ÁñÁ«¹ÙÍø

Professor Jiankun Hu

Professor Jiankun Hu

Professor
ÁñÁ«¹ÙÍø Canberra
School of Systems & Computing

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (ÁñÁ«¹ÙÍø@ÁñÁ«¹ÙÍø), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded tenÌýAustralia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09. ÌýHe was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. HeÌýis serving as an Associate Editor of the following journals: Journal of Security and Communication Networks, Wiley; ÌýIEEE TIFS (Senior Area Editor); KSII TIIS (Area Editor); IET CPS; IEEE OJCS; and Wiley S&P.Ìý

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

Ìý

ÁñÁ«¹ÙÍø Dataset download on one link:Ìý

Ìý

Ìý

Ìý

Phone
+61 2 5114 5159
Location
Building 15 Room 106 School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, PO Box 7916, Canberra BC ACT 2610, AUSTRALIA
  • Books | 2018
    Hu J; Khalil I; Tari Z, 2018, Preface
    Books | 2017
    Thampi SM; Perez GM; Westphall CB; Hu J; Fan CI; Marmol FG, 2017, Preface
    Books | 2007
    Naït-Abdesselam F; Hu J; Boukerche A, 2007, PPN 2007 PC co-chairs' message
  • Book Chapters | 2021
    Yin X; Zhu Y, 2021, '3D Fingerprint', in Encyclopedia of Cryptography, Security and Privacy, Springer, Berlin, Heidelberg,
    Book Chapters | 2020
    Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271,
    Book Chapters | 2018
    Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham,
    Book Chapters | 2018
    Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Information Security Foundations Technologies and Applications, IET,
    Book Chapters | 2017
    Tran QN; Wang S; Ou R; Hu J, 2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170,
    Book Chapters | 2014
    Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, CRC Press, pp. 3 - 22,
    Book Chapters | 2012
    Fei H; Jing Q; Huawei Z; Jiankun H, 2012, 'A General Transformation from KP-ABE to Searchable Encryption', in Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 165 - 178,
    Book Chapters | 2011
    Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481,
    Book Chapters | 2010
    Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255,
    Book Chapters | 2010
    Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405,
    Book Chapters | 2010
    Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219,
    Book Chapters | 2010
    Sufi F; Khalil I; Hu J, 2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331,
    Book Chapters | 2010
    Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157,
    Book Chapters | 2008
    Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, Elsevier, pp. 149 - 170,
    Book Chapters | 2006
    Hu J; Bertok P; Hamilton M; White G; Duff A; Cutts Q, 2006, 'Wireless interactive teaching by using keypad-based ARS', in Audience Response Systems in Higher Education: Applications and Cases, pp. 209 - 221,
  • Journal articles | 2024
    Alabsi A; Hawbani A; Wang X; Dubai AA; Hu J; Aziz SA; Kumar S; Zhao L; Shvetsov AV; Alsamhi SH, 2024, 'Wireless Power Transfer Technologies, Applications, and Future Trends: A Review', IEEE Transactions on Sustainable Computing,
    Journal articles | 2024
    Amin MA; Hu Y; Hu J, 2024, 'Analyzing temporal coherence for deepfake video detection', Electronic Research Archive, 32, pp. 2621 - 2641,
    Journal articles | 2024
    Du H; Che Z; Shen M; Zhu L; Hu J, 2024, 'Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 616 - 631,
    Journal articles | 2024
    Khan M; Hartog FD; Hu J, 2024, 'Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation', Sensors, 24,
    Journal articles | 2024
    Li D; Liu D; Ren Y; Sun Y; Guan Z; Wu Q; Hu J; Liu J, 2024, 'CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network', IEEE Transactions on Dependable and Secure Computing, 21, pp. 3487 - 3500,
    Journal articles | 2024
    Li Y; Zhang H; Wang J; Shi X; Yin X; Wang Z; Hu J; Miao C; Wu J, 2024, 'Proactively Verifying Quantitative Network Policy across Unsafe and Unreliable Environments', IEEE Transactions on Information Forensics and Security,
    Journal articles | 2024
    Sun F; Yu J; Hu J, 2024, 'Privacy-Preserving Approximate Minimum Community Search on Large Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 4146 - 4160,
    Journal articles | 2024
    Wang M; Yin X; Hu J, 2024, 'Cancellable Deep Learning Framework for EEG Biometrics', IEEE Transactions on Information Forensics and Security, 19, pp. 3745 - 3757,
    Journal articles | 2024
    Wu HT; Cao X; Gao Y; Zheng K; Huang J; Hu J; Tian Z, 2024, 'Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation', IEEE Transactions on Emerging Topics in Computational Intelligence, 8, pp. 313 - 326,
    Journal articles | 2024
    Wu HT; Cheung YM; Tian Z; Liu D; Luo X; Hu J, 2024, 'Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation', IEEE Transactions on Information Forensics and Security, 19, pp. 3719 - 3732,
    Journal articles | 2024
    Yang W; Wang S; Hu J; Tao X; Li Y, 2024, 'Feature extraction and learning approaches for cancellable biometrics: A survey', CAAI Transactions on Intelligence Technology, 9, pp. 4 - 25,
    Journal articles | 2024
    Zhang J; Jia X; Zhou J; Zhang J; Hu J, 2024, 'Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images', IEEE Transactions on Image Processing, 33, pp. 881 - 896,
    Journal articles | 2024
    Zhu X; Shen P; Dai Y; Xu L; Hu J, 2024, 'Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud', IEEE Transactions on Information Forensics and Security, 19, pp. 4316 - 4330,
    Journal articles | 2023
    Li D; Chen R; Wan Q; Guan Z; Sun Y; Wu Q; Hu J; Liu J, 2023, 'Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain', IEEE Internet of Things Journal, 10, pp. 21135 - 21142,
    Journal articles | 2023
    Liang Y; Xie Y; Tang S; Yu S; Liu X; Hu J, 2023, 'Network Traffic Content Identification Based on Time-Scale Signal Modeling', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2607 - 2624,
    Journal articles | 2023
    Liu K; Yang K; Pu D; Han Y; Zhou Z; Hu J, 2023, '[Construction and Exploration of Simulative Virtual Curriculum of Laparoscopy for Standardized Surgical Residency Training].', Sichuan Da Xue Xue Bao Yi Xue Ban, 54, pp. 1133 - 1138,
    Journal articles | 2023
    Shen W; Yu J; Yang M; Hu J, 2023, 'Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4593 - 4606,
    Journal articles | 2023
    Song W; Jia H; Wang M; Wu Y; Xue W; Chou CT; Hu J; Hu W, 2023, 'Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration', IEEE Internet of Things Journal, 10, pp. 8155 - 8171,
    Journal articles | 2023
    Song X; Lan Y; Zheng X; Zhu Q; Liao X; Liu K; Zhang W; Peng Q; Zhu Y; Zhao L; Chen X; Shu Y; Yang K; Hu J, 2023, 'Targeting drug-tolerant cells: A promising strategy for overcoming acquired drug resistance in cancer cells.', MedComm (2020), 4, pp. e342,
    Journal articles | 2023
    Song X; Liu K; Liao X; Zhu Y; Peng B; Zhang W; Zhao L; Chen X; Yang K; Hu J, 2023, 'Clinical significance of tumor deposits in gastric cancer after radical gastrectomy: a propensity score matching study.', World J Surg Oncol, 21, pp. 325,
