Cascade high gain predictors for a class of nonlinear systems T Ahmed-Ali, E Cherrier, F Lamnabhi-Lagarrigue IEEE Transactions on Automatic Control 57 (1), 221-226, 2011 | 143 | 2011 |
A review on authentication methods SZS Idrus, E Cherrier, C Rosenberger, JJ Schwartzmann Australian Journal of Basic and Applied Sciences 7 (5), 95-107, 2013 | 101 | 2013 |
Observers-based synchronization and input recovery for a class of nonlinear chaotic models E Cherrier, M Boutayeb, J Ragot IEEE Transactions on Circuits and Systems I: Regular Papers 53 (9), 1977-1988, 2006 | 88 | 2006 |
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords SZS Idrus, E Cherrier, C Rosenberger, P Bours Computers & Security 45, 147-155, 2014 | 83 | 2014 |
Preimage attack on biohashing P Lacharme, E Cherrier, C Rosenberger 2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013 | 70 | 2013 |
High-gain observer for a class of time-delay nonlinear systems M Farza, A Sboui, E Cherrier, M M'Saad International Journal of Control 83 (2), 273-280, 2010 | 54 | 2010 |
Soft biometrics database: A benchmark for keystroke dynamics biometric systems SZS Idrus, E Cherrier, C Rosenberger, P Bours 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), 1-8, 2013 | 50 | 2013 |
Soft biometrics for keystroke dynamics SZS Idrus, E Cherrier, C Rosenberger, P Bours Image Analysis and Recognition: 10th International Conference, ICIAR 2013 …, 2013 | 50 | 2013 |
Challenge-based speaker recognition for mobile authentication M Baloul, E Cherrier, C Rosenberger 2012 BIOSIG-Proceedings of the International Conference of Biometrics …, 2012 | 47 | 2012 |
Adaptive biometric systems: Review and perspectives PH Pisani, A Mhenni, R Giot, E Cherrier, N Poh, ... ACM Computing Surveys (CSUR) 52 (5), 1-38, 2019 | 44 | 2019 |
Cascade high gain observers for nonlinear systems with delayed output measurement T Ahmed-Ali, E Cherrier, M M'Saad Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held …, 2009 | 43 | 2009 |
An Overview on Privacy Preserving Biometrics R Belguechi, V Alimi, E Cherrier, P Lacharme, C Rosenberger Intech Book on Biometrics, ISBN, 978-953, 2011 | 37 | 2011 |
Estimation de l'état et des entrées inconnues pour une classe de systèmes non linéaires E Cherrier Institut National Polytechnique de Lorraine (INPL), 2006 | 34 | 2006 |
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password A Mhenni, E Cherrier, C Rosenberger, NEB Amara Computers & Security 83, 151-166, 2019 | 31 | 2019 |
Operational bio‐hash to preserve privacy of fingerprint minutiae templates R Belguechi, E Cherrier, C Rosenberger, S Ait-Aoudia IET biometrics 2 (2), 76-84, 2013 | 30 | 2013 |
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates R Belguechi, E Cherrier, C Rosenberger, S Ait-Aoudia Computers & security 39, 325-339, 2013 | 22 | 2013 |
Keystroke Template Update with Adapted Thresholds A Mhenni, C Rosenberger, E Cherrier, N Essoukri Ben Amara International Conference on Ad- vanced Technologies for Signal and Image …, 2016 | 20 | 2016 |
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition A Mhenni, E Cherrier, C Rosenberger, NEB Amara Future Generation Computer Systems 97, 210-218, 2019 | 19 | 2019 |
Keystroke dynamics performance enhancement with soft biometrics SZS Idrus, E Cherrier, C Rosenberger, S Mondal, P Bours IEEE International Conference on Identity, Security and Behavior Analysis …, 2015 | 17 | 2015 |
Speaker recognition for mobile user authentication: An android solution K Brunet, K Taam, E Cherrier, N Faye, C Rosenberger 8ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d …, 2013 | 16 | 2013 |