Meng-Hui Lim

450 total citations
20 papers, 265 citations indexed

About

Meng-Hui Lim is a scholar working on Computer Vision and Pattern Recognition, Signal Processing and Information Systems. According to data from OpenAlex, Meng-Hui Lim has authored 20 papers receiving a total of 265 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Computer Vision and Pattern Recognition, 13 papers in Signal Processing and 11 papers in Information Systems. Recurrent topics in Meng-Hui Lim's work include Biometric Identification and Security (13 papers), User Authentication and Security Systems (10 papers) and Face recognition and analysis (7 papers). Meng-Hui Lim is often cited by papers focused on Biometric Identification and Security (13 papers), User Authentication and Security Systems (10 papers) and Face recognition and analysis (7 papers). Meng-Hui Lim collaborates with scholars based in South Korea, Hong Kong and Malaysia. Meng-Hui Lim's co-authors include Andrew Beng Jin Teoh, Pong C. Yuen, Bok‐Min Goi, Kar‐Ann Toh, Yong Haur Tay, Zhe Jin, Jaihie Kim, Sang-Gon Lee, Hoon Jae Lee and Sunny Verma and has published in prestigious journals such as IEEE Transactions on Pattern Analysis and Machine Intelligence, Pattern Recognition and IEEE Transactions on Cybernetics.

In The Last Decade

Meng-Hui Lim

19 papers receiving 242 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Meng-Hui Lim South Korea 8 203 189 134 40 30 20 265
Ileana Buhan Netherlands 9 213 1.0× 157 0.8× 199 1.5× 44 1.1× 30 1.0× 18 274
Dennis Lin United States 4 299 1.5× 266 1.4× 258 1.9× 25 0.6× 35 1.2× 5 377
Harkeerat Kaur India 8 227 1.1× 207 1.1× 132 1.0× 42 1.1× 19 0.6× 20 300
Himanshu Rai Russia 6 95 0.5× 118 0.6× 98 0.7× 22 0.6× 78 2.6× 16 239
Chulhan Lee South Korea 7 262 1.3× 257 1.4× 205 1.5× 13 0.3× 29 1.0× 15 341
Xuebing Zhou Germany 11 186 0.9× 215 1.1× 171 1.3× 9 0.2× 79 2.6× 38 342
Sani M. Abdullahi China 9 93 0.5× 259 1.4× 62 0.5× 10 0.3× 73 2.4× 25 332
Bruno Kindarji France 7 156 0.8× 116 0.6× 155 1.2× 10 0.3× 38 1.3× 9 190
Ko-Chin Chang Taiwan 8 101 0.5× 331 1.8× 37 0.3× 15 0.4× 18 0.6× 17 412
Lodovico Marziale United States 6 237 1.2× 84 0.4× 254 1.9× 87 2.2× 110 3.7× 7 313

Countries citing papers authored by Meng-Hui Lim

Since Specialization
Citations

This map shows the geographic impact of Meng-Hui Lim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Meng-Hui Lim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Meng-Hui Lim more than expected).

Fields of papers citing papers by Meng-Hui Lim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Meng-Hui Lim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Meng-Hui Lim. The network helps show where Meng-Hui Lim may publish in the future.

Co-authorship network of co-authors of Meng-Hui Lim

This figure shows the co-authorship network connecting the top 25 collaborators of Meng-Hui Lim. A scholar is included among the top collaborators of Meng-Hui Lim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Meng-Hui Lim. Meng-Hui Lim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lim, Meng-Hui, et al.. (2017). On the guessability of binary biometric templates: A practical guessing entropy based approach. 367–374. 4 indexed citations
2.
3.
Jin, Zhe, Meng-Hui Lim, Andrew Beng Jin Teoh, Bok‐Min Goi, & Yong Haur Tay. (2016). Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication. IEEE Transactions on Systems Man and Cybernetics Systems. 46(10). 1415–1428. 60 indexed citations
4.
Lim, Meng-Hui, et al.. (2016). Binary feature fusion for discriminative and secure multi-biometric cryptosystems. Image and Vision Computing. 58. 254–265. 20 indexed citations
5.
Lim, Meng-Hui, et al.. (2015). Fusing binary templates for multi-biometric cryptosystems. 6. 1–8. 7 indexed citations
6.
Lim, Meng-Hui & Pong C. Yuen. (2015). Entropy Measurement for Biometric Verification Systems. IEEE Transactions on Cybernetics. 46(5). 1065–1077. 27 indexed citations
7.
Lim, Meng-Hui, Andrew Beng Jin Teoh, & Jaihie Kim. (2015). Biometric Feature-Type Transformation: Making templates compatible for secret protection. IEEE Signal Processing Magazine. 32(5). 77–87. 32 indexed citations
8.
Lim, Meng-Hui & Andrew Beng Jin Teoh. (2012). A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode. IEEE Transactions on Pattern Analysis and Machine Intelligence. 35(2). 300–313. 25 indexed citations
9.
Lim, Meng-Hui & Andrew Beng Jin Teoh. (2012). An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding. IEEE Transactions on Information Forensics and Security. 7(4). 1242–1254. 4 indexed citations
10.
Lim, Meng-Hui, Andrew Beng Jin Teoh, & Kar‐Ann Toh. (2011). An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognition. 45(5). 1960–1971. 34 indexed citations
11.
Lim, Meng-Hui & Andrew Beng Jin Teoh. (2011). An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation. EURASIP Journal on Advances in Signal Processing. 2011(1). 3 indexed citations
12.
Lim, Meng-Hui, et al.. (2011). Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network. 2(1). 39–47. 6 indexed citations
13.
Lim, Meng-Hui, Andrew Beng Jin Teoh, & Kar‐Ann Toh. (2011). An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances. EURASIP Journal on Advances in Signal Processing. 2011(1). 6 indexed citations
14.
Lim, Meng-Hui, et al.. (2011). An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. KSII Transactions on Internet and Information Systems. 822–839. 10 indexed citations
15.
Lim, Meng-Hui, et al.. (2010). A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario. Journal of information and communication convergence engineering. 8(2). 173–179. 3 indexed citations
16.
Lim, Meng-Hui, Sang-Gon Lee, & Hoon Jae Lee. (2008). Insider Impersonation Attack on a Tripartite ID-Based Authenticated Key Agreement Protocol with Bilinear Pairings. 196. 123–128. 1 indexed citations
17.
Lim, Meng-Hui, Sang-Gon Lee, Youngho Park, & SangJae Moon. (2008). Secure Deniable Authenticated Key Establishment for Internet Protocols. 2 indexed citations
18.
Lim, Meng-Hui, Sang-Gon Lee, & Hoon Jae Lee. (2008). Cryptanalysis of Improved One-round Lin-Li's Tripartite Key Agreement Protocol. International Conference on Advanced Communication Technology. 122. 1916–1921. 3 indexed citations
19.
Lim, Meng-Hui, Sang-Gon Lee, & Hoon Jae Lee. (2008). An Efficient Multi-server Password Authenticated Key Agreement Scheme Revisited. 1666. 396–400. 5 indexed citations
20.
Lim, Meng-Hui, Sang-Gon Lee, & Hoon Jae Lee. (2008). Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol. 38. 87–93. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026