    Journal articles | 2023
    Tran HY; Hu J; Pota HR, 2023, 'A Privacy-Preserving State Estimation Scheme for Smart Grids', IEEE Transactions on Dependable and Secure Computing, 20, pp. 3940 - 3956,
    Journal articles | 2023
    Tran HY; Hu J; Yin X; Pota HR, 2023, 'An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Information Forensics and Security, 18, pp. 2538 - 2552,
    Journal articles | 2023
    Wang M; Wang S; Hu J, 2023, 'PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4258 - 4272,
    Journal articles | 2023
    Wu HT; Cheung YM; Zhuang Z; Xu L; Hu J, 2023, 'Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing', IEEE Transactions on Cybernetics, 53, pp. 3688 - 3701,
    Journal articles | 2023
    Yang J; He Y; Liao X; Hu J; Li K, 2023, 'Does postoperative pulmonary infection correlate with intestinal flora following gastric cancer surgery? - a nested case-control study.', Front Microbiol, 14, pp. 1267750,
    Journal articles | 2023
    Yang K; Zhang W; Chen Z; Chen X; Liu K; Zhao L; Hu J, 2023, 'Comparison of long-term quality of life between Billroth-I and Roux-en-Y anastomosis after distal gastrectomy for gastric cancer: a randomized controlled trial.', Chin Med J (Engl), 136, pp. 1074 - 1081,
    Journal articles | 2023
    Yin X; Wang S; Zhu Y; Hu J, 2023, 'A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications', IEEE Internet of Things Journal, 10, pp. 877 - 892,
    Journal articles | 2023
    Zhang P; He F; Zhang H; Hu J; Huang X; Wang J; Yin X; Zhu H; Li Y, 2023, 'Real-Time Malicious Traffic Detection with Online Isolation Forest over SD-WAN', IEEE Transactions on Information Forensics and Security, 18, pp. 2076 - 2090,
    Journal articles | 2023
    Zhu Y; Wang M; Yin X; Zhang J; Meijering E; Hu J, 2023, 'Deep Learning in Diverse Intelligent Sensor Based Systems', Sensors, 23, pp. 62,
    Journal articles | 2023
    Zhu Y; Yin X; Hu J, 2023, 'FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 8358 - 8371,
    Journal articles | 2022
    Chen J; Wu HT; Lu L; Luo X; Hu J, 2022, 'Single underwater image haze removal with a learning-based approach to blurriness estimation', Journal of Visual Communication and Image Representation, 89,
    Journal articles | 2022
    Farooq A; Jia X; Hu J; Zhou J, 2022, 'Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery', IEEE Transactions on Geoscience and Remote Sensing, 60,
    Journal articles | 2022
    Khan M; den Hartog F; Hu J, 2022, 'A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems', Sensors, 22, pp. 8188,
    Journal articles | 2022
    Liu Q; Wang G; Hu J; Wu J, 2022, 'Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications', Future Generation Computer Systems, 133, pp. 169 - 170,
    Journal articles | 2022
    Liu Y; Liu F; Wu HT; Yang J; Zheng K; Xu L; Yan X; Hu J, 2022, 'RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing', Journal of Network and Computer Applications, 207,
    Journal articles | 2022
    Ma H; Xie Y; Tang S; Hu J; Liu X, 2022, 'Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field', IEEE Transactions on Dependable and Secure Computing, 19, pp. 1735 - 1752,
    Journal articles | 2022
    Su Y; Sun J; Qin J; Hu J, 2022, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, 10, pp. 2050 - 2065,
    Journal articles | 2022
    Tran HY; Hu J; Pota HR, 2022, 'Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party', IEEE Internet of Things Journal, 9, pp. 16080 - 16095,
    Journal articles | 2022
    Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2022, 'Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation', Concurrency and Computation: Practice and Experience, 34,
    Journal articles | 2022
    Tran QN; Turnbull BP; Wang M; Hu J, 2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10,
    Journal articles | 2022
    Wang M; Wang S; Hu J, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', ArXiv,
    Journal articles | 2022
    Wang M; Wang S; Hu J, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', IEEE Transactions on Information Forensics and Security,
    Journal articles | 2022
    Wang M; Yin X; Zhu Y; Hu J, 2022, 'Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey', Sensors, 22, pp. 5111,
    Journal articles | 2022
    Wu HT; Zheng Y; Zhao B; Hu J, 2022, 'An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain', IEEE Internet of Things Journal, 9, pp. 6956 - 6968,
    Journal articles | 2022
    Yang W; Wang S; Yin X; Wang X; Hu J, 2022, 'A Review on Security Issues and Solutions of the Internet of Drones', IEEE Open Journal of the Computer Society, 3, pp. 96 - 110,
    Journal articles | 2022
    Yin X; Wang S; Shahzad M; Hu J, 2022, 'An IoT-Oriented Privacy-Preserving Fingerprint Authentication System', IEEE Internet of Things Journal, 9, pp. 11760 - 11771,
    Journal articles | 2022
    Yin X; Zhu Y; Hu J, 2022, 'A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Industrial Informatics, 18, pp. 1957 - 1967,
    Journal articles | 2022
    Yin X; Zhu Y; Xie Y; Hu J, 2022, 'PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems', IEEE Open Journal of the Computer Society, 3, pp. 149 - 161,
    Journal articles | 2022
    Zhang J; Jia X; Hu J; Tan K, 2022, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, 44, pp. 5185 - 5198,
    Journal articles | 2022
    Zhang J; Jia X; Hu J, 2022, 'SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images', IEEE Transactions on Geoscience and Remote Sensing, 60,
    Journal articles | 2022
    Zhang J; Jia X; Hu J, 2022, 'Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping from High-Resolution Aerial Images', IEEE Geoscience and Remote Sensing Letters, 19,
    Journal articles | 2021
    Al Hammadi AY; Yeun CY; Damiani E; Yoo PD; Hu J; Yeun HK; Yim MS, 2021, 'Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework', Ad Hoc Networks, 123,
    Journal articles | 2021
    Fei X; Xie Y; Tang S; Hu J, 2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, 173,
    Journal articles | 2021
    Han S; Wu Q; Zhang H; Qin B; Hu J; Shi X; Liu L; Yin X, 2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, 16, pp. 2300 - 2311,
    Journal articles | 2021
    Liu M; Wu Q; Hei Y; Li D; Hu J, 2021, 'Fair and smart spectrum allocation scheme for IIoT based on blockchain', Ad Hoc Networks, 123,
    Journal articles | 2021
    Shen M; Liu Y; Zhu L; Du X; Hu J, 2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, 16, pp. 2046 - 2059,
    Journal articles | 2021
    Shen M; Yu H; Zhu L; Xu K; Li Q; Hu J, 2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, 16, pp. 4063 - 4077,
    Journal articles | 2021
    Shen W; Qin J; Yu J; Hao R; Hu J; Ma J, 2021, 'Data Integrity Auditing without Private Key Storage for Secure Cloud Storage', IEEE Transactions on Cloud Computing, 9, pp. 1408 - 1421,
    Journal articles | 2021
    Sun J; Su Y; Qin J; Hu J; Ma J, 2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, 9, pp. 1195 - 1209,
    Journal articles | 2021
    Tran NN; Pota HR; Tran QN; Hu J, 2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, 8, pp. 9422 - 9435,
    Journal articles | 2021
