Professor Jiankun Hu

Professor Jiankun Hu

Professor
UNSW Canberra
School of Systems & Computing

False Data Injection Attack Dataset Download

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded ten Australia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09.  He was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. He is serving as an Associate Editor of the following journals: Journal of Security and Communication Networks, Wiley;  IEEE TIFS (Senior Area Editor); KSII TIIS (Area Editor); IET CPS; IEEE OJCS; and Wiley S&P. 

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

 

ADFA Dataset download on one link: https://research.unsw.edu.au/projects/adfa-ids-datasets

 

 

 

Phone
+61 2 5114 5159
Location
Building 15 Room 106 School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, PO Box 7916, Canberra BC ACT 2610, AUSTRALIA
  • Books | 2018
    Hu J; Khalil I; Tari Z, 2018, Preface
    Books | 2017
    Thampi SM; Perez GM; Westphall CB; Hu J; Fan CI; Marmol FG, 2017, Preface
    Books | 2007
    Naït-Abdesselam F; Hu J; Boukerche A, 2007, PPN 2007 PC co-chairs' message
  • Book Chapters | 2021
    Yin X; Zhu Y, 2021, '3D Fingerprint', in Encyclopedia of Cryptography, Security and Privacy, Springer, Berlin, Heidelberg, http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1
    Book Chapters | 2020
    Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119
    Book Chapters | 2018
    Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1
    Book Chapters | 2018
    Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13
    Book Chapters | 2017
    Tran QN; Wang S; Ou R; Hu J, 2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170, http://dx.doi.org/10.1049/PBSE004E_ch7
    Book Chapters | 2014
    Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3
    Book Chapters | 2012
    Fei H; Jing Q; Huawei Z; Jiankun H, 2012, 'A General Transformation from KP-ABE to Searchable Encryption', in Cyberspace Safety and Security, Springer Berlin Heidelberg, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14
    Book Chapters | 2011
    Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019
    Book Chapters | 2010
    Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13
    Book Chapters | 2010
    Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20
    Book Chapters | 2010
    Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11
    Book Chapters | 2010
    Sufi F; Khalil I; Hu J, 2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331, http://dx.doi.org/10.1007/978-3-642-04117-4_17
    Book Chapters | 2010
    Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7
    Book Chapters | 2008
    Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, Elsevier, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2
    Book Chapters | 2006
    Hu J; Bertok P; Hamilton M; White G; Duff A; Cutts Q, 2006, 'Wireless interactive teaching by using keypad-based ARS', in Audience Response Systems in Higher Education: Applications and Cases, pp. 209 - 221, http://dx.doi.org/10.4018/978-1-59140-947-2.ch014
  • Journal articles | 2024
    Alabsi A; Hawbani A; Wang X; Dubai AA; Hu J; Aziz SA; Kumar S; Zhao L; Shvetsov AV; Alsamhi SH, 2024, 'Wireless Power Transfer Technologies, Applications, and Future Trends: A Review', IEEE Transactions on Sustainable Computing, pp. 1 - 18, http://dx.doi.org/10.1109/tsusc.2024.3380607
    Journal articles | 2024
    Du H; Che Z; Shen M; Zhu L; Hu J, 2024, 'Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 616 - 631, http://dx.doi.org/10.1109/TIFS.2023.3326984
    Journal articles | 2024
    Khan M; Hartog FD; Hu J, 2024, 'Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation', Sensors, 24, http://dx.doi.org/10.3390/s24051583
    Journal articles | 2024
    Sun F; Yu J; Hu J, 2024, 'Privacy-Preserving Approximate Minimum Community Search on Large Networks', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3376201
    Journal articles | 2024
    Wang M; Yin X; Hu J, 2024, 'Cancellable Deep Learning Framework for EEG Biometrics', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3369405
    Journal articles | 2024
    Wu HT; Cao X; Gao Y; Zheng K; Huang J; Hu J; Tian Z, 2024, 'Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation', IEEE Transactions on Emerging Topics in Computational Intelligence, 8, pp. 313 - 326, http://dx.doi.org/10.1109/TETCI.2023.3301337
    Journal articles | 2024
    Wu HT; Cheung YM; Tian Z; Liu D; Luo X; Hu J, 2024, 'Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3362592
    Journal articles | 2024
    Yang W; Wang S; Hu J; Tao X; Li Y, 2024, 'Feature extraction and learning approaches for cancellable biometrics: A survey', CAAI Transactions on Intelligence Technology, http://dx.doi.org/10.1049/cit2.12283
    Journal articles | 2024
    Zhang J; Jia X; Zhou J; Zhang J; Hu J, 2024, 'Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images', IEEE Transactions on Image Processing, 33, pp. 881 - 896, http://dx.doi.org/10.1109/TIP.2023.3336170
    Journal articles | 2024
    Zhu X; Shen P; Dai Y; Xu L; Hu J, 2024, 'Privacy-preserving and Trusted Keyword Search for Multi-tenancy Cloud', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3377549
    Journal articles | 2023
    Li D; Chen R; Wan Q; Guan Z; Sun Y; Wu Q; Hu J; Liu J, 2023, 'Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain', IEEE Internet of Things Journal, 10, pp. 21135 - 21142, http://dx.doi.org/10.1109/JIOT.2022.3228799
    Journal articles | 2023
    Li D; Liu D; Ren Y; Sun Y; Guan Z; Wu Q; Hu J; Liu J, 2023, 'CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2023.3333549
    Journal articles | 2023
    Liang Y; Xie Y; Tang S; Yu S; Liu X; Hu J, 2023, 'Network Traffic Content Identification Based on Time-Scale Signal Modeling', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2607 - 2624, http://dx.doi.org/10.1109/TDSC.2022.3186665
    Journal articles | 2023
    Liu K; Yang K; Pu D; Han Y; Zhou Z; Hu J, 2023, '[Construction and Exploration of Simulative Virtual Curriculum of Laparoscopy for Standardized Surgical Residency Training].', Sichuan Da Xue Xue Bao Yi Xue Ban, 54, pp. 1133 - 1138, http://dx.doi.org/10.12182/20231160302
    Journal articles | 2023
    Shen W; Yu J; Yang M; Hu J, 2023, 'Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4593 - 4606, http://dx.doi.org/10.1109/TDSC.2022.3228699
    Journal articles | 2023
    Song W; Jia H; Wang M; Wu Y; Xue W; Chou CT; Hu J; Hu W, 2023, 'Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration', IEEE Internet of Things Journal, 10, pp. 8155 - 8171, http://dx.doi.org/10.1109/JIOT.2022.3231381
    Journal articles | 2023
    Song X; Lan Y; Zheng X; Zhu Q; Liao X; Liu K; Zhang W; Peng Q; Zhu Y; Zhao L; Chen X; Shu Y; Yang K; Hu J, 2023, 'Targeting drug-tolerant cells: A promising strategy for overcoming acquired drug resistance in cancer cells.', MedComm (2020), 4, pp. e342, http://dx.doi.org/10.1002/mco2.342
    Journal articles | 2023
    Song X; Liu K; Liao X; Zhu Y; Peng B; Zhang W; Zhao L; Chen X; Yang K; Hu J, 2023, 'Clinical significance of tumor deposits in gastric cancer after radical gastrectomy: a propensity score matching study.', World J Surg Oncol, 21, pp. 325, http://dx.doi.org/10.1186/s12957-023-03208-1
    Journal articles | 2023
    Tran HY; Hu J; Pota HR, 2023, 'A Privacy-Preserving State Estimation Scheme for Smart Grids', IEEE Transactions on Dependable and Secure Computing, 20, pp. 3940 - 3956, http://dx.doi.org/10.1109/TDSC.2022.3210017
    Journal articles | 2023
