Jiankun Hu

Professor

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded ten Australia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09.  He was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. He is serving as an Associate Editor of the following journals: Journal of Security and Communication Networks, Wiley;  IEEE TIFS (Senior Area Editor); KSII TIIS (Area Editor); IET CPS; IEEE OJCS; and Wiley S&P. 

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

 

 

 

 

Books
add
Hu J; Khalil I; Tari Z, 2018, Preface
2018
Book Chapters
add
Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Awad AI; Fairhurst M (ed.), Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13
2018
Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1
2018
Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3
2014
Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019
2011
Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20
2010
Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7
2010
Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11
2010
Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13
2010
Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2
2008
Conference Papers
add
Zhang J; Jia X; Hu J, 2020, 'Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images', in 2020 Digital Image Computing: Techniques and Applications, DICTA 2020, http://dx.doi.org/10.1109/DICTA51227.2020.9363379
2020
Zhang J; Jia X; Hu J, 2020, 'Low-Rank Matrix Decomposition with Superpixel-Based Structured Sparse Regularization for Moving Object Detection in Satellite Videos', in ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pp. 941 - 948, http://dx.doi.org/10.5194/isprs-annals-V-2-2020-941-2020
2020
Zhang J; Jia X; Hu J; Tan K, 2019, 'Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization', in 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018, http://dx.doi.org/10.1109/DICTA.2018.8615873
2019
Farooq A; Jia X; Hu J; Zhou J, 2019, 'Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, http://dx.doi.org/10.1109/WHISPERS.2019.8920832
2019
Wang M; Hu J; Abbass H, 2019, 'Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity', in Australian Journal of Intelligent Information Processing Systems, Sydney, Australia, presented at 2019 - 26th International Conference on Neural Information Processing, Sydney, Australia, 12 December 2019 - 15 December 2019, http://ajiips.com.au/papers/V15.3/v15n3_23-30.pdf
2019
Farooq A; Hu J; Jia X, 2018, 'Weed classification in hyperspectral remote sensing images via deep convolutional neural network', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 3816 - 3819, http://dx.doi.org/10.1109/IGARSS.2018.8518541
2018
Ghosh L; Konar A; Rakshit P; Parui S; Ralescu AL; Nagar AK, 2018, 'P-300 and N-400 Induced Decoding of Learning-Skill of Driving Learners Using Type-2 Fuzzy Sets', in 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/fuzz-ieee.2018.8491525
2018
Li F; Guo Y; Hu J, 2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177, http://dx.doi.org/10.1007/978-3-319-90775-8_14
2018
Wang M; Hu J; Abbass HA, 2018, 'Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers', in IEEE International Conference on Fuzzy Systems, IEEE, Rio de Janeiro, Brazil, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/Fuzz-Ieee.2018.8491544
2018
Zhang J; Jia X; Hu J, 2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July 2018 - 27 April 2018
2018
Nhat Tran Q; Hu J; Wang S, 2018, 'Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure', in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2018.8647290
2018
Salah T; Hasan H; Zemerly MJ; Yeun CY; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'Secure Autonomous Mobile Agents for Web Services', in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2018.8647435
2018
Xu J; Hu J, 2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147, http://dx.doi.org/10.1007/978-3-319-49580-4_13
2017
Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536, http://dx.doi.org/10.1109/IECON.2017.8217138
2017
Yin X; Zhu Y; Hu J, 2017, 'A robust contactless fingerprint enhancement algorithm', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 127 - 136, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_11
2017
Zhu Y; Yin X; Hu J, 2017, 'Robust fingerprint matching based on convolutional neural networks', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 56 - 65, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_5
2017
Zhang J; Jia X; Hu J, 2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, pp. 1 - 7, presented at 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, 29 November 2017 - 01 December 2017, http://dx.doi.org/10.1109/DICTA.2017.8227465
2017
Zhu Y; Yin X; Jia X; Hu J, 2017, 'Latent Fingerprint Segmentation Based on Convolutional Neural Networks', in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, pp. 1 - 6, presented at 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 04 December 2017 - 07 December 2017, http://dx.doi.org/10.1109/WIFS.2017.8267655
2017
Tian X; Shen P; Yang T; Chen C; Hu J, 2017, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 66 - 78, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_6
2017
Yang W; Zheng G; Ibrahim A; Chaudhry J; Wang S; Hu J; Valli C, 2017, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Adelaide, pp. 291 - 298, presented at 9th International Conference, MONAMI 2017, Melbourne, Adelaide, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_23
2017
Tran NN; Sarker R; Hu J, 2017, 'An approach for host-based intrusion detection system design using convolutional neural network', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 116 - 126, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_10
2017
Farooq A; Hu J; Jia X, 2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, pp. 3337 - 3340, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23 July 2017 - 28 July 2017, http://dx.doi.org/10.1109/IGARSS.2017.8127712
2017
Sun J; Zhu B; Qin J; Hu J; Wu Q, 2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818, http://dx.doi.org/10.1142/S0129054117400196
2017
Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, pp. 137 - 149, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_12
2017
Luo X; Ren Y; Liu J; Hu J; Liu W; Wang Z; Xu W; Wu Q, 2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia, pp. 87 - 102, presented at Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 04 July 2016 - 06 July 2016, http://dx.doi.org/10.1007/978-3-319-40367-0_6
2016
Zhu Y; Hu J; Xu J, 2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, China, pp. 156 - 160, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603569
2016
Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016, http://dx.doi.org/10.1109/ICIT.2016.7475043
2016