    Tran QN; Hu J, 2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, 16, pp. 2926 - 2940,
    Journal articles | 2021
    Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191,
    Journal articles | 2021
    Tran QN; Turnbull BP; Wu HT; De Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84,
    Journal articles | 2021
    Wu HT; Zheng K; Huang Q; Hu J, 2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, 28, pp. 160 - 164,
    Journal articles | 2021
    Wu Q; Wang Q; Zhang M; Zheng R; Zhu J; Hu J, 2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, 186,
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, pp. 1085 - 1091,
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, 'A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions', ACM Computing Surveys, 54,
    Journal articles | 2021
    Yin X; Zhu Y; Hu J, 2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, 2, pp. 370 - 381,
    Journal articles | 2020
    Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036,
    Journal articles | 2020
    Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, 141, pp. 59 - 60,
    Journal articles | 2020
    Shen M; Cheng G; Zhu L; Du X; Hu J, 2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 109, pp. 621 - 632,
    Journal articles | 2020
    Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, 105,
    Journal articles | 2020
    Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804,
    Journal articles | 2020
    Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41,
    Journal articles | 2020
    Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 6420 - 6433,
    Journal articles | 2020
    Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669,
    Journal articles | 2019
    Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292,
    Journal articles | 2019
    Abdelfattah S; Kasmarik K; Hu J, 2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273,
    Journal articles | 2019
    Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187,
    Journal articles | 2019
    Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11,
    Journal articles | 2019
    Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316,
    Journal articles | 2019
    Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1,
    Journal articles | 2019
    Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55,
    Journal articles | 2019
    Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model†(Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145,
    Journal articles | 2019
    Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62,
    Journal articles | 2019
    Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218,
    Journal articles | 2019
    Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372,
    Journal articles | 2019
    Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), 19,
    Journal articles | 2019
    Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11,
    Journal articles | 2019
    Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253,
    Journal articles | 2019
    Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372,
    Journal articles | 2018
    Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics
    Journal articles | 2018
    Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318,
    Journal articles | 2018
    Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access,
    Journal articles | 2018
    Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43,
    Journal articles | 2018
    Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953,
    Journal articles | 2018
    Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346,
    Journal articles | 2018
    Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018,
    Journal articles | 2018
    Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence,
    Journal articles | 2018
    Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198,
    Journal articles | 2018
    Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018,
    Journal articles | 2018
    Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947,
    Journal articles | 2018
    Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251,
    Journal articles | 2018
    Zhang Y; Hu W; Xu W; Chou CT; Hu J, 2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22,
    Journal articles | 2017
    Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, 20, pp. 2211 - 2229,
    Journal articles | 2017
    Guo Y; Shi W; Wang Y; Hu J, 2017, 'Q-learning-based adjustable fixed-phase quantum Grover search algorithm', Journal of the Physical Society of Japan, 86,
    Journal articles | 2017
    Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192,
    Journal articles | 2017
    Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, 130, pp. 90 - 101,
    Journal articles | 2017
    Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, 72, pp. 206 - 207,
    Journal articles | 2017
    Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, 21, pp. 923 - 936,
    Journal articles | 2017
    Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, 2017,
    Journal articles | 2017
    Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, 61, pp. 447 - 458,
    Journal articles | 2017
    Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, 66, pp. 295 - 301,
    Journal articles | 2017
    Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, 12, pp. 940 - 952,
    Journal articles | 2017
    Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, 21, pp. 3123 - 3134,
    Journal articles | 2017
    Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, 10, pp. 55 - 66,
    Journal articles | 2017
    Zhou W; Hu J; Wang S, 2017, 'Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases', IEEE Transactions on Big Data, pp. 1 - 1,
    Journal articles | 2016
    Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, 27, pp. 951 - 963,
    Journal articles | 2016
    Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, 65, pp. 19 - 29,
    Journal articles | 2016
    Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29
    Journal articles | 2016
    Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, 62, pp. 66 - 75,
    Journal articles | 2016
    Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, 9, pp. 2641 - 2642,
    Journal articles | 2016
    Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, 7, pp. 2423 - 2436,
    Journal articles | 2016
    Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11, pp. 543 - 555,
    Journal articles | 2016
    Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, 3, pp. 34 - 42,
    Journal articles | 2016
    Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, 8,
    Journal articles | 2016
    Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, 54, pp. 14 - 22,
    Journal articles | 2016
    Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, 62, pp. 196 - 204,
    Journal articles | 2016
    Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, 15, pp. 1 - 24,
    Journal articles | 2016
    Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, PP,
