2019 |
Keystroke Template Update with Adapted Thresholds A Mhenni, C Rosenberger, E Cherrier, N Essoukri Ben Amara International Conference on Ad- vanced Technologies for Signal and Image …, 2016 | 20 | 2016 |
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates R Belguechi, E Cherrier, C Rosenberger, S Ait-Aoudia Computers & security 39, 325-339, 2013 | 20 | 2013 |
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition A Mhenni, E Cherrier, C Rosenberger, NEB Amara Future Generation Computer Systems 97, 210-218, 2019 | 15 | 2019 |
Keystroke dynamics performance enhancement with soft biometrics SZS Idrus, E Cherrier, C Rosenberger, S Mondal, P Bours IEEE International Conference on Identity, Security and Behavior Analysis …, 2015 | 15 | 2015 |
How to Evaluate Transformation Based Cancelable Biometric Systems? R Belguechi, E Cherrier, C Rosenberger In NIST International Biometric Performance Testing Conference (IBPC), 2012 | 15 | 2012 |