Yin X; Hu J; Xu J, 2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 144 - 149, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603567
2016
Han F; Xu L; Yu X; Tari Z; Feng Y; Hu J, 2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 825 - 830, presented at Industrial Electronics and Applications (ICIEA), 2016 IEEE 11th Conference on, Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603695
2016
Yang W; Hu J; Fernandes C; Sivaraman V; Wu Q, 2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, pp. 457 - 463, presented at 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7907000
2016
Wang M; Abbass H; Hu J; Merrick K, 2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - , http://dx.doi.org/10.1007/978-3-319-49685-6_9
2016
Wang M; Abbass HA; Hu J, 2016, 'Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems', in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pp. 368 - 375, presented at Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7906958
2016
Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'Using Game Theory with Intrinsic Motivation to Examine Anti-Hacking Policies for Autonomous Systems', in Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, presented at IEEE Symposium Series on Computational Intelligence, Athens, Greece, 06 December 2016 - 09 December 2016, http://dx.doi.org/10.1109/SSCI.2016.7850035
2016
Guo Y; Jiang F; Hu J, 2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311, http://dx.doi.org/10.1109/ICIEA.2015.7334130
2015
Xie M; Hu J; Slay J, 2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015, http://dx.doi.org/10.1109/FSKD.2014.6980972
2015
Cai X; Zhang M; Hu J; Wu Q, 2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, Zhuhai, PEOPLES R CHINA, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), Zhuhai, PEOPLES R CHINA, 30 October 2015 - 31 October 2015, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000371518700099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
2015
Guo Y; Hu J, 2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289, http://dx.doi.org/10.1109/ICIEA.2015.7334126
2015
Zhu X; Chen C; Tian X; Hu J, 2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295, http://dx.doi.org/10.1109/ICIEA.2015.7334127
2015
Xu J; Hu J, 2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1007/978-3-319-25645-0_12
2015
Li C; Hu J, 2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316, http://dx.doi.org/10.1109/ICIEA.2015.7334131
2015
Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, http://dx.doi.org/10.1109/ICIT.2015.7125071
2015
Haider W; Hu J; Yu X; Xie Y, 2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.11
2015
Haider W; Hu J; Xie M, 2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015, http://dx.doi.org/10.1109/ICIEA.2015.7334166
2015
Zheng H; Qin J; Hu J; Wu Q, 2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.16
2015
Zhao H; Xu R; Shu M; Hu J, 2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70, http://dx.doi.org/10.1109/ISADS.2015.13
2015
Chen C; Wang C; Yang T; Lin D; Wang S; Hu J, 2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980974
2014
Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940, http://dx.doi.org/10.1109/FSKD.2014.6980965
2014
Xie M; Hu J; Yu X; Chang E, 2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549, http://dx.doi.org/10.1007/978-3-319-11698-3_44
2014
Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388, http://dx.doi.org/10.1007/978-3-319-11698-3_29
2014
Kabir ME; Hu J, 2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946, http://dx.doi.org/10.1109/FSKD.2014.6980966
2014
Yang W; Hu J; Wang S, 2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999, http://dx.doi.org/10.1109/FSKD.2014.6980975
2014
Hu J; Pieprzyk J; Gardiyawasam Pussewalage H, 2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980968
2014
Chen C; Zhu X; Shen P; Hu J, 2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564, http://dx.doi.org/10.1109/INFCOMW.2014.6849292
2014
Jiang F; Hu J, 2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345, http://dx.doi.org/10.1109/WCNC.2013.6555276
2013
Yang W; Hu J; Wang S, 2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013, http://dx.doi.org/10.1007/978-3-642-38631-2_71
2013
Xu Z; Yu X; Feng Y; Hu J; Tari Z; Han F, 2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381, http://dx.doi.org/10.1109/ICIEA.2013.6566581
2013
Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301
2013
Zhao H; Shu M; Qin J; Hu J, 2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747, http://dx.doi.org/10.1109/CIS.2013.162
2013
Xu J; Hu J; Jia X, 2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729, http://dx.doi.org/10.1109/CISP.2013.6743954
2013
Xie M; Hu J, 2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716, http://dx.doi.org/10.1109/CISP.2013.6743952
2013
Zhao H; Hu J; Qin J; Varadharajan V; Wan H, 2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.171
2012
Yang W; Hu J; Stojmenovic M, 2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012, http://dx.doi.org/10.1109/ICIEA.2012.6360846
2012
Qin J; Hu J; Zhao H, 2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.263
2012
Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012, http://dx.doi.org/10.1007/978-3-642-31588-6_64
2012
Tran QA; Jiang F; Hu J, 2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.51
2012
Xie M; Hu J; Tian B, 2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.173
2012
Yang W; Hu J; Wang S, 2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.23
2012
Yaakob N; Khalil I; Hu J, 2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011
2011
Ahmad T; Hu J; Wang S, 2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975738
2011
Jiang F; Frater M; Hu J, 2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011, http://dx.doi.org/10.1109/DASC.2011.46
2011
di Vimercati SDC; Samarati P; Foresti S; Hu J, 2011, 'Foreword from the Conference Chairs', in 2011 5th International Conference on Network and System Security, IEEE, presented at 2011 5th International Conference on Network and System Security (NSS), 06 September 2011 - 08 September 2011, http://dx.doi.org/10.1109/icnss.2011.6059949
2011
Han F; Hu J; Alkhathami M; Xi K, 2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975739
2011
Han F; Feng Y; Alzahrani NS; Xi K; Hu J, 2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975591
2011
Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011, http://dx.doi.org/10.1109/ICCSNT.2011.6182033
2011
Xi K; Hu J; Han F, 2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975740
2011
