Professor Jiankun Hu

Professor
School of Engineering and Information Technology
UNSW Canberra Cyber
+61 2 6268 8186
+61 2 6268 8581

LOCATION

Building 15 Room 106
School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, PO Box 7916, Canberra BC ACT 2610, AUSTRALIA

  • ABOUT
  • PUBLICATIONS

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded seven Australia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09.  He was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. He served and is serving as an Associate Editor of the following journals: Journal of Network and Computer Applications, Elsevier; Journal of Security and Communication Networks, Wiley; and Journal of Wireless Communication and Mobile Computing, Wiley. He is the leading Guest Editor of a 2009 special issue on biometric security for mobile computing, Journal of Security and Communication Networks, Wiley.

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

 

 

 

 

Books

Hu J; Khalil I; Tari Z, 2018, Preface

Book Chapters

Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Awad AI; Fairhurst M (ed.), , IET

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Khan Pathan A-S (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20

Journal articles

Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, vol. 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083

Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, vol. 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372

Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization', IEEE TRANSACTIONS ON BIG DATA, vol. 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555

Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, vol. 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007

Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, vol. 11, http://dx.doi.org/10.3390/rs11141692

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, vol. 145, http://dx.doi.org/10.1016/j.jnca.2019.102411

Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), vol. 19, http://dx.doi.org/10.3390/s19132985

Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, vol. 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004

Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, vol. 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665

Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403

Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, vol. 11, http://dx.doi.org/10.3390/sym11020141

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, vol. 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879

Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics, vol. 12, pp. 65, http://dx.doi.org/10.3389/fnbot.2018.00065

Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, vol. 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011

Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, vol. 2018, http://dx.doi.org/10.1155/2018/5275132

Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312

Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, vol. 2018, http://dx.doi.org/10.1155/2018/7107295

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, vol. 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182

Shen M; Cheng G; Zhu L; Du X; Hu J, 2018, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, http://dx.doi.org/10.1016/j.future.2018.04.089

Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, vol. 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, vol. 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, vol. 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451

Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, vol. 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029

Wang Q; Qin B; Hu J; Xiao F, 2017, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, http://dx.doi.org/10.1016/j.future.2017.08.026

Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, vol. 2017, http://dx.doi.org/10.1155/2017/3606424

Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, vol. 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032

Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, vol. 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z

Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, vol. 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x

Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, vol. 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033

Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, vol. 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018

Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, vol. 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738

Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913

Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, vol. 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019

Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, vol. 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017

Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, vol. 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6

Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630

Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, vol. 15, http://dx.doi.org/10.1145/2930669