UNSW Research Web and Researcher Profiles are undergoing scheduled maintenance between 9:00 am on 9th October 2024 and 5:00 pm on 9th October 2024.
Content changes made during this period will be lost. This maintenance does not impact InfoEd or other applications.

Researcher

Professor Jiankun Hu

My Expertise

1. Cyber Security: General cyber security, intrusion detection, applied cryptography, network security, and biometrics security

2. Image processing, video processing and multimedia processing

3. Artificial intelligence, machine learning and deep learning

Fields of Research (FoR)

Artificial intelligence not elsewhere classified, Computer vision and multimedia computation, Image processing, Pattern recognition, Cryptography, Data and information privacy, Data security and protection, Digital forensics, System and network security, Cyberphysical systems and internet of things, Cybercrime, Cybersecurity and privacy

SEO tags

Biography

False Data Injection Attack Dataset Download

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer...view more

False Data Injection Attack Dataset Download

ADFA IDS Datasets Download

SD27 Latent Fingerprint Dataset (masked ground-truth +samples of segmented results)

2D/3D Fingerprint Dataset Download

Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded ten Australia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09.  He was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. He is serving as an Associate Editor of the following journals: Journal of Security and Communication Networks, Wiley;  IEEE TIFS (Senior Area Editor); KSII TIIS (Area Editor); IET CPS; IEEE OJCS; and Wiley S&P. 

He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.

In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.

 

ADFA Dataset download on one link: https://research.unsw.edu.au/projects/adfa-ids-datasets

 

 

 


My Grants

1. J. Hu, "Energy Big Data Analytics from a Cybersecurity Perspective," DP190103660.

This project investigates data-driven algorithms for the privacy and security of smart grids. Research outputs include a research dataset for false data injection attack (Datasets for Stealthy False Data Injection Attacks (SFDIA) against Smart Grid - Harvard Dataverse) and the following publications.

 

Publications

(1) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2022. "A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems" Sensors 22, no. 21: 8188. https://doi.org/10.3390/s22218188. Sensors | Free Full-Text | A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems (mdpi.com).

(2) X. Yin, S. Wang, Y. Zhu and J. Hu, "A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications," in IEEE Internet of Things Journal, vol. 10, no. 1, pp. 877-892, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3204246. A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications | IEEE Journals & Magazine | IEEE Xplore

(3) Q. N. Tran, B. P. Turnbull, M. Wang and J. Hu, "A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol," in IEEE Open Journal of the Computer Society, vol. 3, pp. 1-10, 2022, doi: 10.1109/OJCS.2021.3138332. A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol | IEEE Journals & Magazine | IEEE Xplore

(4) H. -Y. Tran, J. Hu and H. R. Pota, "A Privacy-Preserving State Estimation Scheme for Smart Grids," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3940-3956, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3210017. A Privacy-Preserving State Estimation Scheme for Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(5) X. Yin, Y. Zhu and J. Hu, "A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids," in IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1957-1967, March 2022, doi: 10.1109/TII.2021.3102332. A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(6) X. Yin, Y. Zhu and J. Hu, "A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions," in IEEE Open Journal of the Computer Society, vol. 2, pp. 370-381, 2021, doi: 10.1109/OJCS.2021.3119572. A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions | IEEE Journals & Magazine | IEEE Xplore

(7) H. -Y. Tran, J. Hu, X. Yin and H. R. Pota, "An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2538-2552, 2023, doi: 10.1109/TIFS.2023.3267892. An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids | IEEE Journals & Magazine | IEEE Xplore

(8) Q. N. Tran, B. P. Turnbull and J. Hu, "Biometrics and Privacy-Preservation: How Do They Evolve?," in IEEE Open Journal of the Computer Society, vol. 2, pp. 179-191, 2021, doi: 10.1109/OJCS.2021.3068385. Biometrics and Privacy-Preservation: How Do They Evolve? | IEEE Journals & Magazine | IEEE Xplore.

(9) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2024. "Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation" Sensors 24, no. 5: 1583. https://doi.org/10.3390/s24051583. Sensors | Free Full-Text | Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation (mdpi.com).

(10) M. Wang, S. Wang and J. Hu, "PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4258-4272, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3218782. PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System | IEEE Journals & Magazine | IEEE Xplore

(11) X. Yin, Y. Zhu, Y. Xie and J. Hu, "PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems," in IEEE Open Journal of the Computer Society, vol. 3, pp. 149-161, 2022, doi: 10.1109/OJCS.2022.3199755. PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems | IEEE Journals & Magazine | IEEE Xplore.

(12) H. Ma, Y. Xie, S. Tang, J. Hu and X. Liu, "Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1735-1752, 1 May-June 2022, doi: 10.1109/TDSC.2020.3036664. Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field | IEEE Journals & Magazine | IEEE Xplore.

(13) H. -T. Wu, K. Zheng, Q. Huang and J. Hu, "Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility," in IEEE Signal Processing Letters, vol. 28, pp. 160-164, 2021, doi: 10.1109/LSP.2020.3048840. Search results (zenodo.org)

(14) J. Zhang, X. Jia and J. Hu, "Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images," in IEEE Geoscience and Remote Sensing Letters, vol. 19, pp. 1-5, 2022, Art no. 6504005, doi: 10.1109/LGRS.2021.3132935. Search results (zenodo.org)

(15) H. Du, Z. Che, M. Shen, L. Zhu and J. Hu, "Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 616-631, 2024, doi: 10.1109/TIFS.2023.3326984. Search results (zenodo.org)

(16) J. Zhang, X. Jia and J. Hu, "SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images," in IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-15, 2022, Art no. 5612715, doi: 10.1109/TGRS.2021.3123268. Search results (zenodo.org)

(17) H. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043. Search results (zenodo.org)

(18) Q. N. Tran and J. Hu, "A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926-2940, 2021, doi: 10.1109/TIFS.2021.3069170. Search results (zenodo.org)

(19) N. N. Tran, H. R. Pota, Q. N. Tran and J. Hu, "Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9422-9435, 1 June 1, 2021, doi: 10.1109/JIOT.2021.3056649. Search results (zenodo.org)

(20) M. Shen, Y. Liu, L. Zhu, X. Du and J. Hu, "Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046-2059, 2021, doi: 10.1109/TIFS.2020.3046876. Search results (zenodo.org)

(21) Xuefei Yin, Yanming Zhu, and Jiankun Hu. 2021. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 54, 6, Article 131 (July 2021), 36 pages. https://doi.org/10.1145/3460427. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions: ACM Computing Surveys: Vol 54, No 6

(22) J. Zhang, X. Jia, J. Zhou, J. Zhang and J. Hu, "Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images," in IEEE Transactions on Image Processing, vol. 33, pp. 881-896, 2024, doi: 10.1109/TIP.2023.3336170. https://zenodo.org/search?q=%22Weakly%20Supervised%20Solar%20Panel%20Mapping%20via%22%20&l=list&p=1&s=10&sort=bestmatch.

 

 

 

View less

Location

Building 15 Room 106
School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, PO Box 7916, Canberra BC ACT 2610, AUSTRALIA

Contact

+61 2 5114 5159
+61 2 6268 8581