Park JH; Yang LT; Zeadally S; Woungang I; Kawsar F; Jeong YS; Cerqueira E; Fowler S; Zhang Z; Chao HC; Phillips I; Hu J; Taniar D; Chen JL; Huang R; Makki K; Falowo O; Hunt R; Mehmood R; Chan P; Iftikha M; Gasparakis J; Martinez G; Kamel I; Law E; Mihovska A; Moustafa H; Huang TC; Landfeldt B; Anagnostopoulos I; Chilamkurti N; Chang YC; Wu TY; Wang RC; Yen YS; Chang SY; Huang S; Wu HC; Ferworn A; Zhang Y; Stefanos Gritzalis S; Fernando X; Anpalagan A; Singh A; Ding JW; Zhou L; Hussain M; Wang WC; Kwak J; Chang CC; Martinelli F; Pan G; Sun HM; Forne J; Bergmann N; Belli F; Sarker BK; Biswas J; Sauveron D; Pedreiras P; Crespi N; Shyu ML; Tabata T; Cong-Vinh P; Chen LJ; Deng DJ; Zhang B; Zheng J; Geilen M; Iqbal R; Villano U; Ali S; Shun CT; Naureen A, 2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, http://dx.doi.org/10.1109/FUTURETECH.2010.5482638
2010
Xiang Y; Samarati P; Hu J, 2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, http://dx.doi.org/10.1109/NSS.2010.5
2010
Raffe W; Hu J; Zambetta F; Xi K, 2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, Taichung, TAIWAN, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, Taichung, TAIWAN, 15 June 2010 - 17 June 2010, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000293666000066&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
2010
Xi K; Hu J, 2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, Xian, PEOPLES R CHINA, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, Xian, PEOPLES R CHINA, 25 May 2009 - 27 May 2009, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000273183200122&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
2009
Yeo SS; Hu J, 2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, pp. 11, http://dx.doi.org/10.1109/CSA.2008.5
2008
Hoang XD; Hu J; Bertok P, 2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346
2003
Phillips D; Hu J, 2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231
2003
Hu J; Wu HR; Chou CT; Verhaegen M; Westwick D; Nijsse G, 1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530
1999
Hu J; Wu HR, 1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, http://dx.doi.org/10.1109/ISSPA.1999.818201
1999
Hu J; Bohn C; Wu HR, 1999, 'Practical H∞ weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924
1999
Hu J; Wu HR; Chou CT; Verhaegen M, 1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179
1999
Hu J; Unbehauen H; Bohn C, 1996, 'Practical approach to selecting weighting functions for H∞ control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003
1996
Journal articles
add
Fei X; Xie Y; Tang S; Hu J, 2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, vol. 173, http://dx.doi.org/10.1016/j.jnca.2020.102872
2021
Wu HT; Zheng K; Huang Q; Hu J, 2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, vol. 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840
2021
Yin X; Zhu Y; Hu J, 2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/TPAMI.2019.2949299
2021
Tran QN; Turnbull BP; Wu H-T; de Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, vol. 2, pp. 72 - 84, http://dx.doi.org/10.1109/ojcs.2021.3053032
2021
Tran NN; Pota HR; Tran QN; Hu J, 2021, 'Designing constraint-based false data injection attacks against the unbalanced distribution smart grids', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2021.3056649
2021
Han S; Wu Q; Zhang H; Qin B; Hu J; Shi X; Liu L; Yin X, 2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371
2021
Tran QN; Hu J, 2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170
2021
Zhang J; Jia X; Hu J; Tan K, 2021, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, http://dx.doi.org/10.1109/TPAMI.2021.3066696
2021
Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve?', IEEE Open Journal of the Computer Society, vol. 2, pp. 179 - 191, http://dx.doi.org/10.1109/ojcs.2021.3068385
2021
Shen M; Liu Y; Zhu L; Du X; Hu J, 2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876
2021
Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, vol. 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026
2020
Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, vol. 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416
2020
Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, vol. 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855
2020
Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, 'Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation', Concurrency Computation, http://dx.doi.org/10.1002/cpe.5956
2020
Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, vol. 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011
2020
Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, vol. 105, pp. 107381 - 107381, http://dx.doi.org/10.1016/j.patcog.2020.107381
2020
Su Y; Sun J; Qin J; Hu J, 2020, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3002553
2020
Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, vol. 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181
2020
Shen M; Cheng G; Zhu L; Du X; Hu J, 2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, vol. 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089
2020
Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, vol. 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083
2020
Ma H; Xie Y; Tang S; Hu J; Liu X, 2020, 'Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2020.3036664
2020
Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization', IEEE TRANSACTIONS ON BIG DATA, vol. 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555
2019
Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, vol. 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372
2019
Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, vol. 145, http://dx.doi.org/10.1016/j.jnca.2019.102411
2019
Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, vol. 11, http://dx.doi.org/10.3390/rs11141692
2019
Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), vol. 19, http://dx.doi.org/10.3390/s19132985
2019
Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, vol. 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004
2019
Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
2019
Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, vol. 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879
2019
Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, vol. 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007
2019
Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior
2019
Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, vol. 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665
2019
Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403
2019
Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
2019
Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, vol. 11, http://dx.doi.org/10.3390/sym11020141
2019
Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics, vol. 12, pp. 65, http://dx.doi.org/10.3389/fnbot.2018.00065
2018
Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, vol. 2018, http://dx.doi.org/10.1155/2018/7107295
2018
Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, vol. 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177
2018
Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, vol. 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029
2018
Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, vol. 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451
2018
Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
2018
Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312
2018
Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, vol. 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026
2018
Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, vol. 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011
2018
Zhang Y; Hu W; Xu W; Chou CT; Hu J, 2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410
2018
Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, vol. 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182
2018
Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794
2018
Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, vol. 2018, http://dx.doi.org/10.1155/2018/5275132
2018
Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, vol. 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033
2017
Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, vol. 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z
2017
Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, vol. 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x
2017
Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, vol. 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017
2017
Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, vol. 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
2017
Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, vol. 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019
2017
Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, vol. 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6
2017
Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913
2017
Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, vol. 2017, http://dx.doi.org/10.1155/2017/3606424
2017
Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, vol. 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738
2017
Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, vol. 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032
2017
Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, vol. 9, pp. 2641 - 2642, http://dx.doi.org/10.1002/sec.1497
2016
Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, vol. PP, http://dx.doi.org/10.1109/TIFS.2016.2603961
2016
Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630
2016
Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, vol. 8, http://dx.doi.org/10.3390/fi8030034
2016
Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, vol. 27, pp. 951 - 963, http://dx.doi.org/10.1109/TPDS.2015.2425407
2016
Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, vol. 8, pp. 29 - 29, http://dx.doi.org/10.3390/fi8030029
2016
Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, vol. 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488
2016
Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, vol. 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566
2016
Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, vol. 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664
2016
Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency Computation, vol. 28, pp. 2940 - 2957, http://dx.doi.org/10.1002/cpe.3600
2016
Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, vol. 54, pp. 14 - 22, http://dx.doi.org/10.1016/j.patcog.2016.01.001
2016
Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, vol. 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003
2016
Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, vol. 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413
2016
Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, vol. 62, pp. 66 - 75, http://dx.doi.org/10.1016/j.future.2016.01.007
2016
Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, vol. 7, pp. 2423 - 2436, http://dx.doi.org/10.1109/TSG.2016.2563461
2016
Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, vol. 15, http://dx.doi.org/10.1145/2930669
2016
Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, vol. 62, pp. 196 - 204, http://dx.doi.org/10.1016/j.future.2015.12.009
2016
Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, vol. 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107
2016
Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, vol. 2015, http://dx.doi.org/10.1155/2015/352761
2015
Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, vol. 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182
2015
Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, vol. 2015, http://dx.doi.org/10.1155/2015/764919
2015
Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198
2015
Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, vol. 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34
2015
Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, vol. 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003
2015
Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593
2015
Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, vol. 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397
2015
Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, vol. 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218
2015
Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, vol. 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802
2015
Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, vol. 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349
2015
Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, vol. 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015
2015
Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, vol. 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016
2015
Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), vol. 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812
2015
Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, vol. 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688
2015
Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, vol. 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445
2015
Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, vol. 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247
2014
Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, vol. 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927
2014
Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095
2014
Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, vol. 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004
2014
Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221
2014
Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301
