Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Books

Hu J; Khalil I; Tari Z, 2018, Preface

Thampi SM; Perez GM; Westphall CB; Hu J; Fan CI; Marmol FG, 2017, Preface

Naït-Abdesselam F; Hu J; Boukerche A, 2007, PPN 2007 PC co-chairs' message

Book Chapters

Yin X; Zhu Y, 2021, '3D Fingerprint', in Encyclopedia of Cryptography, Security and Privacy, Springer, Berlin, Heidelberg, http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13

Tran QN; Wang S; Ou R; Hu J, 2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170, http://dx.doi.org/10.1049/PBSE004E_ch7

Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3

Fei H; Jing Q; Huawei Z; Jiankun H, 2012, 'A General Transformation from KP-ABE to Searchable Encryption', in Cyberspace Safety and Security, Springer Berlin Heidelberg, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20

Sufi F; Khalil I; Hu J, 2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331, http://dx.doi.org/10.1007/978-3-642-04117-4_17

Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, Elsevier, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2

Hu J; Bertok P; Hamilton M; White G; Duff A; Cutts Q, 2006, 'Wireless interactive teaching by using keypad-based ARS', in Audience Response Systems in Higher Education: Applications and Cases, pp. 209 - 221, http://dx.doi.org/10.4018/978-1-59140-947-2.ch014

Journal articles

Khan M; Hartog FD; Hu J, 2024, 'Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation', Sensors, 24, http://dx.doi.org/10.3390/s24051583

Yang W; Wang S; Hu J; Tao X; Li Y, 2024, 'Feature extraction and learning approaches for cancellable biometrics: A survey', CAAI Transactions on Intelligence Technology, 9, pp. 4 - 25, http://dx.doi.org/10.1049/cit2.12283

Wu HT; Cao X; Gao Y; Zheng K; Huang J; Hu J; Tian Z, 2024, 'Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation', IEEE Transactions on Emerging Topics in Computational Intelligence, 8, pp. 313 - 326, http://dx.doi.org/10.1109/TETCI.2023.3301337

Du H; Che Z; Shen M; Zhu L; Hu J, 2024, 'Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 616 - 631, http://dx.doi.org/10.1109/TIFS.2023.3326984

Wang M; Yin X; Hu J, 2024, 'Cancellable Deep Learning Framework for EEG Biometrics', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3369405

Wu HT; Cheung YM; Tian Z; Liu D; Luo X; Hu J, 2024, 'Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3362592

Zhu X; Shen P; Dai Y; Xu L; Hu J, 2024, 'Privacy-preserving and Trusted Keyword Search for Multi-tenancy Cloud', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3377549

Sun F; Yu J; Hu J, 2024, 'Privacy-Preserving Approximate Minimum Community Search on Large Networks', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2024.3376201

Zhang J; Jia X; Zhou J; Zhang J; Hu J, 2024, 'Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images', IEEE Transactions on Image Processing, 33, pp. 881 - 896, http://dx.doi.org/10.1109/TIP.2023.3336170

Alabsi A; Hawbani A; Wang X; Dubai AA; Hu J; Aziz SA; Kumar S; Zhao L; Shvetsov AV; Alsamhi SH, 2024, 'Wireless Power Transfer Technologies, Applications, and Future Trends: A Review', IEEE Transactions on Sustainable Computing, pp. 1 - 18, http://dx.doi.org/10.1109/tsusc.2024.3380607

Li D; Chen R; Wan Q; Guan Z; Sun Y; Wu Q; Hu J; Liu J, 2023, 'Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain', IEEE Internet of Things Journal, 10, pp. 21135 - 21142, http://dx.doi.org/10.1109/JIOT.2022.3228799

Liu K; Yang K; Pu D; Han Y; Zhou Z; Hu J, 2023, '[Construction and Exploration of Simulative Virtual Curriculum of Laparoscopy for Standardized Surgical Residency Training].', Sichuan Da Xue Xue Bao Yi Xue Ban, 54, pp. 1133 - 1138, http://dx.doi.org/10.12182/20231160302

Shen W; Yu J; Yang M; Hu J, 2023, 'Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4593 - 4606, http://dx.doi.org/10.1109/TDSC.2022.3228699

Song X; Liu K; Liao X; Zhu Y; Peng B; Zhang W; Zhao L; Chen X; Yang K; Hu J, 2023, 'Clinical significance of tumor deposits in gastric cancer after radical gastrectomy: a propensity score matching study.', World J Surg Oncol, 21, pp. 325, http://dx.doi.org/10.1186/s12957-023-03208-1

