Journal articles

Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, vol. 2017, http://dx.doi.org/10.1155/2017/3606424

Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, vol. 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738

Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, vol. 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017

Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, vol. 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413

Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, vol. 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664

Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, vol. 9, pp. 2641 - 2642, http://dx.doi.org/10.1002/sec.1497

Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, vol. 7, pp. 2432 - 2436, http://dx.doi.org/10.1109/TSG.2016.2563461

Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, vol. 62, pp. 66 - 75, http://dx.doi.org/10.1016/j.future.2016.01.007

Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, vol. 62, pp. 196 - 204, http://dx.doi.org/10.1016/j.future.2015.12.009

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency Computation, vol. 28, pp. 2940 - 2957, http://dx.doi.org/10.1002/cpe.3600

Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, vol. 54, pp. 14 - 22, http://dx.doi.org/10.1016/j.patcog.2016.01.001

Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, vol. 27, pp. 951 - 963, http://dx.doi.org/10.1109/TPDS.2015.2425407

Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630

Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, vol. 15, http://dx.doi.org/10.1145/2930669

Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, vol. PP, http://dx.doi.org/10.1109/TIFS.2016.2603961

Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, vol. 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107

Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, vol. 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566

Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, vol. 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, vol. 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, vol. 8, pp. 29 - 29, http://dx.doi.org/10.3390/fi8030029

Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, vol. 8, http://dx.doi.org/10.3390/fi8030034

Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, vol. 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016

Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, vol. 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802

Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, vol. 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688

Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, vol. 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218

Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, vol. 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003

Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, vol. 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397

Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593

Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, vol. 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34

Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198

Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, vol. 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015

Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, vol. 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445

Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), vol. 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812

Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, vol. 2015, http://dx.doi.org/10.1155/2015/764919

Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, vol. 2015, http://dx.doi.org/10.1155/2015/352761

Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, vol. 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349

Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, vol. 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182

Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, vol. 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, vol. 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency Computation Practice and Experience, vol. 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042

Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, vol. 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, vol. 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, vol. 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, vol. 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, vol. 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, vol. 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Showing 51 - 100 of 246 publications
Previous
1
2
3
4
5
Next