2014
Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, vol. 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53
2014
Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, vol. 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001
2014
Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, vol. 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002
2014
Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency Computation Practice and Experience, vol. 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042
2014
Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488
2014
Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, vol. 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003
2014
Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, vol. 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13
2014
Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1401 - 1410, http://dx.doi.org/10.1109/TPDS.2012.232
2013
Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946
2013
Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67
2013
Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956
2013
Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958
2013
Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7
2013
Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, vol. 13, pp. 204 - 210, http://dx.doi.org/10.1002/wcm.1109
2013
Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950
2013
Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, vol. 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124
2013
Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268
2013
Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS, pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23
2013
Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320
2013
Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14
2013
Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947
2013
Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency Computation Practice and Experience, vol. 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810
2012
Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, vol. 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005
2012
Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, vol. 28, pp. 368 - 370, http://dx.doi.org/10.1016/j.future.2011.06.011
2012
Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS
2012
Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, vol. 55, pp. 438, http://dx.doi.org/10.1093/comjnl/bxs016
2012
Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 83 LNICST, pp. 16 - 23, http://dx.doi.org/10.1007/978-3-642-29734-2_3
2012
Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, vol. 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397
2012
Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1661 - 1670, http://dx.doi.org/10.1109/TPDS.2012.261
2012
Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, vol. 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004
2012
Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, vol. 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004
2012
Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, vol. 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065
2012
Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, vol. 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010
2012
Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, vol. 1479, pp. 1492 - 1493, http://dx.doi.org/10.1063/1.4756447
2012
Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, vol. 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123
2012
Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, vol. 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797
2012
Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, vol. 4, pp. 483 - 486
2011
Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, vol. 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022
2011
Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73
2011
Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, vol. 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001
2011
Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, vol. 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003
2011
Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, vol. 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015
2011
Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, vol. 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064
2011
Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, vol. 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013
2011
Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, vol. 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226
2011
Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, vol. 34, pp. 116 - 120, http://dx.doi.org/10.1016/j.jnca.2010.08.009
2011
Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736
2011
Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, vol. 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647
2011
Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, vol. 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225
2011
Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, vol. 4, pp. 902 - 909, http://dx.doi.org/10.1002/sec.221
2011
Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, vol. 34, pp. 80 - 88, http://dx.doi.org/10.1016/j.jnca.2010.09.002
2011
Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, vol. 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240
2011
Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988
2010
Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003
2007
Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277
2005
Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, vol. 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210
2004
Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, vol. 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271
2004
Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200
2003
Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245
2003
Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, vol. 1, pp. 166 - 170
2002
Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, vol. 2, pp. 1005 - 1008
2001
Hu J; Bohn C; Wu HR, 2000, 'Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, vol. 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4
2000
Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, vol. 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389
1999
Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, vol. 34, pp. 925 - 927
1998
Reports
add
Zhu R; Sun Z; Ristaniemi T; Hu J, 2013, Guest editorial: Special issue on green telecommunications, http://dx.doi.org/10.1007/s11235-011-9637-7
2013

Cyber Security including biometric security.

Sub Theme