    Journal articles | 2016
    Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 16, pp. 59 - 78,
    Journal articles | 2016
    Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, 12, pp. 2177 - 2185,
    Journal articles | 2016
    Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, 65, pp. 32 - 44,
    Journal articles | 2016
    Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, 9, pp. 4914 - 4923,
    Journal articles | 2016
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency and Computation: Practice and Experience, 28, pp. 2940 - 2957,
    Journal articles | 2015
    Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31,
    Journal articles | 2015
    Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165,
    Journal articles | 2015
    Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67,
    Journal articles | 2015
    Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831,
    Journal articles | 2015
    Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206,
    Journal articles | 2015
    Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249,
    Journal articles | 2015
    Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679,
    Journal articles | 2015
    Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533,
    Journal articles | 2015
    Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583,
    Journal articles | 2015
    Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376,
    Journal articles | 2015
    Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235,
    Journal articles | 2015
    Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64,
    Journal articles | 2015
    Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139,
    Journal articles | 2015
    Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871,
    Journal articles | 2015
    Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015,
    Journal articles | 2015
    Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015,
    Journal articles | 2014
    Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251,
    Journal articles | 2014
    Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819,
    Journal articles | 2014
    Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895,
    Journal articles | 2014
    Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation: Practice and Experience, 26, pp. 1593 - 1605,
    Journal articles | 2014
    Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231,
    Journal articles | 2014
    Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99,
    Journal articles | 2014
    Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33,
    Journal articles | 2014
    Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329,
    Journal articles | 2014
    Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing,
    Journal articles | 2014
    Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320,
    Journal articles | 2014
    Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192,
    Journal articles | 2014
    Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189,
    Journal articles | 2014
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061,
    Journal articles | 2013
    Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178,
    Journal articles | 2013
    Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1682 - 1687,
    Journal articles | 2013
    Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, 13, pp. 204 - 210,
    Journal articles | 2013
    Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238,
    Journal articles | 2013
    Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817,
    Journal articles | 2013
    Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1401 - 1410,
    Journal articles | 2013
    Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1748 - 1753,
    Journal articles | 2013
    Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1699 - 1704,
    Journal articles | 2013
    Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8300 LNCS, pp. 81 - 91,
    Journal articles | 2013
    Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1676 - 1681,
    Journal articles | 2013
    Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210,
    Journal articles | 2013
    Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 296 - 308,
    Journal articles | 2013
    Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS, pp. 756 - 762,
    Journal articles | 2013
    Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1736 - 1741,
    Journal articles | 2012
    Chen XF; Chen HN; Zhang B; Chen ZX; Hu JK; Wang F; Yang H; Chen JP, 2012, 'Clinical outcomes of surgical patients with types ii and iii adenocarcinoma of esophagogastric junction', Journal of Sichuan University (Medical Science), 43, pp. 289 - 292
    Journal articles | 2012
    Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, 1479, pp. 1492 - 1493,
    Journal articles | 2012
    Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383,
    Journal articles | 2012
    Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, 55, pp. 438,
    Journal articles | 2012
    Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137,
    Journal articles | 2012
    Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085,
    Journal articles | 2012
    Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency and Computation: Practice and Experience, 24, pp. 1035 - 1036,
    Journal articles | 2012
    Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems,
    Journal articles | 2012
    Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091,
    Journal articles | 2012
    Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 83 LNICST, pp. 16 - 23,
    Journal articles | 2012
    Yang K; Chen HN; Chen XZ; Lu QC; Pan L; Liu J; Dai B; Zhang B; Chen ZX; Chen JP; Hu JK, 2012, 'Transthoracic resection versus non-transthoracic resection for gastroesophageal junction cancer: A meta-analysis', PLoS ONE, 7,
    Journal articles | 2012
    Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748,
    Journal articles | 2012
    Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943,
    Journal articles | 2012
    Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051,
    Journal articles | 2012
    Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421,
    Journal articles | 2012
    Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672 LNCS
    Journal articles | 2012
    Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, 28, pp. 368 - 370,
    Journal articles | 2011
    Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564,
    Journal articles | 2011
    Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647,
    Journal articles | 2011
    Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486,
    Journal articles | 2011
    Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909
    Journal articles | 2011
    Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159,
    Journal articles | 2011
    Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486
