Select Publications

Books

Hu J; Khalil I; Tari Z, 2018, Preface

Book Chapters

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Awad AI; Fairhurst M (ed.), , IET

Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Khan Pathan A-S (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20

Journal articles

Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, vol. 105, pp. 107381 - 107381, http://dx.doi.org/10.1016/j.patcog.2020.107381

Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, vol. 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011

Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, vol. 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026

Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, vol. 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181

Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, vol. 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083

Su Y; Sun J; Qin J; Hu J, 2020, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3002553

Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online Structured Sparsity-Based Moving-Object Detection From Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, pp. 1 - 14, http://dx.doi.org/10.1109/tgrs.2020.2976855

Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403

Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, vol. 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, vol. 145, http://dx.doi.org/10.1016/j.jnca.2019.102411

Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, vol. 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, vol. 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004

Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), vol. 19, http://dx.doi.org/10.3390/s19132985

Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization', IEEE TRANSACTIONS ON BIG DATA, vol. 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555

Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, vol. 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, vol. 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879

Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, vol. 11, http://dx.doi.org/10.3390/sym11020141

Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, vol. 11, http://dx.doi.org/10.3390/rs11141692

Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior

Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, vol. 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011

Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, vol. 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, vol. 2018, http://dx.doi.org/10.1155/2018/5275132

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, vol. 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182

Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, vol. 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, vol. 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451

Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, vol. 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029

Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312

Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, vol. 2018, http://dx.doi.org/10.1155/2018/7107295

Shen M; Cheng G; Zhu L; Du X; Hu J, 2018, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, http://dx.doi.org/10.1016/j.future.2018.04.089

Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics, vol. 12, pp. 65, http://dx.doi.org/10.3389/fnbot.2018.00065

Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, vol. 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z

Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, vol. 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x

Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, vol. 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032

Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, vol. 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033

Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, vol. 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019

Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, vol. 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018

Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, vol. 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6

Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913


Back to profile page