    Tran HY; Hu J; Yin X; Pota HR, 2023, 'An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Information Forensics and Security, 18, pp. 2538 - 2552, http://dx.doi.org/10.1109/TIFS.2023.3267892
    Journal articles | 2023
    Wang M; Wang S; Hu J, 2023, 'PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4258 - 4272, http://dx.doi.org/10.1109/TDSC.2022.3218782
    Journal articles | 2023
    Wu HT; Cheung YM; Zhuang Z; Xu L; Hu J, 2023, 'Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing', IEEE Transactions on Cybernetics, 53, pp. 3688 - 3701, http://dx.doi.org/10.1109/TCYB.2022.3163245
    Journal articles | 2023
    Yang J; He Y; Liao X; Hu J; Li K, 2023, 'Does postoperative pulmonary infection correlate with intestinal flora following gastric cancer surgery? - a nested case-control study.', Front Microbiol, 14, pp. 1267750, http://dx.doi.org/10.3389/fmicb.2023.1267750
    Journal articles | 2023
    Yang K; Zhang W; Chen Z; Chen X; Liu K; Zhao L; Hu J, 2023, 'Comparison of long-term quality of life between Billroth-I and Roux-en-Y anastomosis after distal gastrectomy for gastric cancer: a randomized controlled trial.', Chin Med J (Engl), 136, pp. 1074 - 1081, http://dx.doi.org/10.1097/CM9.0000000000002602
    Journal articles | 2023
    Yin X; Wang S; Zhu Y; Hu J, 2023, 'A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications', IEEE Internet of Things Journal, 10, pp. 877 - 892, http://dx.doi.org/10.1109/JIOT.2022.3204246
    Journal articles | 2023
    Zhang P; He F; Zhang H; Hu J; Huang X; Wang J; Yin X; Zhu H; Li Y, 2023, 'Real-Time Malicious Traffic Detection with Online Isolation Forest over SD-WAN', IEEE Transactions on Information Forensics and Security, 18, pp. 2076 - 2090, http://dx.doi.org/10.1109/TIFS.2023.3262121
    Journal articles | 2023
    Zhu Y; Yin X; Hu J, 2023, 'FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 8358 - 8371, http://dx.doi.org/10.1109/TPAMI.2023.3236876
    Journal articles | 2023
    2023, 'Deep Learning in Diverse Intelligent Sensor Based Systems', , http://dx.doi.org/10.3390/s23010062
    Journal articles | 2022
    Chen J; Wu HT; Lu L; Luo X; Hu J, 2022, 'Single underwater image haze removal with a learning-based approach to blurriness estimation', Journal of Visual Communication and Image Representation, 89, http://dx.doi.org/10.1016/j.jvcir.2022.103656
    Journal articles | 2022
    Farooq A; Jia X; Hu J; Zhou J, 2022, 'Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery', IEEE Transactions on Geoscience and Remote Sensing, 60, http://dx.doi.org/10.1109/TGRS.2021.3102243
    Journal articles | 2022
    Khan M; den Hartog F; Hu J, 2022, 'A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems', Sensors, 22, pp. 8188, http://dx.doi.org/10.3390/s22218188
    Journal articles | 2022
    Liu Y; Liu F; Wu HT; Yang J; Zheng K; Xu L; Yan X; Hu J, 2022, 'RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing', Journal of Network and Computer Applications, 207, http://dx.doi.org/10.1016/j.jnca.2022.103484
    Journal articles | 2022
    Ma H; Xie Y; Tang S; Hu J; Liu X, 2022, 'Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field', IEEE Transactions on Dependable and Secure Computing, 19, pp. 1735 - 1752, http://dx.doi.org/10.1109/TDSC.2020.3036664
    Journal articles | 2022
    Su Y; Sun J; Qin J; Hu J, 2022, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, 10, pp. 2050 - 2065, http://dx.doi.org/10.1109/TCC.2020.3002553
    Journal articles | 2022
    Tran HY; Hu J; Pota HR, 2022, 'Smart Meter Data Obfuscation with a Hybrid Privacy-preserving Data Publishing Scheme without a Trusted Third Party', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2022.3153043
    Journal articles | 2022
    Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2022, 'Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation', Concurrency and Computation: Practice and Experience, 34, http://dx.doi.org/10.1002/cpe.5956
    Journal articles | 2022
    Tran QN; Turnbull BP; Wang M; Hu J, 2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10, http://dx.doi.org/10.1109/OJCS.2021.3138332
    Journal articles | 2022
    Wang M; Wang S; Hu J, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', ArXiv, http://dx.doi.org/10.48550/arXiv.2203.16730
    Journal articles | 2022
    Wang M; Wang S; Hu J, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2022.3204222
    Journal articles | 2022
    Wu HT; Zheng Y; Zhao B; Hu J, 2022, 'An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain', IEEE Internet of Things Journal, 9, pp. 6956 - 6968, http://dx.doi.org/10.1109/JIOT.2021.3113997
    Journal articles | 2022
    Yang W; Wang S; Yin X; Wang X; Hu J, 2022, 'A Review on Security Issues and Solutions of the Internet of Drones', IEEE Open Journal of the Computer Society, 3, pp. 96 - 110, http://dx.doi.org/10.1109/OJCS.2022.3183003
    Journal articles | 2022
    Yin X; Wang S; Shahzad M; Hu J, 2022, 'An IoT-Oriented Privacy-Preserving Fingerprint Authentication System', IEEE Internet of Things Journal, 9, pp. 11760 - 11771, http://dx.doi.org/10.1109/JIOT.2021.3131956
    Journal articles | 2022
    Yin X; Zhu Y; Hu J, 2022, 'A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Industrial Informatics, 18, pp. 1957 - 1967, http://dx.doi.org/10.1109/TII.2021.3102332
    Journal articles | 2022
    Yin X; Zhu Y; Xie Y; Hu J, 2022, 'PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems', IEEE Open Journal of the Computer Society, 3, pp. 149 - 161, http://dx.doi.org/10.1109/OJCS.2022.3199755
    Journal articles | 2022
    Zhang J; Jia X; Hu J; Tan K, 2022, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, 44, pp. 5185 - 5198, http://dx.doi.org/10.1109/TPAMI.2021.3066696
    Journal articles | 2022
    Zhang J; Jia X; Hu J, 2022, 'SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images', IEEE Transactions on Geoscience and Remote Sensing, 60, http://dx.doi.org/10.1109/TGRS.2021.3123268
    Journal articles | 2022
    Zhang J; Jia X; Hu J, 2022, 'Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping from High-Resolution Aerial Images', IEEE Geoscience and Remote Sensing Letters, 19, http://dx.doi.org/10.1109/LGRS.2021.3132935
    Journal articles | 2022
    2022, 'Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey', , http://dx.doi.org/10.3390/s22145111
    Journal articles | 2021
    Al Hammadi AY; Yeun CY; Damiani E; Yoo PD; Hu J; Yeun HK; Yim MS, 2021, 'Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102641
    Journal articles | 2021
    Fei X; Xie Y; Tang S; Hu J, 2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, 173, http://dx.doi.org/10.1016/j.jnca.2020.102872
    Journal articles | 2021
    Han S; Wu Q; Zhang H; Qin B; Hu J; Shi X; Liu L; Yin X, 2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371
    Journal articles | 2021
    Liu M; Wu Q; Hei Y; Li D; Hu J, 2021, 'Fair and smart spectrum allocation scheme for IIoT based on blockchain', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102686
    Journal articles | 2021
    Shen M; Liu Y; Zhu L; Du X; Hu J, 2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876
    Journal articles | 2021
    Shen M; Yu H; Zhu L; Xu K; Li Q; Hu J, 2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, 16, pp. 4063 - 4077, http://dx.doi.org/10.1109/TIFS.2021.3102492
    Journal articles | 2021
    Shen W; Qin J; Yu J; Hao R; Hu J; Ma J, 2021, 'Data Integrity Auditing without Private Key Storage for Secure Cloud Storage', IEEE Transactions on Cloud Computing, 9, pp. 1408 - 1421, http://dx.doi.org/10.1109/TCC.2019.2921553
    Journal articles | 2021
