Professor Jiankun Hu

Professor
School of Engineering and Information Technology
+61 2 6268 8186
+61 2 6268 8581

LOCATION

Building 15 Room 106
School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, PO Box 7916, Canberra BC ACT 2610, AUSTRALIA

  • ABOUT
  • PUBLICATIONS

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded seven Australia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09.  He was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. He served and is serving as an Associate Editor of the following journals: Journal of Network and Computer Applications, Elsevier; Journal of Security and Communication Networks, Wiley; and Journal of Wireless Communication and Mobile Computing, Wiley. He is the leading Guest Editor of a 2009 special issue on biometric security for mobile computing, Journal of Security and Communication Networks, Wiley.

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

 

 

 

 

Books

Hu J; Khalil I; Tari Z, 2018, Preface

Book Chapters

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, 10.1007/978-3-319-32903-1_119-1

Ahmed M; Mahmood A; Hu J, 2014, 'Outlier Detection', in Khan Pathan A-S (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press USA, Boca Raton, Fl., USA, pp. 3 - 22, 10.1201/b16390-3

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, 10.1142/9789814287852_0019

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, 10.1007/978-3-642-04117-4_20

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, 10.1007/978-3-642-04117-4_7

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, 10.1007/978-3-642-04117-4_13

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, 10.1007/978-3-642-04117-4_11

Journal articles

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, 10.1016/j.jnca.2018.12.006

Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, vol. 79, pp. 303 - 318, 10.1016/j.future.2017.01.029

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, vol. 13, pp. 940 - 953, 10.1109/TIFS.2017.2774451

Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, vol. 78, pp. 242 - 251, 10.1016/j.patcog.2018.01.026

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence

Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, vol. 34, pp. 1178 - 1198, 10.1111/coin.12177

Shen M; Cheng G; Zhu L; Du X; Hu J, 2018, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 10.1016/j.future.2018.04.089

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, vol. 6, pp. 36939 - 36947, 10.1109/ACCESS.2018.2844182

Moustafa N; Adi E; Turnbull B; Hu J, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, 10.1109/ACCESS.2018.2844794

Hu J, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, vol. 2018, 10.1155/2018/7107295

Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331 - 346, 10.1109/TIFS.2018.2850312

Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, vol. 2018, 10.1155/2018/5275132

Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, vol. 124, pp. 33 - 43, 10.1016/j.jnca.2018.09.011

Farooq A; Hu J; Jia X, 2018, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 10.1109/LGRS.2018.2869879

Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, vol. 21, pp. 3123 - 3134, 10.1007/s00500-015-1997-6

Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, vol. 61, pp. 447 - 458, 10.1016/j.patcog.2016.08.017

Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, vol. 66, pp. 295 - 301, 10.1016/j.patcog.2017.01.019

Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 940 - 952, 10.1109/TIFS.2016.2646913

Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, vol. 10, pp. 55 - 66, 10.1504/IJAACS.2017.082738

Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, vol. 87, pp. 185 - 192, 10.1016/j.jnca.2017.03.018

Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, vol. 72, pp. 206 - 207, 10.1016/j.future.2017.03.033

Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, vol. 20, pp. 2211 - 2229, 10.1007/s10586-017-0872-x

Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, vol. 21, pp. 923 - 936, 10.1007/s00779-017-1051-z

Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, vol. 130, pp. 90 - 101, 10.1016/j.knosys.2017.03.032

Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, vol. 2017, 10.1155/2017/3606424

Wang Q; Qin B; Hu J; Xiao F, 2017, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 10.1016/j.future.2017.08.026

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency Computation, vol. 28, pp. 2940 - 2957, 10.1002/cpe.3600

Ahmed M; Naser Mahmood A; Hu J, 2016, 'A survey of network anomaly detection techniques', Journal of Network and Computer Applications, vol. 60, pp. 19 - 31, 10.1016/j.jnca.2015.11.016

Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, vol. 62, pp. 196 - 204, 10.1016/j.future.2015.12.009

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, vol. 16, pp. 59 - 78, 10.1002/wcm.2488

Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, vol. 54, pp. 14 - 22, 10.1016/j.patcog.2016.01.001

Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, vol. 65, pp. 32 - 44, 10.1016/j.simpat.2015.12.003

Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, vol. 62, pp. 66 - 75, 10.1016/j.future.2016.01.007

Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, vol. 65, pp. 19 - 29, 10.1109/TC.2015.2417566

Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, vol. 27, pp. 951 - 963, 10.1109/TPDS.2015.2425407

Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, vol. 7, pp. 2432 - 2436, 10.1109/TSG.2016.2563461

Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, vol. PP, 10.1109/TIFS.2016.2603961

Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, vol. 3, pp. 34 - 42, 10.1109/MCC.2016.107

Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, vol. 9, pp. 4914 - 4923, 10.1002/sec.1664

Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A survey of game theoretic approaches to modelling decision-making in information warfare scenarios', Future Internet, vol. 8, 10.3390/fi8030034

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows based data sets for evaluation of robustness of Host based Intrusion Detection Systems (IDS) to zero-day and stealth attacks', Future Internet, vol. 8, 10.3390/fi8030029

Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, vol. 12, pp. 2177 - 2185, 10.1109/TII.2016.2569413

Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, vol. 9, pp. 2641 - 2642, 10.1002/sec.1497

Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, vol. 15, 10.1145/2930669

Li C; Hu J, 2016, 'A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures', IEEE Transactions on Information Forensics and Security, vol. 11, pp. 543 - 555, 10.1109/TIFS.2015.2505630

Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, vol. 52, pp. 59 - 64, 10.1016/j.patrec.2014.09.015

Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 574 - 583, 10.1109/TPDS.2014.2308198

Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Switzerland), vol. 15, pp. 2812 - 2831, 10.3390/s150202812

Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, vol. 51, pp. 234 - 235, 10.1049/el.2014.4182

Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1193 - 1206, 10.1109/TIFS.2015.2402593

Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, vol. 64, pp. 1670 - 1679, 10.1109/TC.2014.2345397

Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, vol. 56, pp. 158 - 165, 10.1016/j.jnca.2015.06.003

Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, vol. 2015, 10.1155/2015/352761

Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, vol. 2015, 10.1155/2015/764919

Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, vol. 53, pp. 5861 - 5871, 10.1109/TGRS.2015.2423688

Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, vol. 64, pp. 2519 - 2533, 10.1109/TC.2014.2375218

Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, vol. 64, pp. 3128 - 3139, 10.1109/TC.2015.2389802

Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, vol. 51, pp. 1247 - 1249, 10.1049/el.2015.1349

Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, vol. 2, pp. 58 - 67, 10.1109/MCC.2015.34

Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, vol. 19, pp. 367 - 376, 10.1109/JBHI.2014.2305445

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, vol. 47, pp. 1309 - 1320, 10.1016/j.patcog.2013.10.001

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, vol. 14, pp. 221 - 231, 10.1002/wcm.1247

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency Computation Practice and Experience, vol. 26, pp. 1593 - 1605, 10.1002/cpe.3042

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1179 - 1192, 10.1109/TIFS.2014.2328095

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 1886 - 1895, 10.1109/TPDS.2013.301

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, vol. 50, pp. 1060 - 1061, 10.1049/el.2014.1927

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 2180 - 2189, 10.1109/TPDS.2013.221

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, vol. 46, pp. 94 - 99, 10.1016/j.jnca.2014.08.004

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, vol. 1, pp. 27 - 33, 10.1109/MCC.2014.53

Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, vol. 46, pp. 250 - 251, 10.1016/j.jnca.2014.11.002

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, vol. 63, pp. 807 - 819, 10.1109/TC.2013.13

Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672, pp. 165 - 178, 10.1007/978-3-642-35362-8_14

Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1807 - 1817, 10.1109/TPDS.2012.268

Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1401 - 1410, 10.1109/TPDS.2012.232

Xie Y; Hu J; Tang S; Huang X, 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, vol. 56, pp. 229 - 238, 10.1093/comjnl/bxs124

Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, vol. 13, pp. 204 - 210, 10.1002/wcm.1109

Xie M; Hu J; Han S; Chen HH, 2013, 'Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1661 - 1670, 10.1109/TPDS.2012.261

Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7873 LNCS, pp. 756 - 762, 10.1007/978-3-642-38631-2_67

Wang S; Hu J, 2013, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 10.1016/j.patcog.2013.10.003

Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8300 LNCS, pp. 81 - 91, 10.1007/978-3-319-03584-0_7

Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 2202 - 2210, 10.1109/TPDS.2012.320

Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1699 - 1704, 10.1109/CISP.2013.6743950

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1676 - 1681, 10.1109/CISP.2013.6743946

Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1748 - 1753, 10.1109/CISP.2013.6743958

Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1682 - 1687, 10.1109/CISP.2013.6743947

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, vol. 3, pp. 1736 - 1741, 10.1109/CISP.2013.6743956

Xie Y; Hu J; Tang S; Huang X, 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, vol. 35, pp. 2081 - 2091, 10.1016/j.jnca.2012.08.010

Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, vol. 8, pp. 935 - 943, 10.1109/TII.2012.2205397

Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, vol. 35, pp. 1035 - 1051, 10.1016/j.jnca.2011.12.004

Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, vol. 28, pp. 368 - 370, 10.1016/j.future.2011.06.011

Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, vol. 45, pp. 4129 - 4137, 10.1016/j.patcog.2012.05.004

Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, vol. 55, pp. 410 - 421, 10.1093/comjnl/bxr065

Zhao H; Qin J; Shu M; Hu J, 2012, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS, pp. 296 - 308, 10.1007/978-3-642-35362-8_23

Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7672 LNCS

Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, vol. 35, pp. 1740 - 1748, 10.1016/j.jnca.2012.06.005

Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 83 LNICST, pp. 16 - 23, 10.1007/978-3-642-29734-2_3

Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency Computation Practice and Experience, vol. 24, pp. 1035 - 1036, 10.1002/cpe.2810

Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, vol. 55, pp. 382 - 383, 10.1093/comjnl/bxr123

Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, vol. 55, pp. 438, 10.1093/comjnl/bxs016

Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, vol. 1479, pp. 1492 - 1493, 10.1063/1.4756447

Xi K; Hu J; Han F, 2012, 'Mobile device access control: An improved correlation based face authentication scheme and its Java ME application', Concurrency Computation Practice and Experience, vol. 24, pp. 1066 - 1085, 10.1002/cpe.1797

Yang K; Chen HN; Chen XZ; Lu QC; Pan L; Liu J; Dai B; Zhang B; Chen ZX; Chen JP, 2012, 'Transthoracic resection versus non-transthoracic resection for gastroesophageal junction cancer: A meta-analysis', PLoS ONE, vol. 7, 10.1371/journal.pone.0037698

Chen XF; Chen HN; Zhang B; Chen ZX; Hu JK; Wang F; Yang H; Chen JP, 2012, 'Clinical outcomes of surgical patients with types ii and iii adenocarcinoma of esophagogastric junction', Journal of Sichuan University (Medical Science Edition), vol. 43, pp. 289 - 292

Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, vol. 4, pp. 483 - 486

Wang Y; Hu J, 2011, 'Global ridge orientation modeling for partial fingerprint identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, pp. 72 - 87, 10.1109/TPAMI.2010.73

Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, vol. 44, pp. 2555 - 2564, 10.1016/j.patcog.2011.03.015

Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, vol. 30, pp. 311 - 319, 10.1016/j.cose.2011.02.003

Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, vol. 54, pp. 1632 - 1644, 10.1093/comjnl/bxr064

Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, vol. 2011, 10.1155/2011/310647

Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, 10.1109/ICIEA.2011.5975736

Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, vol. 34, pp. 1150 - 1159, 10.1016/j.jnca.2010.11.013

Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, vol. 30, pp. 295 - 296, 10.1016/j.cose.2011.06.001

Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure e-commerce transactions', Security and Communication Networks, vol. 4, pp. 902 - 909, 10.1002/sec.221

Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications', Security and Communication Networks, vol. 4, pp. 515 - 524, 10.1002/sec.226

Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Security and Communication Networks, vol. 4, pp. 487 - 499, 10.1002/sec.225

Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, vol. 4, pp. 483 - 486, 10.1002/sec.240

Tian B; Han S; Hu J; Dillon T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, vol. 34, pp. 80 - 88, 10.1016/j.jnca.2010.09.002

Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, vol. 34, pp. 116 - 120, 10.1016/j.jnca.2010.08.009

Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing key distribution schemes for wireless networks: A survey', Computer Journal, vol. 54, pp. 549 - 569, 10.1093/comjnl/bxr022

Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, 10.1109/ICC.2010.5501988

Wang Y; Hu J; Phillips D, 2007, 'A fingerprint orientation model based on 2D fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, pp. 573 - 585, 10.1109/TPAMI.2007.1003

Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277

Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, vol. 2, pp. 725 - 730, 10.1109/ICON.2004.1409271

Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, vol. 2, pp. 470 - 474, 10.1109/ICON.2004.1409210

Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264

Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536

Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, vol. 1, pp. 166 - 170

Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, vol. 2, pp. 1005 - 1008

Hu J; Bohn C; Wu HR, 2000, 'Systematic Hweighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, vol. 8, pp. 241 - 252

Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, vol. 1, pp. 544 - 546, 10.1109/ACSSC.1999.832389

Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, vol. 34, pp. 925 - 927

Conference Papers

Zhang J; Jia X; Hu J, 2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July - 27 April 2018

Yin X; Zhu Y; Hu J, 2018, 'A robust contactless fingerprint enhancement algorithm', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 127 - 136, presented at , 10.1007/978-3-319-90775-8_11

Zhu Y; Yin X; Hu J, 2018, 'Robust fingerprint matching based on convolutional neural networks', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 56 - 65, presented at , 10.1007/978-3-319-90775-8_5

Yang W; Zheng G; Ibrahim A; Chaudhry J; Wang S; Hu J; Valli C, 2018, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 291 - 298, presented at , 10.1007/978-3-319-90775-8_23

Haider W; Hu J; Moustafa N, 2018, 'Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 149, presented at , 10.1007/978-3-319-90775-8_12

Tian X; Shen P; Yang T; Chen C; Hu J, 2018, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 66 - 78, presented at , 10.1007/978-3-319-90775-8_6

Tran NN; Sarker R; Hu J, 2018, 'An approach for host-based intrusion detection system design using convolutional neural network', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 116 - 126, presented at , 10.1007/978-3-319-90775-8_10

Li F; Guo Y; Hu J, 2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177, presented at , 10.1007/978-3-319-90775-8_14

Zhu Y; Yin X; Jia X; Hu J, 2018, 'Latent fingerprint segmentation based on convolutional neural networks', in 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017, pp. 1 - 6, presented at , 10.1109/WIFS.2017.8267655

Xu J; Hu J, 2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147, presented at

Merrick K; Hardhienata M; Shafi K; Hu J, 2017, 'Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems', in 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016, presented at , 10.1109/SSCI.2016.7850035

Sun J; Zhu B; Qin J; Hu J; Wu Q, 2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818, presented at , 10.1142/S0129054117400196

Farooq A; Hu J; Jia X, 2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 3337 - 3340, presented at , 10.1109/IGARSS.2017.8127712

