Select Publications

Books

Hu J; Khalil I; Tari Z, 2018, Preface

Book Chapters

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Awad AI; Fairhurst M (ed.), Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13

Tran QN; Wang S; Ou R; Hu J, 2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170, http://dx.doi.org/10.1049/PBSE004E_ch7

Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20

Sufi F; Khalil I; Hu J, 2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331, http://dx.doi.org/10.1007/978-3-642-04117-4_17

Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2

Hu J; Bertok P; Hamilton M; White G; Duff A; Cutts Q, 2006, 'Wireless Interactive Teaching by Using Keypad-Based ARS', in Audience Response Systems in Higher Education, IGI Global, pp. 209 - 221, http://dx.doi.org/10.4018/978-1-59140-947-2.ch014

Journal articles

Al Hammadi AY; Yeun CY; Damiani E; Yoo PD; Hu J; Yeun HK; Yim MS, 2021, 'Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework', Ad Hoc Networks, vol. 123, pp. 102641 - 102641, http://dx.doi.org/10.1016/j.adhoc.2021.102641

Liu M; Wu Q; Hei Y; Li D; Hu J, 2021, 'Fair and smart spectrum allocation scheme for IIoT based on blockchain', Ad Hoc Networks, vol. 123, http://dx.doi.org/10.1016/j.adhoc.2021.102686

Wu Q; Wang Q; Zhang M; Zheng R; Zhu J; Hu J, 2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, vol. 186, http://dx.doi.org/10.1016/j.jnca.2021.103077

Yin X; Zhu Y; Hu J, 2021, 'A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions', ACM Computing Surveys, vol. 54, pp. 1 - 36, http://dx.doi.org/10.1145/3460427

Sun J; Su Y; Qin J; Hu J; Ma J, 2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, vol. 9, pp. 1195 - 1209, http://dx.doi.org/10.1109/TCC.2019.2902380

Tran NN; Pota HR; Tran QN; Hu J, 2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, vol. 8, pp. 9422 - 9435, http://dx.doi.org/10.1109/JIOT.2021.3056649

Yin X; Zhu Y; Hu J, 2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/TPAMI.2019.2949299

Tran QN; Hu J, 2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170

Wu HT; Zheng Y; Zhao B; Hu J, 2021, 'An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2021.3113997

Quang NT; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve?', IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, vol. 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385

Wu HT; Zheng K; Huang Q; Hu J, 2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, vol. 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840

Shen M; Yu H; Zhu L; Xu K; Li Q; Hu J, 2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4063 - 4077, http://dx.doi.org/10.1109/TIFS.2021.3102492

Shen M; Liu Y; Zhu L; Du X; Hu J, 2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876

Fei X; Xie Y; Tang S; Hu J, 2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, vol. 173, http://dx.doi.org/10.1016/j.jnca.2020.102872

Han S; Wu Q; Zhang H; Qin B; Hu J; Shi X; Liu L; Yin X, 2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371

Zhang J; Jia X; Hu J; Tan K, 2021, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, http://dx.doi.org/10.1109/TPAMI.2021.3066696

Zhang J; Jia X; Hu J, 2021, 'SP-RAN: Self-paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labelled Aerial Images', IEEE Transactions on Geoscience and Remote Sensing, http://dx.doi.org/10.1109/TGRS.2021.3123268

Farooq A; Jia X; Hu J; Zhou J, 2021, 'Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery', IEEE Transactions on Geoscience and Remote Sensing, http://dx.doi.org/10.1109/TGRS.2021.3102243

Yin X; Zhu Y; Hu J, 2021, 'A Sub-grid-oriented Privacy-Preserving Microservice Framework based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Industrial Informatics, pp. 1 - 1, http://dx.doi.org/10.1109/tii.2021.3102332

Yin X; Zhu Y; Hu J, 2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, vol. 2, pp. 370 - 381, http://dx.doi.org/10.1109/ojcs.2021.3119572

Tran QN; Turnbull BP; Wu H-T; de Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, vol. 2, pp. 72 - 84, http://dx.doi.org/10.1109/ojcs.2021.3053032

Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, vol. 105, pp. 107381 - 107381, http://dx.doi.org/10.1016/j.patcog.2020.107381

Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, vol. 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855

Shen M; Cheng G; Zhu L; Du X; Hu J, 2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, vol. 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089

Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, vol. 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011

Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, vol. 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026

Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, vol. 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181

Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, vol. 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083

Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, 'Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation', Concurrency Computation, http://dx.doi.org/10.1002/cpe.5956

Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, vol. 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416

Su Y; Sun J; Qin J; Hu J, 2020, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3002553

Ma H; Xie Y; Tang S; Hu J; Liu X, 2020, 'Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2020.3036664

Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403

Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, vol. 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, vol. 145, http://dx.doi.org/10.1016/j.jnca.2019.102411

Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, vol. 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372


Back to profile page