    Journal articles | 2011
    Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524,
    Journal articles | 2011
    Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88
    Journal articles | 2011
    Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569,
    Journal articles | 2011
    Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120
    Journal articles | 2011
    Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87,
    Journal articles | 2011
    Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499,
    Journal articles | 2011
    Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021,
    Journal articles | 2011
    Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644,
    Journal articles | 2011
    Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296,
    Journal articles | 2011
    Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319,
    Journal articles | 2010
    Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications,
    Journal articles | 2007
    Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585,
    Journal articles | 2005
    Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277
    Journal articles | 2004
    Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 470 - 474,
    Journal articles | 2004
    Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 725 - 730,
    Journal articles | 2003
    Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536,
    Journal articles | 2003
    Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264,
    Journal articles | 2002
    Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170
    Journal articles | 2001
    Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2, pp. 1005 - 1008
    Journal articles | 2000
    Hu J; Bohn C; Wu HR, 2000, 'Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252,
    Journal articles | 1999
    Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1, pp. 544 - 546,
    Journal articles | 1998
    Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927
  • Conference Papers | 2024
    Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024,
    Conference Papers | 2023
    Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings,
    Conference Papers | 2023
    Zhang J; Hu J; Jia X, 2023, 'Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing,
    Conference Papers | 2022
    Song W; Wang M; Wu Y; Chou CT; Hu J; Hu W, 2022, 'Poster: Towards behavior-independent in-hand user authentication on smartphone using vibration', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 844 - 846,
    Preprints | 2022
    Yin X; Wang S; Zhu Y; Hu J, 2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, ,
    Preprints | 2022
    Yin X; Zhu Y; Xie Y; Hu J, 2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems,
    Conference Papers | 2022
    Zhang J; Jia X; Zhou J; Hu J, 2022, 'Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 1181 - 1184,
    Preprints | 2022
    Zhu Y; Yin X; Hu J, 2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, ,
    Preprints | 2022
    Zhu Y; Yin X; Jia X; Hu J, 2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, ,
    Preprints | 2021
    Han Y; Zheng B; Zhao L; Hu J; Zhang C; Xiao R; Wang C; Pu D, 2021, Impact of Background Music on the Performance of Laparoscopy Teams, ,
    Conference Papers | 2021
    Zhang J; Jia X; Hu J, 2021, 'WEAKLY SUPERVISED SOLAR PANEL MAPPING USING RESIDUAL AGGREGATED NETWORK FOR AERIAL IMAGES', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 2787 - 2790,
    Preprints | 2020
    Tran NN; Pota HR; Tran QN; Hu J, 2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, ,
    Preprints | 2020
    Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, ,
    Conference Papers | 2020
    Zhang J; Jia X; Hu J, 2020, 'Low-Rank Matrix Decomposition with Superpixel-Based Structured Sparse Regularization for Moving Object Detection in Satellite Videos', in ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pp. 941 - 948,
    Conference Papers | 2020
    Zhang J; Jia X; Hu J, 2020, 'Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images', in 2020 Digital Image Computing: Techniques and Applications, DICTA 2020, Online, presented at 2020 Digital Image Computing: Techniques and Applications (DICTA), Online, 30 November 2020 - 02 December 2020,
    Conference Papers | 2019
    Farooq A; Jia X; Hu J; Zhou J; Awan AF, 2019, 'Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, Institute of Electrical and Electronics Engineers (IEEE), NETHERLANDS, Amsterdam, pp. 01 - 05, presented at 2019 10th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS), NETHERLANDS, Amsterdam, 24 September 2019 - 26 September 2019,
    Conference Papers | 2019
    Wang M; Hu J; Abbass H, 2019, 'Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity', in Australian Journal of Intelligent Information Processing Systems, Sydney, Australia, presented at 2019 - 26th International Conference on Neural Information Processing, Sydney, Australia, 12 December 2019 - 15 December 2019,
    Preprints | 2019
    Zhang J; Jia X; Hu J; Chanussot J, 2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, ,
    Conference Papers | 2019
    Zhang J; Jia X; Hu J; Tan K, 2019, 'Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization', in 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018,
    Preprints | 2019
    Zhang J; Jia X; Hu J, 2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, ,
    Conference Papers | 2018
    Farooq A; Hu J; Jia X; Awan AF, 2018, 'Weed classification in hyperspectral remote sensing images via deep convolutional neural network', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), SPAIN, Valencia, pp. 3816 - 3819, presented at IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, SPAIN, Valencia, 22 July 2018 - 27 July 2018,
    Conference Papers | 2018
    Ghosh L; Konar A; Rakshit P; Parui S; Ralescu AL; Nagar AK, 2018, 'P-300 and N-400 Induced Decoding of Learning-Skill of Driving Learners Using Type-2 Fuzzy Sets', in 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, pp. 1 - 8, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 08 July 2018 - 13 July 2018,
    Conference Papers | 2018
    Li F; Guo Y; Hu J, 2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177,
    Conference Papers | 2018
    Nhat Tran Q; Hu J; Wang S, 2018, 'Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure', in Proceedings - IEEE Global Communications Conference, GLOBECOM,
    Conference Papers | 2018
    Salah T; Hasan H; Zemerly MJ; Yeun CY; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'Secure Autonomous Mobile Agents for Web Services', in Proceedings - IEEE Global Communications Conference, GLOBECOM,
    Preprints | 2018
    Shen M; Liao Z; Zhu L; Mijumbi R; Du X; Hu J, 2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, ,
    Preprints | 2018
    Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, ,
    Conference Papers | 2018
    Wang M; Hu J; Abbass HA, 2018, 'Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers', in IEEE International Conference on Fuzzy Systems, IEEE, Rio de Janeiro, Brazil, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 08 July 2018 - 13 July 2018,