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536, presented at , 10.1109/IECON.2017.8217138

Zhang J; Jia X; Hu J, 2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in DICTA 2017 - 2017 International Conference on Digital Image Computing: Techniques and Applications, pp. 1 - 7, presented at , 10.1109/DICTA.2017.8227465

Haider W; Hu J; Yu X; Xie Y, 2016, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, pp. 349 - 355, presented at , 10.1109/CSCloud.2015.11

Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, pp. 187 - 193, presented at , 10.1109/CSCloud.2015.16

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 1832 - 1837, presented at , 10.1109/ICIT.2016.7475043

Luo X; Ren Y; Liu J; Hu J; Liu W; Wang Z; Xu W; Wu Q, 2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 87 - 102, presented at , 10.1007/978-3-319-40367-0_6

Han F; Xu L; Yu X; Tari Z; Feng Y; Hu J, 2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, pp. 825 - 830, presented at , 10.1109/ICIEA.2016.7603695

Yin X; Hu J; Xu J, 2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, pp. 144 - 149, presented at , 10.1109/ICIEA.2016.7603567

Wang M; Abbass HA; Hu J; Merrick K, 2016, 'Detecting rare visual and auditory events from EEG using pairwise-comparison neural networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 90 - 101, presented at , 10.1007/978-3-319-49685-6_9

Zhu Y; Hu J; Xu J, 2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, pp. 156 - 160, presented at , 10.1109/ICIEA.2016.7603569

Yang W; Hu J; Fernandes C; Sivaraman V; Wu Q, 2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, pp. 457 - 463, presented at , 10.1109/PST.2016.7907000

Wang M; Abbass HA; Hu J, 2016, 'Continuous authentication using EEG and face images for trusted autonomous systems', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, pp. 368 - 375, presented at , 10.1109/PST.2016.7906958

Zhao H; Xu R; Shu M; Hu J, 2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70, presented at , 10.1109/ISADS.2015.13

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, presented at , 10.1109/ICIT.2015.7125071

Xu J; Hu J, 2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 176 - 187, presented at , 10.1007/978-3-319-25645-0_12

Zhu X; Chen C; Tian X; Hu J, 2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295, presented at , 10.1109/ICIEA.2015.7334127

Haider W; Hu J; Xie M, 2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 513 - 517, presented at , 10.1109/ICIEA.2015.7334166

Li C; Hu J, 2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316, presented at , 10.1109/ICIEA.2015.7334131

Guo Y; Hu J, 2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289, presented at , 10.1109/ICIEA.2015.7334126

Guo Y; Jiang F; Hu J, 2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311, presented at , 10.1109/ICIEA.2015.7334130

Chen C; Zhu X; Shen P; Hu J, 2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564, presented at , 10.1109/INFCOMW.2014.6849292

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388, presented at

Xie M; Hu J; Yu X; Chang E, 2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 542 - 549, presented at

Yang W; Hu J; Wang S, 2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999, presented at , 10.1109/FSKD.2014.6980975

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940, presented at , 10.1109/FSKD.2014.6980965

Kabir ME; Hu J, 2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946, presented at , 10.1109/FSKD.2014.6980966

Xie M; Hu J; Slay J, 2014, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 978 - 982, presented at , 10.1109/FSKD.2014.6980972

Hu J; Pieprzyk J; Gardiyawasam Pussewalage H, 2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 - 21 August 2014, 10.1109/FSKD.2014.6980968

Chen C; Wang C; Yang T; Lin D; Wang S; Hu J, 2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 - 21 August 2014, 10.1109/FSKD.2014.6980974

Xu Z; Yu X; Feng Y; Hu J; Tari Z; Han F, 2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381, presented at , 10.1109/ICIEA.2013.6566581

Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, presented at , 10.1109/WCNC.2013.6555301

Jiang F; Hu J, 2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345, presented at , 10.1109/WCNC.2013.6555276