    Sun J; Su Y; Qin J; Hu J; Ma J, 2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, 9, pp. 1195 - 1209, http://dx.doi.org/10.1109/TCC.2019.2902380
    Journal articles | 2021
    Tran NN; Pota HR; Tran QN; Hu J, 2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, 8, pp. 9422 - 9435, http://dx.doi.org/10.1109/JIOT.2021.3056649
    Journal articles | 2021
    Tran QN; Hu J, 2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170
    Journal articles | 2021
    Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385
    Journal articles | 2021
    Tran QN; Turnbull BP; Wu HT; De Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032
    Journal articles | 2021
    Wu HT; Zheng K; Huang Q; Hu J, 2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840
    Journal articles | 2021
    Wu Q; Wang Q; Zhang M; Zheng R; Zhu J; Hu J, 2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, 186, http://dx.doi.org/10.1016/j.jnca.2021.103077
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/TPAMI.2019.2949299
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, 'A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions', ACM Computing Surveys, 54, http://dx.doi.org/10.1145/3460427
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, 2, pp. 370 - 381, http://dx.doi.org/10.1109/OJCS.2021.3119572
    Journal articles | 2020
    Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416
    Journal articles | 2020
    Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011
    Journal articles | 2020
    Shen M; Cheng G; Zhu L; Du X; Hu J, 2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089
    Journal articles | 2020
    Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, 105, http://dx.doi.org/10.1016/j.patcog.2020.107381
    Journal articles | 2020
    Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026
    Journal articles | 2020
    Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083
    Journal articles | 2020
    Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855
    Journal articles | 2020
    Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181
    Journal articles | 2019
    Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313
    Journal articles | 2019
    Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879
    Journal articles | 2019
    Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692
    Journal articles | 2019
    Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555
    Journal articles | 2019
    Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
    Journal articles | 2019
    Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
    Journal articles | 2019
    Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145, http://dx.doi.org/10.1016/j.jnca.2019.102411
    Journal articles | 2019
    Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004
    Journal articles | 2019
    Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007
    Journal articles | 2019
    Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403
    Journal articles | 2019
    Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), 19, http://dx.doi.org/10.3390/s19132985
    Journal articles | 2019
    Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141
    Journal articles | 2019
    Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665
    Journal articles | 2019
    Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372
    Journal articles | 2019
    2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', , http://dx.doi.org/10.1109/tcds.2019.2948025
    Journal articles | 2018
    Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics
    Journal articles | 2018
    Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029
    Journal articles | 2018
    Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
    Journal articles | 2018
    Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011
    Journal articles | 2018
    Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451
    Journal articles | 2018
    Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312
    Journal articles | 2018
    Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132
    Journal articles | 2018
    Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
    Journal articles | 2018
    Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177
    Journal articles | 2018
    Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018, http://dx.doi.org/10.1155/2018/7107295
    Journal articles | 2018
    Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182
    Journal articles | 2018
    Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026
    Journal articles | 2018
    Zhang Y; Hu W; Xu W; Chou CT; Hu J, 2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410
    Journal articles | 2017
    Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x
    Journal articles | 2017
    Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
    Journal articles | 2017
    Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032
    Journal articles | 2017
    Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033
    Journal articles | 2017
    Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z
    Journal articles | 2017
    Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, 2017, http://dx.doi.org/10.1155/2017/3606424
    Journal articles | 2017
    Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017
    Journal articles | 2017
    Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019
    Journal articles | 2017
    Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913
    Journal articles | 2017
    Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6
    Journal articles | 2017
    Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738
    Journal articles | 2017
    Zhou W; Hu J; Wang S, 2017, 'Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases', IEEE Transactions on Big Data, pp. 1 - 1, http://dx.doi.org/10.1109/tbdata.2017.2736547
    Journal articles | 2016
    Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, 27, pp. 951 - 963, http://dx.doi.org/10.1109/TPDS.2015.2425407
    Journal articles | 2016
    Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566
    Journal articles | 2016
    Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29
    Journal articles | 2016
    Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, 62, pp. 66 - 75, http://dx.doi.org/10.1016/j.future.2016.01.007
    Journal articles | 2016
    Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, 9, pp. 2641 - 2642, http://dx.doi.org/10.1002/sec.1497
    Journal articles | 2016
    Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, 7, pp. 2423 - 2436, http://dx.doi.org/10.1109/TSG.2016.2563461
    Journal articles | 2016
    Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630
    Journal articles | 2016
    Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107
    Journal articles | 2016
    Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, 8, http://dx.doi.org/10.3390/fi8030034
    Journal articles | 2016
    Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, 54, pp. 14 - 22, http://dx.doi.org/10.1016/j.patcog.2016.01.001
    Journal articles | 2016
    Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, 62, pp. 196 - 204, http://dx.doi.org/10.1016/j.future.2015.12.009
    Journal articles | 2016
    Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, 15, pp. 1 - 24, http://dx.doi.org/10.1145/2930669
    Journal articles | 2016
    Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, PP, http://dx.doi.org/10.1109/TIFS.2016.2603961
    Journal articles | 2016
    Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488
    Journal articles | 2016
    Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413
    Journal articles | 2016
    Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003
    Journal articles | 2016
    Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664
    Journal articles | 2016
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency and Computation: Practice and Experience, 28, pp. 2940 - 2957, http://dx.doi.org/10.1002/cpe.3600
    Journal articles | 2015
    Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016
    Journal articles | 2015
    Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003
    Journal articles | 2015
    Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34
    Journal articles | 2015
    Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812
    Journal articles | 2015
    Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593
    Journal articles | 2015
    Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349
    Journal articles | 2015
    Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397
    Journal articles | 2015
    Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218
    Journal articles | 2015
    Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198
    Journal articles | 2015
    Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445
    Journal articles | 2015
    Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182
    Journal articles | 2015
    Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015
    Journal articles | 2015
    Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802
    Journal articles | 2015
    Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688
    Journal articles | 2015
    Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/764919
    Journal articles | 2015
    Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/352761
    Journal articles | 2014
    Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002
    Journal articles | 2014
    Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13
    Journal articles | 2014
    Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301
    Journal articles | 2014
    Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation: Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042
    Journal articles | 2014
    Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247
    Journal articles | 2014
    Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004
    Journal articles | 2014
    Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53
    Journal articles | 2014
    Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003
    Journal articles | 2014
    Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488
    Journal articles | 2014
    Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001
    Journal articles | 2014
    Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095
    Journal articles | 2014
    Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221
    Journal articles | 2014
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927
    Journal articles | 2013
    Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14
    Journal articles | 2013
    Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947
    Journal articles | 2013
    Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, 13, pp. 204 - 210, http://dx.doi.org/10.1002/wcm.1109
    Journal articles | 2013
    Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124
    Journal articles | 2013
    Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268
    Journal articles | 2013
    Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1401 - 1410, http://dx.doi.org/10.1109/TPDS.2012.232
    Journal articles | 2013
    Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958
    Journal articles | 2013
    Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950
    Journal articles | 2013
    Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7
    Journal articles | 2013
    Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946
    Journal articles | 2013
    Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320
    Journal articles | 2013
    Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23
    Journal articles | 2013
    Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67
    Journal articles | 2013
    Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956
    Journal articles | 2012
    Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, 1479, pp. 1492 - 1493, http://dx.doi.org/10.1063/1.4756447
    Journal articles | 2012
    Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123
    Journal articles | 2012
    Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, 55, pp. 438, http://dx.doi.org/10.1093/comjnl/bxs016
    Journal articles | 2012
    Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004
    Journal articles | 2012
    Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797
    Journal articles | 2012
    Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency and Computation: Practice and Experience, 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810
    Journal articles | 2012
    Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, http://dx.doi.org/10.1109/TPDS.2012.261
    Journal articles | 2012
    Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010
    Journal articles | 2012
    Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 83 LNICST, pp. 16 - 23, http://dx.doi.org/10.1007/978-3-642-29734-2_3
    Journal articles | 2012
    Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005
    Journal articles | 2012
    Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397
    Journal articles | 2012
    Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004
    Journal articles | 2012
    Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065
    Journal articles | 2012
    Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672 LNCS
    Journal articles | 2012
    Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, 28, pp. 368 - 370, http://dx.doi.org/10.1016/j.future.2011.06.011
    Journal articles | 2011
    Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015
    Journal articles | 2011
    Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647
    Journal articles | 2011
    Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240
    Journal articles | 2011
    Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909
    Journal articles | 2011
    Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013
    Journal articles | 2011
    Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486
    Journal articles | 2011
    Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226
    Journal articles | 2011
    Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88
    Journal articles | 2011
    Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022
    Journal articles | 2011
    Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120
    Journal articles | 2011
    Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73
    Journal articles | 2011
    Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225
    Journal articles | 2011
    Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736
    Journal articles | 2011
    Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064
    Journal articles | 2011
    Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001
    Journal articles | 2011
    Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003
    Journal articles | 2010
    Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988
    Journal articles | 2007
    Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003
    Journal articles | 2005
    Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277
    Journal articles | 2004
    Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210
    Journal articles | 2004
    Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271
    Journal articles | 2003
    Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245
    Journal articles | 2003
    Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200
    Journal articles | 2002
    Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170
    Journal articles | 2001
    Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2, pp. 1005 - 1008
    Journal articles | 2000
    Hu J; Bohn C; Wu HR, 2000, 'Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4
    Journal articles | 1999
    Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389
    Journal articles | 1998
    Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927
  • Conference Papers | 2023
    Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908
    Conference Papers | 2023
    Zhang J; Hu J; Jia X, 2023, 'Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, http://dx.doi.org/10.1109/WHISPERS61460.2023.10430528
    Conference Papers | 2022
    Song W; Wang M; Wu Y; Chou CT; Hu J; Hu W, 2022, 'Poster: Towards behavior-independent in-hand user authentication on smartphone using vibration', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 844 - 846, http://dx.doi.org/10.1145/3495243.3558257
    Preprints | 2022
    Yin X; Wang S; Zhu Y; Hu J, 2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, , http://dx.doi.org/10.1109/JIOT.2022.3204246
    Preprints | 2022
    Yin X; Zhu Y; Xie Y; Hu J, 2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, , http://dx.doi.org/10.1109/OJCS.2022.3199755
    Conference Papers | 2022
    Zhang J; Jia X; Zhou J; Hu J, 2022, 'Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 1181 - 1184, http://dx.doi.org/10.1109/IGARSS46834.2022.9884698
    Preprints | 2022
    Zhu Y; Yin X; Hu J, 2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, , http://arxiv.org/abs/2206.12885v1
    Preprints | 2022
    Zhu Y; Yin X; Jia X; Hu J, 2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, , http://arxiv.org/abs/2207.00587v1
    Preprints | 2021
    Han Y; Zheng B; Zhao L; Hu J; Zhang C; Xiao R; Wang C; Pu D, 2021, Impact of Background Music on the Performance of Laparoscopy Teams, , http://dx.doi.org/10.21203/rs.3.rs-1050433/v1
    Conference Papers | 2021
    Zhang J; Jia X; Hu J, 2021, 'WEAKLY SUPERVISED SOLAR PANEL MAPPING USING RESIDUAL AGGREGATED NETWORK FOR AERIAL IMAGES', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 2787 - 2790, http://dx.doi.org/10.1109/IGARSS47720.2021.9555007
    Preprints | 2020
    Tran NN; Pota HR; Tran QN; Hu J, 2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, , http://dx.doi.org/10.48550/arxiv.2003.05088
    Preprints | 2020
    Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, , http://dx.doi.org/10.48550/arxiv.2003.05071
    Conference Papers | 2020
    Zhang J; Jia X; Hu J, 2020, 'Low-Rank Matrix Decomposition with Superpixel-Based Structured Sparse Regularization for Moving Object Detection in Satellite Videos', in ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pp. 941 - 948, http://dx.doi.org/10.5194/isprs-annals-V-2-2020-941-2020
    Conference Papers | 2020
    Zhang J; Jia X; Hu J, 2020, 'Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images', in 2020 Digital Image Computing: Techniques and Applications, DICTA 2020, Online, presented at 2020 Digital Image Computing: Techniques and Applications (DICTA), Online, 30 November 2020 - 02 December 2020, http://dx.doi.org/10.1109/DICTA51227.2020.9363379
    Preprints | 2019
    Zhang J; Jia X; Hu J; Chanussot J, 2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, , http://dx.doi.org/10.48550/arxiv.1911.12989
    Conference Papers | 2019
    Zhang J; Jia X; Hu J; Tan K, 2019, 'Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization', in 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018, http://dx.doi.org/10.1109/DICTA.2018.8615873
    Preprints | 2019
    Zhang J; Jia X; Hu J, 2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, , http://dx.doi.org/10.48550/arxiv.1908.09539
    Conference Papers | 2019
    2019, 'Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification', http://dx.doi.org/10.1109/whispers.2019.8920832
    Conference Papers | 2019
    2019, 'Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity'
    Conference Papers | 2018
    Ghosh L; Konar A; Rakshit P; Parui S; Ralescu AL; Nagar AK, 2018, 'P-300 and N-400 Induced Decoding of Learning-Skill of Driving Learners Using Type-2 Fuzzy Sets', in 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/fuzz-ieee.2018.8491525
    Conference Papers | 2018
    Li F; Guo Y; Hu J, 2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177, http://dx.doi.org/10.1007/978-3-319-90775-8_14
    Conference Papers | 2018
    Nhat Tran Q; Hu J; Wang S, 2018, 'Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647290
    Conference Papers | 2018
    Salah T; Hasan H; Zemerly MJ; Yeun CY; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'Secure Autonomous Mobile Agents for Web Services', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647435
    Preprints | 2018
    Shen M; Liao Z; Zhu L; Mijumbi R; Du X; Hu J, 2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, , http://dx.doi.org/10.48550/arxiv.1810.03323
    Preprints | 2018
    Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, , http://dx.doi.org/10.48550/arxiv.1809.07912
    Conference Papers | 2018
    Wang M; Hu J; Abbass HA, 2018, 'Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers', in IEEE International Conference on Fuzzy Systems, IEEE, Rio de Janeiro, Brazil, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/Fuzz-Ieee.2018.8491544
    Conference Papers | 2018
    Zhang J; Jia X; Hu J, 2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Valencia, Spain, pp. 7074 - 7077, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July 2018 - 27 April 2018, http://dx.doi.org/10.1109/igarss.2018.8519575
    Conference Papers | 2018
    2018, 'Weed classification in hyperspectral remote sensing images via deep convolutional neural network', http://dx.doi.org/10.1109/igarss.2018.8518541
    Preprints | 2017
    An S; Boussaid F; Bennamoun M; Hu J, 2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, , http://dx.doi.org/10.48550/arxiv.1703.10355
    Conference Papers | 2017
    Farooq A; Hu J; Jia X; Awan AF, 2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Fort Worth, TX, USA, pp. 3337 - 3340, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23 July 2017 - 28 July 2017, http://dx.doi.org/10.1109/igarss.2017.8127712
    Conference Papers | 2017
    Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812
    Preprints | 2017
    Song C-X; Yin S; Ma L; Wheeler A; Chen Y; Zhang Y; Liu B; Xiong J; Zhang W; Hu J; Zhou Z; Dong B; Tian Z; Jeffrey SS; Chua M-S; So S; Li W; Wei Y; Diao J; Xie D; Quake SR, 2017, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages, , http://dx.doi.org/10.1101/162081
    Conference Papers | 2017
    Sun J; Zhu B; Qin J; Hu J; Wu Q, 2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818, http://dx.doi.org/10.1142/S0129054117400196