    Conference Papers | 2018
    Zhang J; Jia X; Hu J, 2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Valencia, Spain, pp. 7074 - 7077, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July 2018 - 27 April 2018,
    Preprints | 2017
    An S; Boussaid F; Bennamoun M; Hu J, 2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, ,
    Conference Papers | 2017
    Farooq A; Hu J; Jia X; Awan AF, 2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Fort Worth, TX, USA, pp. 3337 - 3340, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23 July 2017 - 28 July 2017,
    Conference Papers | 2017
    Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017,
    Preprints | 2017
    Song C-X; Yin S; Ma L; Wheeler A; Chen Y; Zhang Y; Liu B; Xiong J; Zhang W; Hu J; Zhou Z; Dong B; Tian Z; Jeffrey SS; Chua M-S; So S; Li W; Wei Y; Diao J; Xie D; Quake SR, 2017, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages, ,
    Conference Papers | 2017
    Sun J; Zhu B; Qin J; Hu J; Wu Q, 2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818,
    Conference Papers | 2017
    Tian X; Shen P; Yang T; Chen C; Hu J, 2017, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 66 - 78, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
    Conference Papers | 2017
    Tran NN; Sarker R; Hu J, 2017, 'An approach for host-based intrusion detection system design using convolutional neural network', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 116 - 126, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
    Conference Papers | 2017
    Xu J; Hu J, 2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147,
    Conference Papers | 2017
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536,
    Conference Papers | 2017
    Yang W; Zheng G; Ibrahim A; Chaudhry J; Wang S; Hu J; Valli C, 2017, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Adelaide, pp. 291 - 298, presented at 9th International Conference, MONAMI 2017, Melbourne, Adelaide, 13 December 2017 - 15 December 2017,
    Conference Papers | 2017
    Yin X; Zhu Y; Hu J, 2017, 'A robust contactless fingerprint enhancement algorithm', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 127 - 136, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
    Conference Papers | 2017
    Zhang J; Jia X; Hu J, 2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, presented at 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, 29 November 2017 - 01 December 2017,
    Conference Papers | 2017
    Zhu Y; Yin X; Hu J, 2017, 'Robust fingerprint matching based on convolutional neural networks', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 56 - 65, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
    Conference Papers | 2017
    Zhu Y; Yin X; Jia X; Hu J, 2017, 'Latent Fingerprint Segmentation Based on Convolutional Neural Networks', in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, presented at 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 04 December 2017 - 07 December 2017,
    Conference Papers | 2016
    Han F; Xu L; Yu X; Tari Z; Feng Y; Hu J, 2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 825 - 830, presented at Industrial Electronics and Applications (ICIEA), 2016 IEEE 11th Conference on, Hefei, China, 05 June 2016 - 07 June 2016,
    Conference Papers | 2016
    Luo X; Ren Y; Liu J; Hu J; Liu W; Wang Z; Xu W; Wu Q, 2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia, pp. 87 - 102, presented at Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 04 July 2016 - 06 July 2016,
    Conference Papers | 2016
    Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'Using Game Theory with Intrinsic Motivation to Examine Anti-Hacking Policies for Autonomous Systems', in Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, presented at IEEE Symposium Series on Computational Intelligence, Athens, Greece, 06 December 2016 - 09 December 2016,
    Conference Papers | 2016
    Wang M; Abbass H; Hu J; Merrick K, 2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Nature, China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - ,
    Conference Papers | 2016
    Wang M; Abbass HA; Hu J, 2016, 'Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems', in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pp. 368 - 375, presented at Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, 12 December 2016 - 14 December 2016,
    Conference Papers | 2016
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016,
    Conference Papers | 2016
    Yang W; Hu J; Fernandes C; Sivaraman V; Wu Q, 2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, pp. 457 - 463, presented at 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12 December 2016 - 14 December 2016,
    Conference Papers | 2016
    Yin X; Hu J; Xu J, 2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 144 - 149, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 05 June 2016 - 07 June 2016,
    Conference Papers | 2016
    Zhu Y; Hu J; Xu J, 2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, China, pp. 156 - 160, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), China, 05 June 2016 - 07 June 2016,
    Conference Papers | 2015
    Cai X; Zhang M; Hu J; Wu Q, 2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, PEOPLES R CHINA, Zhuhai, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), PEOPLES R CHINA, Zhuhai, 30 October 2015 - 31 October 2015,
    Conference Papers | 2015
    Guo Y; Hu J, 2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289,
    Conference Papers | 2015
    Guo Y; Jiang F; Hu J, 2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311,
    Conference Papers | 2015
    Haider W; Hu J; Xie M, 2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015,
    Conference Papers | 2015
    Haider W; Hu J; Yu X; Xie Y, 2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015,
    Conference Papers | 2015
    Li C; Hu J, 2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316,
    Conference Papers | 2015
    Xie M; Hu J; Slay J, 2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ÁñÁ«¹ÙÍø-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015,
    Conference Papers | 2015
    Xu J; Hu J, 2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015,
    Conference Papers | 2015
    Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33,
    Conference Papers | 2015
    Zhao H; Xu R; Shu M; Hu J, 2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70,
    Conference Papers | 2015
    Zheng H; Qin J; Hu J; Wu Q, 2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015,
    Conference Papers | 2015
    Zhu X; Chen C; Tian X; Hu J, 2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295,
    Conference Papers | 2014
    Chen C; Wang C; Yang T; Lin D; Wang S; Hu J, 2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014,
    Conference Papers | 2014
    Chen C; Zhu X; Shen P; Hu J, 2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564,
    Conference Papers | 2014
    Hu J; Pieprzyk J; Gardiyawasam Pussewalage H, 2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014,