Tran HY; Hu J; Pota HR, 2023, 'A Privacy-Preserving State Estimation Scheme for Smart Grids', IEEE Transactions on Dependable and Secure Computing, 20, pp. 3940 - 3956, http://dx.doi.org/10.1109/TDSC.2022.3210017

Wang M; Wang S; Hu J, 2023, 'PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4258 - 4272, http://dx.doi.org/10.1109/TDSC.2022.3218782

Zhu Y; Yin X; Hu J, 2023, 'FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 8358 - 8371, http://dx.doi.org/10.1109/TPAMI.2023.3236876

Wu HT; Cheung YM; Zhuang Z; Xu L; Hu J, 2023, 'Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing', IEEE Transactions on Cybernetics, 53, pp. 3688 - 3701, http://dx.doi.org/10.1109/TCYB.2022.3163245

Yang K; Zhang W; Chen Z; Chen X; Liu K; Zhao L; Hu J, 2023, 'Comparison of long-term quality of life between Billroth-I and Roux-en-Y anastomosis after distal gastrectomy for gastric cancer: a randomized controlled trial.', Chin Med J (Engl), 136, pp. 1074 - 1081, http://dx.doi.org/10.1097/CM9.0000000000002602

Liang Y; Xie Y; Tang S; Yu S; Liu X; Hu J, 2023, 'Network Traffic Content Identification Based on Time-Scale Signal Modeling', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2607 - 2624, http://dx.doi.org/10.1109/TDSC.2022.3186665

Song W; Jia H; Wang M; Wu Y; Xue W; Chou CT; Hu J; Hu W, 2023, 'Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration', IEEE Internet of Things Journal, 10, pp. 8155 - 8171, http://dx.doi.org/10.1109/JIOT.2022.3231381

Yin X; Wang S; Zhu Y; Hu J, 2023, 'A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications', IEEE Internet of Things Journal, 10, pp. 877 - 892, http://dx.doi.org/10.1109/JIOT.2022.3204246

Tran HY; Hu J; Yin X; Pota HR, 2023, 'An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Information Forensics and Security, 18, pp. 2538 - 2552, http://dx.doi.org/10.1109/TIFS.2023.3267892

Li D; Liu D; Ren Y; Sun Y; Guan Z; Wu Q; Hu J; Liu J, 2023, 'CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2023.3333549

Zhu Y; Wang M; Yin X; Zhang J; Meijering E; Hu J, 2023, 'Deep Learning in Diverse Intelligent Sensor Based Systems', Sensors, 23, pp. 62, http://dx.doi.org/10.3390/s23010062

Zhang P; He F; Zhang H; Hu J; Huang X; Wang J; Yin X; Zhu H; Li Y, 2023, 'Real-Time Malicious Traffic Detection with Online Isolation Forest over SD-WAN', IEEE Transactions on Information Forensics and Security, 18, pp. 2076 - 2090, http://dx.doi.org/10.1109/TIFS.2023.3262121

Yang J; He Y; Liao X; Hu J; Li K, 2023, 'Does postoperative pulmonary infection correlate with intestinal flora following gastric cancer surgery? - a nested case-control study.', Front Microbiol, 14, pp. 1267750, http://dx.doi.org/10.3389/fmicb.2023.1267750

Song X; Lan Y; Zheng X; Zhu Q; Liao X; Liu K; Zhang W; Peng Q; Zhu Y; Zhao L; Chen X; Shu Y; Yang K; Hu J, 2023, 'Targeting drug-tolerant cells: A promising strategy for overcoming acquired drug resistance in cancer cells.', MedComm (2020), 4, pp. e342, http://dx.doi.org/10.1002/mco2.342

Khan M; den Hartog F; Hu J, 2022, 'A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems', Sensors, 22, pp. 8188, http://dx.doi.org/10.3390/s22218188

Liu Y; Liu F; Wu HT; Yang J; Zheng K; Xu L; Yan X; Hu J, 2022, 'RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing', Journal of Network and Computer Applications, 207, http://dx.doi.org/10.1016/j.jnca.2022.103484

Chen J; Wu HT; Lu L; Luo X; Hu J, 2022, 'Single underwater image haze removal with a learning-based approach to blurriness estimation', Journal of Visual Communication and Image Representation, 89, http://dx.doi.org/10.1016/j.jvcir.2022.103656

Wang M; Wang S; Hu J, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2022.3204222


Back to profile page