Select Publications

Conference Papers

Xie M; Hu J; Slay J, 2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015, http://dx.doi.org/10.1109/FSKD.2014.6980972

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940, http://dx.doi.org/10.1109/FSKD.2014.6980965

Kabir ME; Hu J, 2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946, http://dx.doi.org/10.1109/FSKD.2014.6980966

Yang W; Hu J; Wang S, 2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999, http://dx.doi.org/10.1109/FSKD.2014.6980975

Hu J; Pieprzyk J; Gardiyawasam Pussewalage H, 2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980968

Chen C; Wang C; Yang T; Lin D; Wang S; Hu J, 2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980974

Chen C; Zhu X; Shen P; Hu J, 2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564, http://dx.doi.org/10.1109/INFCOMW.2014.6849292

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388, http://dx.doi.org/10.1007/978-3-319-11698-3_29

Xie M; Hu J; Yu X; Chang E, 2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549, http://dx.doi.org/10.1007/978-3-319-11698-3_44

Zhao H; Shu M; Qin J; Hu J, 2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747, http://dx.doi.org/10.1109/CIS.2013.162

Xie M; Hu J, 2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716, http://dx.doi.org/10.1109/CISP.2013.6743952

Xu J; Hu J; Jia X, 2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729, http://dx.doi.org/10.1109/CISP.2013.6743954

Jiang F; Hu J, 2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345, http://dx.doi.org/10.1109/WCNC.2013.6555276

Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301

Xu Z; Yu X; Feng Y; Hu J; Tari Z; Han F, 2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381, http://dx.doi.org/10.1109/ICIEA.2013.6566581

Yang W; Hu J; Wang S, 2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013, http://dx.doi.org/10.1007/978-3-642-38631-2_71

Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012, http://dx.doi.org/10.1007/978-3-642-31588-6_64

Yang W; Hu J; Stojmenovic M, 2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012, http://dx.doi.org/10.1109/ICIEA.2012.6360846

Yang W; Hu J; Wang S, 2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.23

Tran QA; Jiang F; Hu J, 2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.51

Zhao H; Hu J; Qin J; Varadharajan V; Wan H, 2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.171

Xie M; Hu J; Tian B, 2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.173

Qin J; Hu J; Zhao H, 2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.263

Feng Y; Han F; Yu X; Tari Z; Li L; Hu J, 2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011

Jiang F; Frater M; Hu J, 2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011, http://dx.doi.org/10.1109/DASC.2011.46

Di Vimercati SDC; Samarati P; Foresti S; Hu J, 2011, 'Foreword from the conference chairs', in Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, http://dx.doi.org/10.1109/ICNSS.2011.6059949

Yaakob N; Khalil I; Hu J, 2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011

Xi K; Hu J; Han F, 2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975740

Han F; Hu J; Alkhathami M; Xi K, 2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975739

Han F; Feng Y; Alzahrani NS; Xi K; Hu J, 2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975591

Ahmad T; Hu J; Wang S, 2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975738

Xiang Y; Samarati P; Hu J, 2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, http://dx.doi.org/10.1109/NSS.2010.5

Raffe W; Hu J; Zambetta F; Xi K, 2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000293666000066&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Park JH; Yang LT; Zeadally S; Woungang I; Kawsar F; Jeong YS; Cerqueira E; Fowler S; Zhang Z; Chao HC; Phillips I; Hu J; Taniar D; Chen JL; Huang R; Makki K; Falowo O; Hunt R; Mehmood R; Chan P; Iftikha M; Gasparakis J; Martinez G; Kamel I; Law E; Mihovska A; Moustafa H; Huang TC; Landfeldt B; Anagnostopoulos I; Chilamkurti N; Chang YC; Wu TY; Wang RC; Yen YS; Chang SY; Huang S; Wu HC; Ferworn A; Zhang Y; Stefanos Gritzalis S; Fernando X; Anpalagan A; Singh A; Ding JW; Zhou L; Hussain M; Wang WC; Kwak J; Chang CC; Martinelli F; Pan G; Sun HM; Forne J; Bergmann N; Belli F; Sarker BK; Biswas J; Sauveron D; Pedreiras P; Crespi N; Shyu ML; Tabata T; Cong-Vinh P; Chen LJ; Deng DJ; Zhang B; Zheng J; Geilen M; Iqbal R; Villano U; Ali S; Shun CT; Naureen A, 2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, http://dx.doi.org/10.1109/FUTURETECH.2010.5482638

Xi K; Hu J, 2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, PEOPLES R CHINA, Xian, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, PEOPLES R CHINA, Xian, 25 May 2009 - 27 May 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000273183200122&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Yeo SS; Hu J, 2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, pp. 11, http://dx.doi.org/10.1109/CSA.2008.5

Hu J, 2005, 'H-infinity design for a sonar-platform', in TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, IEEE, AUSTRALIA, Melbourne, pp. 2163 - 2168, presented at IEEE Region 10 Conference (TENCON 2005), AUSTRALIA, Melbourne, 21 November 2005 - 24 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000246608903103&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Phillips D; Hu JK, 2005, 'Modelling of SACK TCP and application to the HTTP file transfer environment', in LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, IEEE COMPUTER SOC, AUSTRALIA, Sydney, pp. 515 - 516, presented at 30th Annual IEEE Conference on Local Computer Networks, AUSTRALIA, Sydney, 15 November 2005 - 17 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000235161300080&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Hoang XD; Hu J; Bertok P, 2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346

Phillips D; Hu J, 2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231

Hu J; Wu HR; Chou CT; Verhaegen M; Westwick D; Nijsse G, 1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530

Hu J; Wu HR; Chou CT; Verhaegen M, 1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179

Hu J; Bohn C; Wu HR, 1999, 'Practical H weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924

Hu J; Wu HR, 1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, http://dx.doi.org/10.1109/ISSPA.1999.818201

Hu J; Unbehauen H; Bohn C, 1996, 'Practical approach to selecting weighting functions for H control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003

ZHANG GF; WANG GX; HU JK, 1993, 'CONJUGATION AND H-INFINITY-CONTROL OF DISCRETE-TIME-SYSTEMS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 467 - 470, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00113&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

HU JK; WANG GX; ZHANG GF; LI DP, 1993, 'ROBUST PERFORMANCE CONTROL AND ANALYSIS OF ILL-CONDITIONED PLANTS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 238 - 240, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

ZHANG GF; WANG GX; HU JK, 1993, 'SIMPLIFYING DISCRETE-TIME H-INFINITY CONTROL', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 471 - 473, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00114&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1


Back to profile page