    Conference Papers | 2017
    Tian X; Shen P; Yang T; Chen C; Hu J, 2017, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 66 - 78, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_6
    Conference Papers | 2017
    Tran NN; Sarker R; Hu J, 2017, 'An approach for host-based intrusion detection system design using convolutional neural network', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 116 - 126, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_10
    Conference Papers | 2017
    Xu J; Hu J, 2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147, http://dx.doi.org/10.1007/978-3-319-49580-4_13
    Conference Papers | 2017
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536, http://dx.doi.org/10.1109/IECON.2017.8217138
    Conference Papers | 2017
    Yang W; Zheng G; Ibrahim A; Chaudhry J; Wang S; Hu J; Valli C, 2017, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Adelaide, pp. 291 - 298, presented at 9th International Conference, MONAMI 2017, Melbourne, Adelaide, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_23
    Conference Papers | 2017
    Yin X; Zhu Y; Hu J, 2017, 'A robust contactless fingerprint enhancement algorithm', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 127 - 136, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_11
    Conference Papers | 2017
    Zhang J; Jia X; Hu J, 2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, presented at 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, 29 November 2017 - 01 December 2017, http://dx.doi.org/10.1109/DICTA.2017.8227465
    Conference Papers | 2017
    Zhu Y; Yin X; Hu J, 2017, 'Robust fingerprint matching based on convolutional neural networks', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 56 - 65, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_5
    Conference Papers | 2017
    Zhu Y; Yin X; Jia X; Hu J, 2017, 'Latent Fingerprint Segmentation Based on Convolutional Neural Networks', in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, presented at 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 04 December 2017 - 07 December 2017, http://dx.doi.org/10.1109/WIFS.2017.8267655
    Conference Papers | 2016
    Han F; Xu L; Yu X; Tari Z; Feng Y; Hu J, 2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 825 - 830, presented at Industrial Electronics and Applications (ICIEA), 2016 IEEE 11th Conference on, Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603695
    Conference Papers | 2016
    Luo X; Ren Y; Liu J; Hu J; Liu W; Wang Z; Xu W; Wu Q, 2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia, pp. 87 - 102, presented at Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 04 July 2016 - 06 July 2016, http://dx.doi.org/10.1007/978-3-319-40367-0_6
    Conference Papers | 2016
    Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'Using Game Theory with Intrinsic Motivation to Examine Anti-Hacking Policies for Autonomous Systems', in Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, presented at IEEE Symposium Series on Computational Intelligence, Athens, Greece, 06 December 2016 - 09 December 2016, http://dx.doi.org/10.1109/SSCI.2016.7850035
    Conference Papers | 2016
    Wang M; Abbass H; Hu J; Merrick K, 2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Nature, China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - , http://dx.doi.org/10.1007/978-3-319-49685-6_9
    Conference Papers | 2016
    Wang M; Abbass HA; Hu J, 2016, 'Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems', in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pp. 368 - 375, presented at Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/pst.2016.7906958
    Conference Papers | 2016
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016, http://dx.doi.org/10.1109/ICIT.2016.7475043
    Conference Papers | 2016
    Yang W; Hu J; Fernandes C; Sivaraman V; Wu Q, 2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, pp. 457 - 463, presented at 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7907000
    Conference Papers | 2016
    Yin X; Hu J; Xu J, 2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 144 - 149, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603567
    Conference Papers | 2016
    Zhu Y; Hu J; Xu J, 2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, China, pp. 156 - 160, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603569
    Conference Papers | 2015
    Cai X; Zhang M; Hu J; Wu Q, 2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, PEOPLES R CHINA, Zhuhai, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), PEOPLES R CHINA, Zhuhai, 30 October 2015 - 31 October 2015, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000371518700099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2015
    Guo Y; Hu J, 2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289, http://dx.doi.org/10.1109/ICIEA.2015.7334126
    Conference Papers | 2015
    Guo Y; Jiang F; Hu J, 2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311, http://dx.doi.org/10.1109/ICIEA.2015.7334130
    Conference Papers | 2015
    Haider W; Hu J; Xie M, 2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015, http://dx.doi.org/10.1109/ICIEA.2015.7334166
    Conference Papers | 2015
    Haider W; Hu J; Yu X; Xie Y, 2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.11
    Conference Papers | 2015
    Li C; Hu J, 2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316, http://dx.doi.org/10.1109/ICIEA.2015.7334131
    Conference Papers | 2015
    Xie M; Hu J; Slay J, 2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015, http://dx.doi.org/10.1109/FSKD.2014.6980972
    Conference Papers | 2015
    Xu J; Hu J, 2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1007/978-3-319-25645-0_12
    Conference Papers | 2015
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, http://dx.doi.org/10.1109/ICIT.2015.7125071
    Conference Papers | 2015
    Zhao H; Xu R; Shu M; Hu J, 2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70, http://dx.doi.org/10.1109/ISADS.2015.13
    Conference Papers | 2015
    Zheng H; Qin J; Hu J; Wu Q, 2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.16
    Conference Papers | 2015
    Zhu X; Chen C; Tian X; Hu J, 2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295, http://dx.doi.org/10.1109/ICIEA.2015.7334127
    Conference Papers | 2014
    Chen C; Wang C; Yang T; Lin D; Wang S; Hu J, 2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980974
    Conference Papers | 2014
    Chen C; Zhu X; Shen P; Hu J, 2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564, http://dx.doi.org/10.1109/INFCOMW.2014.6849292
    Conference Papers | 2014
    Hu J; Pieprzyk J; Gardiyawasam Pussewalage H, 2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980968
    Conference Papers | 2014
    Kabir ME; Hu J, 2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946, http://dx.doi.org/10.1109/FSKD.2014.6980966
    Conference Papers | 2014
    Xie M; Hu J; Yu X; Chang E, 2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549, http://dx.doi.org/10.1007/978-3-319-11698-3_44
    Conference Papers | 2014
    Yang W; Hu J; Wang S, 2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999, http://dx.doi.org/10.1109/FSKD.2014.6980975
    Conference Papers | 2014
    Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940, http://dx.doi.org/10.1109/FSKD.2014.6980965
    Conference Papers | 2014
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388, http://dx.doi.org/10.1007/978-3-319-11698-3_29