Yang W; Hu J; Wang S, 2013, 'A finger-vein based cancellable bio-cryptosystem', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 784 - 790, presented at , 10.1007/978-3-642-38631-2_71

Xie M; Hu J, 2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716, presented at , 10.1109/CISP.2013.6743952

Xu J; Hu J; Jia X, 2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729, presented at , 10.1109/CISP.2013.6743954

Zhao H; Shu M; Qin J; Hu J, 2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747, presented at , 10.1109/CIS.2013.162

Yang W; Hu J; Stojmenovic M, 2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in Proceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, pp. 866 - 870, presented at , 10.1109/ICIEA.2012.6360846

Yang W; Hu J; Wang S, 2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, pp. 66 - 70, presented at , 10.1109/TrustCom.2012.23

Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 497 - 504, presented at , 10.1007/978-3-642-31588-6_64

Qin J; Hu J; Zhao H, 2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, pp. 466 - 473, presented at , 10.1109/TrustCom.2012.263

Zhao H; Hu J; Qin J; Varadharajan V; Wan H, 2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, pp. 706 - 713, presented at , 10.1109/TrustCom.2012.171

Tran QA; Jiang F; Hu J, 2012, 'A real-time NetFlow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, pp. 201 - 208, presented at , 10.1109/TrustCom.2012.51

Xie M; Hu J; Tian B, 2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, pp. 751 - 759, presented at , 10.1109/TrustCom.2012.173

Yaakob N; Khalil I; Hu J, 2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 - 07 October 2011

Ahmad T; Hu J; Wang S, 2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Beijing, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 - 23 June 2011, 10.1109/ICIEA.2011.5975738

Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, pp. 617 - 620, presented at , 10.1109/ICCSNT.2011.6182033

Han F; Feng Y; Alzahrani NS; Xi K; Hu J, 2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 259 - 264, presented at , 10.1109/ICIEA.2011.5975591

Xi K; Hu J; Han F, 2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1040 - 1045, presented at , 10.1109/ICIEA.2011.5975740

Han F; Hu J; Alkhathami M; Xi K, 2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1034 - 1039, presented at , 10.1109/ICIEA.2011.5975739

Jiang F; Frater M; Hu J, 2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, pp. 145 - 150, presented at , 10.1109/DASC.2011.46

Raffe W; Hu J; Zambetta F; Xi K, 2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, Taichung, TAIWAN, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, Taichung, TAIWAN, 15 - 17 June 2010

Park JH; Yang LT; Zeadally S; Woungang I; Kawsar F; Jeong YS; Cerqueira E; Fowler S; Zhang Z; Chao HC, 2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, presented at , 10.1109/FUTURETECH.2010.5482638

Xiang Y; Samarati P; Hu J, 2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, presented at , 10.1109/NSS.2010.5

Xi K; Hu J, 2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, Xian, PEOPLES R CHINA, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, Xian, PEOPLES R CHINA, 25 - 27 May 2009

Yeo SS; Hu J, 2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, presented at , 10.1109/CSA.2008.5

Phillips D; Hu J, 2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231, presented at

Hoang XD; Hu J; Bertok P, 2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346, presented at

Hu J; Wu HR, 1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, presented at , 10.1109/ISSPA.1999.818201

Hu J; Wu HR; Chou CT; Verhaegen M, 1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179, presented at

Hu J; Wu HR; Chou CT; Verhaegen M; Westwick D; Nijsse G, 1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530, presented at

Hu J; Bohn C; Wu HR, 1999, 'Practical H weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924, presented at

Hu J; Unbehauen H; Bohn C, 1996, 'Practical approach to selecting weighting functions for H∞ control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003, presented at

Reports

Zhu R; Sun Z; Ristaniemi T; Hu J, 2013, Guest editorial: Special issue on green telecommunications, 10.1007/s11235-011-9637-7