    Conference Papers | 2014
    Kabir ME; Hu J, 2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946,
    Conference Papers | 2014
    Xie M; Hu J; Yu X; Chang E, 2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ÁñÁ«¹ÙÍø-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549,
    Conference Papers | 2014
    Yang W; Hu J; Wang S, 2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999,
    Conference Papers | 2014
    Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940,
    Conference Papers | 2014
    Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388,
    Conference Papers | 2013
    Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492,
    Conference Papers | 2013
    Jiang F; Hu J, 2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345,
    Conference Papers | 2013
    Xie M; Hu J, 2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ÁñÁ«¹ÙÍø-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716,
    Conference Papers | 2013
    Xu J; Hu J; Jia X, 2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729,
    Conference Papers | 2013
    Xu Z; Yu X; Feng Y; Hu J; Tari Z; Han F, 2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381,
    Conference Papers | 2013
    Yang W; Hu J; Wang S, 2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013,
    Conference Papers | 2013
    Zhao H; Shu M; Qin J; Hu J, 2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747,
    Reports | 2013
    Zhu R; Sun Z; Ristaniemi T; Hu J, 2013, Guest editorial: Special issue on green telecommunications,
    Conference Papers | 2012
    Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012,
    Conference Papers | 2012
    Qin J; Hu J; Zhao H, 2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012,
    Conference Papers | 2012
    Tran QA; Jiang F; Hu J, 2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012,
    Conference Papers | 2012
    Xie M; Hu J; Tian B, 2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012,
    Conference Papers | 2012
    Yang W; Hu J; Stojmenovic M, 2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012,
    Conference Papers | 2012
    Yang W; Hu J; Wang S, 2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012,
    Conference Papers | 2012
    Zhao H; Hu J; Qin J; Varadharajan V; Wan H, 2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012,
    Conference Papers | 2011
    Ahmad T; Hu J; Wang S, 2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011,
    Conference Papers | 2011
    Di Vimercati SDC; Samarati P; Foresti S; Hu J, 2011, 'Foreword from the conference chairs', in Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011,
    Conference Papers | 2011
    Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011
    Conference Papers | 2011
    Han F; Feng Y; Alzahrani NS; Xi K; Hu J, 2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011,
    Conference Papers | 2011
    Han F; Hu J; Alkhathami M; Xi K, 2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011,
    Conference Papers | 2011
    Jiang F; Frater M; Hu J, 2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011,
    Conference Papers | 2011
    Xi K; Hu J; Han F, 2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011,
    Conference Papers | 2011
    Yaakob N; Khalil I; Hu J, 2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011
    Conference Papers | 2010
    Park JH; Yang LT; Zeadally S; Woungang I; Kawsar F; Jeong YS; Cerqueira E; Fowler S; Zhang Z; Chao HC; Phillips I; Hu J; Taniar D; Chen JL; Huang R; Makki K; Falowo O; Hunt R; Mehmood R; Chan P; Iftikha M; Gasparakis J; Martinez G; Kamel I; Law E; Mihovska A; Moustafa H; Huang TC; Landfeldt B; Anagnostopoulos I; Chilamkurti N; Chang YC; Wu TY; Wang RC; Yen YS; Chang SY; Huang S; Wu HC; Ferworn A; Zhang Y; Stefanos Gritzalis S; Fernando X; Anpalagan A; Singh A; Ding JW; Zhou L; Hussain M; Wang WC; Kwak J; Chang CC; Martinelli F; Pan G; Sun HM; Forne J; Bergmann N; Belli F; Sarker BK; Biswas J; Sauveron D; Pedreiras P; Crespi N; Shyu ML; Tabata T; Cong-Vinh P; Chen LJ; Deng DJ; Zhang B; Zheng J; Geilen M; Iqbal R; Villano U; Ali S; Shun CT; Naureen A, 2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings,
    Conference Papers | 2010
    Raffe W; Hu J; Zambetta F; Xi K, 2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010,
    Conference Papers | 2010
    Xiang Y; Samarati P; Hu J, 2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010,
    Conference Papers | 2009
    Xi K; Hu J, 2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, PEOPLES R CHINA, Xian, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, PEOPLES R CHINA, Xian, 25 May 2009 - 27 May 2009,
    Conference Papers | 2008
    Yeo SS; Hu J, 2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, pp. 11,
    Conference Papers | 2005
    Hu J, 2005, 'H-infinity design for a sonar-platform', in TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, IEEE, AUSTRALIA, Melbourne, pp. 2163 - 2168, presented at IEEE Region 10 Conference (TENCON 2005), AUSTRALIA, Melbourne, 21 November 2005 - 24 November 2005,
    Conference Papers | 2005
    Phillips D; Hu JK, 2005, 'Modelling of SACK TCP and application to the HTTP file transfer environment', in LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, IEEE COMPUTER SOC, AUSTRALIA, Sydney, pp. 515 - 516, presented at 30th Annual IEEE Conference on Local Computer Networks, AUSTRALIA, Sydney, 15 November 2005 - 17 November 2005,
    Conference Papers | 2003
    Hoang XD; Hu J; Bertok P, 2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346
    Conference Papers | 2003
    Phillips D; Hu J, 2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231
    Conference Papers | 1999
    Hu J; Bohn C; Wu HR, 1999, 'Practical H∞ weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924
    Conference Papers | 1999
    Hu J; Wu HR; Chou CT; Verhaegen M; Westwick D; Nijsse G, 1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530
    Conference Papers | 1999
    Hu J; Wu HR; Chou CT; Verhaegen M, 1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179
    Conference Papers | 1999
    Hu J; Wu HR, 1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422,
    Conference Papers | 1996
    Hu J; Unbehauen H; Bohn C, 1996, 'Practical approach to selecting weighting functions for H∞ control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003
    Conference Papers | 1993
    HU JK; WANG GX; ZHANG GF; LI DP, 1993, 'ROBUST PERFORMANCE CONTROL AND ANALYSIS OF ILL-CONDITIONED PLANTS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 238 - 240, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993,
    Conference Papers | 1993
    ZHANG GF; WANG GX; HU JK, 1993, 'CONJUGATION AND H-INFINITY-CONTROL OF DISCRETE-TIME-SYSTEMS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 467 - 470, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993,
    Conference Papers | 1993
    ZHANG GF; WANG GX; HU JK, 1993, 'SIMPLIFYING DISCRETE-TIME H-INFINITY CONTROL', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 471 - 473, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993,