    Conference Papers | 2013
    Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301
    Conference Papers | 2013
    Jiang F; Hu J, 2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345, http://dx.doi.org/10.1109/WCNC.2013.6555276
    Conference Papers | 2013
    Xie M; Hu J, 2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716, http://dx.doi.org/10.1109/CISP.2013.6743952
    Conference Papers | 2013
    Xu J; Hu J; Jia X, 2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729, http://dx.doi.org/10.1109/CISP.2013.6743954
    Conference Papers | 2013
    Xu Z; Yu X; Feng Y; Hu J; Tari Z; Han F, 2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381, http://dx.doi.org/10.1109/ICIEA.2013.6566581
    Conference Papers | 2013
    Yang W; Hu J; Wang S, 2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013, http://dx.doi.org/10.1007/978-3-642-38631-2_71
    Conference Papers | 2013
    Zhao H; Shu M; Qin J; Hu J, 2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747, http://dx.doi.org/10.1109/CIS.2013.162
    Reports | 2013
    Zhu R; Sun Z; Ristaniemi T; Hu J, 2013, Guest editorial: Special issue on green telecommunications, http://dx.doi.org/10.1007/s11235-011-9637-7
    Conference Papers | 2012
    Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012, http://dx.doi.org/10.1007/978-3-642-31588-6_64
    Conference Papers | 2012
    Qin J; Hu J; Zhao H, 2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.263
    Conference Papers | 2012
    Tran QA; Jiang F; Hu J, 2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.51
    Conference Papers | 2012
    Xie M; Hu J; Tian B, 2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.173
    Conference Papers | 2012
    Yang W; Hu J; Stojmenovic M, 2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012, http://dx.doi.org/10.1109/ICIEA.2012.6360846
    Conference Papers | 2012
    Yang W; Hu J; Wang S, 2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.23
    Conference Papers | 2012
    Zhao H; Hu J; Qin J; Varadharajan V; Wan H, 2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.171
    Conference Papers | 2011
    Ahmad T; Hu J; Wang S, 2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975738
    Conference Papers | 2011
    Di Vimercati SDC; Samarati P; Foresti S; Hu J, 2011, 'Foreword from the conference chairs', in Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, IEEE, presented at 2011 5th International Conference on Network and System Security (NSS), 06 September 2011 - 08 September 2011, http://dx.doi.org/10.1109/ICNSS.2011.6059949
    Conference Papers | 2011
    Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011
    Conference Papers | 2011
    Han F; Feng Y; Alzahrani NS; Xi K; Hu J, 2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975591
    Conference Papers | 2011
    Han F; Hu J; Alkhathami M; Xi K, 2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975739
    Conference Papers | 2011
    Jiang F; Frater M; Hu J, 2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011, http://dx.doi.org/10.1109/DASC.2011.46
    Conference Papers | 2011
    Xi K; Hu J; Han F, 2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975740
    Conference Papers | 2011
    Yaakob N; Khalil I; Hu J, 2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011
    Conference Papers | 2010
    Park JH; Yang LT; Zeadally S; Woungang I; Kawsar F; Jeong YS; Cerqueira E; Fowler S; Zhang Z; Chao HC; Phillips I; Hu J; Taniar D; Chen JL; Huang R; Makki K; Falowo O; Hunt R; Mehmood R; Chan P; Iftikha M; Gasparakis J; Martinez G; Kamel I; Law E; Mihovska A; Moustafa H; Huang TC; Landfeldt B; Anagnostopoulos I; Chilamkurti N; Chang YC; Wu TY; Wang RC; Yen YS; Chang SY; Huang S; Wu HC; Ferworn A; Zhang Y; Stefanos Gritzalis S; Fernando X; Anpalagan A; Singh A; Ding JW; Zhou L; Hussain M; Wang WC; Kwak J; Chang CC; Martinelli F; Pan G; Sun HM; Forne J; Bergmann N; Belli F; Sarker BK; Biswas J; Sauveron D; Pedreiras P; Crespi N; Shyu ML; Tabata T; Cong-Vinh P; Chen LJ; Deng DJ; Zhang B; Zheng J; Geilen M; Iqbal R; Villano U; Ali S; Shun CT; Naureen A, 2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, http://dx.doi.org/10.1109/FUTURETECH.2010.5482638
    Conference Papers | 2010
    Raffe W; Hu J; Zambetta F; Xi K, 2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000293666000066&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2010
    Xiang Y; Samarati P; Hu J, 2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, http://dx.doi.org/10.1109/NSS.2010.5
    Conference Papers | 2009
    Xi K; Hu J, 2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, PEOPLES R CHINA, Xian, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, PEOPLES R CHINA, Xian, 25 May 2009 - 27 May 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000273183200122&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2008
    Yeo SS; Hu J, 2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, pp. 11, http://dx.doi.org/10.1109/CSA.2008.5
    Conference Papers | 2005
    Hu J, 2005, 'H-infinity design for a sonar-platform', in TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, IEEE, AUSTRALIA, Melbourne, pp. 2163 - 2168, presented at IEEE Region 10 Conference (TENCON 2005), AUSTRALIA, Melbourne, 21 November 2005 - 24 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000246608903103&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2005
    Phillips D; Hu JK, 2005, 'Modelling of SACK TCP and application to the HTTP file transfer environment', in LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, IEEE COMPUTER SOC, AUSTRALIA, Sydney, pp. 515 - 516, presented at 30th Annual IEEE Conference on Local Computer Networks, AUSTRALIA, Sydney, 15 November 2005 - 17 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000235161300080&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2003
    Hoang XD; Hu J; Bertok P, 2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346
    Conference Papers | 2003
    Phillips D; Hu J, 2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231
    Conference Papers | 1999
    Hu J; Bohn C; Wu HR, 1999, 'Practical H∞ weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924
    Conference Papers | 1999
    Hu J; Wu HR; Chou CT; Verhaegen M; Westwick D; Nijsse G, 1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530
    Conference Papers | 1999
    Hu J; Wu HR; Chou CT; Verhaegen M, 1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179
    Conference Papers | 1999
    Hu J; Wu HR, 1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, http://dx.doi.org/10.1109/ISSPA.1999.818201
    Conference Papers | 1996
    Hu J; Unbehauen H; Bohn C, 1996, 'Practical approach to selecting weighting functions for H∞ control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003
    Conference Papers | 1993
    HU JK; WANG GX; ZHANG GF; LI DP, 1993, 'ROBUST PERFORMANCE CONTROL AND ANALYSIS OF ILL-CONDITIONED PLANTS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 238 - 240, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 1993
    ZHANG GF; WANG GX; HU JK, 1993, 'CONJUGATION AND H-INFINITY-CONTROL OF DISCRETE-TIME-SYSTEMS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 467 - 470, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00113&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 1993
    ZHANG GF; WANG GX; HU JK, 1993, 'SIMPLIFYING DISCRETE-TIME H-INFINITY CONTROL', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 471 - 473, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00114&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

