Select Publications
Journal articles
2021, 'Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102641
,2021, 'Fair and smart spectrum allocation scheme for IIoT based on blockchain', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102686
,2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, 186, http://dx.doi.org/10.1016/j.jnca.2021.103077
,2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, 9, pp. 1195 - 1209, http://dx.doi.org/10.1109/TCC.2019.2902380
,2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, 8, pp. 9422 - 9435, http://dx.doi.org/10.1109/JIOT.2021.3056649
,2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/tpami.2019.2949299
,2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170
,2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, 2, pp. 370 - 381, http://dx.doi.org/10.1109/OJCS.2021.3119572
,2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032
,2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385
,2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840
,2021, 'Data Integrity Auditing without Private Key Storage for Secure Cloud Storage', IEEE Transactions on Cloud Computing, 9, pp. 1408 - 1421, http://dx.doi.org/10.1109/TCC.2019.2921553
,2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, 16, pp. 4063 - 4077, http://dx.doi.org/10.1109/TIFS.2021.3102492
,2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876
,2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, 173, http://dx.doi.org/10.1016/j.jnca.2020.102872
,2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371
,2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, 105, http://dx.doi.org/10.1016/j.patcog.2020.107381
,2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855
,2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089
,2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011
,2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026
,2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181
,2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083
,2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416
,2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403
,2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007
,2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145, http://dx.doi.org/10.1016/j.jnca.2019.102411
,2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372
,2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004
,2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), 19, http://dx.doi.org/10.3390/s19132985
,2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555
,2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665
,2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
,2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879
,2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141
,2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692
,2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313
,2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
,2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273, http://dx.doi.org/10.1109/TCDS.2019.2948025
,2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011
,2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177
,2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
,2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132
,2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
,2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182
,2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026
,2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451
,2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029
,2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312
,2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410
,