1. J. Hu,Ìý"Energy Big Data Analytics from a Cybersecurity Perspective,"ÌýDP190103660.

This project investigates data-driven algorithms for the privacy and security of smart grids. Research outputs include a research dataset for false data injection attack () and the following publications.

Ìý

Publications

(1) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2022. "A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems"ÌýSensorsÌý22, no. 21: 8188. https://doi.org/10.3390/s22218188.Ìý.

(2)ÌýX. Yin, S. Wang, Y. Zhu and J. Hu, "A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications," inÌýIEEE Internet of Things Journal, vol. 10, no. 1, pp. 877-892, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3204246.Ìý

(3)ÌýQ. N. Tran, B. P. Turnbull, M. Wang and J. Hu, "A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol," inÌýIEEE Open Journal of the Computer Society, vol. 3, pp. 1-10, 2022, doi: 10.1109/OJCS.2021.3138332.Ìý

(4)ÌýH. -Y. Tran, J. Hu and H. R. Pota, "A Privacy-Preserving State Estimation Scheme for Smart Grids," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3940-3956, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3210017.Ìý

(5)ÌýX. Yin, Y. Zhu and J. Hu, "A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids," inÌýIEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1957-1967, March 2022, doi: 10.1109/TII.2021.3102332.Ìý

(6)ÌýX. Yin, Y. Zhu and J. Hu, "A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions," inÌýIEEE Open Journal of the Computer Society, vol. 2, pp. 370-381, 2021, doi: 10.1109/OJCS.2021.3119572.Ìý

(7)ÌýH. -Y. Tran, J. Hu, X. Yin and H. R. Pota, "An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids," inÌýIEEE Transactions on Information Forensics and Security, vol. 18, pp. 2538-2552, 2023, doi: 10.1109/TIFS.2023.3267892.Ìý

(8)ÌýQ. N. Tran, B. P. Turnbull and J. Hu, "Biometrics and Privacy-Preservation: How Do They Evolve?," inÌýIEEE Open Journal of the Computer Society, vol. 2, pp. 179-191, 2021, doi: 10.1109/OJCS.2021.3068385.Ìý.

(9)ÌýKhan, Misbah, Frank den Hartog, and Jiankun Hu. 2024. "Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation"ÌýSensorsÌý24, no. 5: 1583. https://doi.org/10.3390/s24051583.Ìý.

(10)ÌýM. Wang, S. Wang and J. Hu, "PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4258-4272, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3218782.Ìý

(11)ÌýX. Yin, Y. Zhu, Y. Xie and J. Hu, "PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems," inÌýIEEE Open Journal of the Computer Society, vol. 3, pp. 149-161, 2022, doi: 10.1109/OJCS.2022.3199755.Ìý.

(12)ÌýH. Ma, Y. Xie, S. Tang, J. Hu and X. Liu, "Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1735-1752, 1 May-June 2022, doi: 10.1109/TDSC.2020.3036664.Ìý.

(13)ÌýH. -T. Wu, K. Zheng, Q. Huang and J. Hu, "Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility," in IEEE Signal Processing Letters, vol. 28, pp. 160-164, 2021, doi: 10.1109/LSP.2020.3048840.Ìý

(14)ÌýJ. Zhang, X. Jia and J. Hu, "Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images," in IEEE Geoscience and Remote Sensing Letters, vol. 19, pp. 1-5, 2022, Art no. 6504005, doi: 10.1109/LGRS.2021.3132935.Ìý

(15)ÌýH. Du, Z. Che, M. Shen, L. Zhu and J. Hu, "Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 616-631, 2024, doi: 10.1109/TIFS.2023.3326984.Ìý

(16)ÌýJ. Zhang, X. Jia and J. Hu, "SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images," in IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-15, 2022, Art no. 5612715, doi: 10.1109/TGRS.2021.3123268.Ìý

(17)ÌýH. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043.Ìý

(18)ÌýQ. N. Tran and J. Hu, "A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926-2940, 2021, doi: 10.1109/TIFS.2021.3069170.Ìý

(19)ÌýN. N. Tran, H. R. Pota, Q. N. Tran and J. Hu, "Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9422-9435, 1 June 1, 2021, doi: 10.1109/JIOT.2021.3056649.Ìý

(20)ÌýM. Shen, Y. Liu, L. Zhu, X. Du and J. Hu, "Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046-2059, 2021, doi: 10.1109/TIFS.2020.3046876.Ìý

(21)ÌýXuefei Yin, Yanming Zhu, and Jiankun Hu. 2021. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 54, 6, Article 131 (July 2021), 36 pages. https://doi.org/10.1145/3460427.Ìý.Ìý

(22)ÌýJ. Zhang, X. Jia, J. Zhou, J. Zhang and J. Hu, "Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images," in IEEE Transactions on Image Processing, vol. 33, pp. 881-896, 2024, doi: 10.1109/TIP.2023.3336170.Ìýhttps://zenodo.org/search?q=%22Weakly%20Supervised%20Solar%20Panel%20Mapping%20via%22%20&l=list&p=1&s=10&sort=bestmatch.

Ìý

Ìý

Ìý