1. J. Hu, "Energy Big Data Analytics from a Cybersecurity Perspective," DP190103660.

This project investigates data-driven algorithms for the privacy and security of smart grids. Research outputs include a research dataset for false data injection attack (Datasets for Stealthy False Data Injection Attacks (SFDIA) against Smart Grid - Harvard Dataverse) and the following publications.

 

Publications

(1) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2022. "A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems" Sensors 22, no. 21: 8188. https://doi.org/10.3390/s22218188. Sensors | Free Full-Text | A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems (mdpi.com).

(2) X. Yin, S. Wang, Y. Zhu and J. Hu, "A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications," in IEEE Internet of Things Journal, vol. 10, no. 1, pp. 877-892, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3204246. A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications | IEEE Journals & Magazine | IEEE Xplore

(3) Q. N. Tran, B. P. Turnbull, M. Wang and J. Hu, "A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol," in IEEE Open Journal of the Computer Society, vol. 3, pp. 1-10, 2022, doi: 10.1109/OJCS.2021.3138332. A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol | IEEE Journals & Magazine | IEEE Xplore

(4) H. -Y. Tran, J. Hu and H. R. Pota, "A Privacy-Preserving State Estimation Scheme for Smart Grids," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3940-3956, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3210017. A Privacy-Preserving State Estimation Scheme for Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(5) X. Yin, Y. Zhu and J. Hu, "A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids," in IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1957-1967, March 2022, doi: 10.1109/TII.2021.3102332. A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(6) X. Yin, Y. Zhu and J. Hu, "A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions," in IEEE Open Journal of the Computer Society, vol. 2, pp. 370-381, 2021, doi: 10.1109/OJCS.2021.3119572. A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions | IEEE Journals & Magazine | IEEE Xplore

(7) H. -Y. Tran, J. Hu, X. Yin and H. R. Pota, "An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2538-2552, 2023, doi: 10.1109/TIFS.2023.3267892. An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(8) Q. N. Tran, B. P. Turnbull and J. Hu, "Biometrics and Privacy-Preservation: How Do They Evolve?," in IEEE Open Journal of the Computer Society, vol. 2, pp. 179-191, 2021, doi: 10.1109/OJCS.2021.3068385. Biometrics and Privacy-Preservation: How Do They Evolve? | IEEE Journals & Magazine | IEEE Xplore.

(9) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2024. "Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation" Sensors 24, no. 5: 1583. https://doi.org/10.3390/s24051583. Sensors | Free Full-Text | Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation (mdpi.com).

(10) M. Wang, S. Wang and J. Hu, "PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4258-4272, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3218782. PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System | IEEE Journals & Magazine | IEEE Xplore

(11) X. Yin, Y. Zhu, Y. Xie and J. Hu, "PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems," in IEEE Open Journal of the Computer Society, vol. 3, pp. 149-161, 2022, doi: 10.1109/OJCS.2022.3199755. PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems | IEEE Journals & Magazine | IEEE Xplore.

(12) H. Ma, Y. Xie, S. Tang, J. Hu and X. Liu, "Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1735-1752, 1 May-June 2022, doi: 10.1109/TDSC.2020.3036664. Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field | IEEE Journals & Magazine | IEEE Xplore.

(13) H. -T. Wu, K. Zheng, Q. Huang and J. Hu, "Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility," in IEEE Signal Processing Letters, vol. 28, pp. 160-164, 2021, doi: 10.1109/LSP.2020.3048840. Search results (zenodo.org)

(14) J. Zhang, X. Jia and J. Hu, "Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images," in IEEE Geoscience and Remote Sensing Letters, vol. 19, pp. 1-5, 2022, Art no. 6504005, doi: 10.1109/LGRS.2021.3132935. Search results (zenodo.org)

(15) H. Du, Z. Che, M. Shen, L. Zhu and J. Hu, "Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 616-631, 2024, doi: 10.1109/TIFS.2023.3326984. Search results (zenodo.org)

(16) J. Zhang, X. Jia and J. Hu, "SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images," in IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-15, 2022, Art no. 5612715, doi: 10.1109/TGRS.2021.3123268. Search results (zenodo.org)

(17) H. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043. Search results (zenodo.org)

(18) Q. N. Tran and J. Hu, "A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926-2940, 2021, doi: 10.1109/TIFS.2021.3069170. Search results (zenodo.org)

(19) N. N. Tran, H. R. Pota, Q. N. Tran and J. Hu, "Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9422-9435, 1 June 1, 2021, doi: 10.1109/JIOT.2021.3056649. Search results (zenodo.org)

(20) M. Shen, Y. Liu, L. Zhu, X. Du and J. Hu, "Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046-2059, 2021, doi: 10.1109/TIFS.2020.3046876. Search results (zenodo.org)

(21) Xuefei Yin, Yanming Zhu, and Jiankun Hu. 2021. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 54, 6, Article 131 (July 2021), 36 pages. https://doi.org/10.1145/3460427. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions: ACM Computing Surveys: Vol 54, No 6

(22) J. Zhang, X. Jia, J. Zhou, J. Zhang and J. Hu, "Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images," in IEEE Transactions on Image Processing, vol. 33, pp. 881-896, 2024, doi: 10.1109/TIP.2023.3336170. https://zenodo.org/search?q=%22Weakly%20Supervised%20Solar%20Panel%20Mapping%20via%22%20&l=list&p=1&s=10&sort=bestmatch.