Journal articles

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956

Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947

Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946

Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950

Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7

Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320

Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67

Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268

Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS, pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23

Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, vol. 13, pp. 204 - 210, http://dx.doi.org/10.1002/wcm.1109

Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, vol. 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124

Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1401 - 1410, http://dx.doi.org/10.1109/TPDS.2012.232

Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS

Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, vol. 1479, pp. 1492 - 1493, http://dx.doi.org/10.1063/1.4756447

Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 83 LNICST, pp. 16 - 23, http://dx.doi.org/10.1007/978-3-642-29734-2_3

Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency Computation Practice and Experience, vol. 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810

Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, vol. 55, pp. 438, http://dx.doi.org/10.1093/comjnl/bxs016

Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, vol. 28, pp. 368 - 370, http://dx.doi.org/10.1016/j.future.2011.06.011

Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, vol. 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797

Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, vol. 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123

Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, vol. 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005

Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1661 - 1670, http://dx.doi.org/10.1109/TPDS.2012.261

Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, vol. 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065

Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, vol. 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004

Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, vol. 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004

Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, vol. 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397

Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, vol. 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010

Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736

Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, vol. 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001

Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, vol. 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240

Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, vol. 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022

Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, vol. 34, pp. 116 - 120, http://dx.doi.org/10.1016/j.jnca.2010.08.009

Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, vol. 34, pp. 80 - 88, http://dx.doi.org/10.1016/j.jnca.2010.09.002

Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, vol. 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225

Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, vol. 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226

Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, vol. 4, pp. 902 - 909, http://dx.doi.org/10.1002/sec.221

Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, vol. 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013

Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, vol. 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647

Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, vol. 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064

Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, vol. 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003

Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, vol. 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015

Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73

Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, vol. 4, pp. 483 - 486

Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988

Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003

Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277

Showing 101 - 150 of 246 publications
Previous
1
2
3
4
5
Next