Select Publications

Journal articles

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29

Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016

Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802

Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688

Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218

Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003

Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593

Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397

Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34

Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182

Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198

Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015

Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445

Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812

Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/352761

Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349

Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/764919

Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation: Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042

Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946

Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947

Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950

Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956

Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958

Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320

Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67

Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268

Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124

Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23

Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, 13, pp. 204 - 210, http://dx.doi.org/10.1002/wcm.1109

Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1401 - 1410, http://dx.doi.org/10.1109/TPDS.2012.232

Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672 LNCS

Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, 1479, pp. 1492 - 1493, http://dx.doi.org/10.1063/1.4756447

Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 83 LNICST, pp. 16 - 23, http://dx.doi.org/10.1007/978-3-642-29734-2_3

Yang K; Chen HN; Chen XZ; Lu QC; Pan L; Liu J; Dai B; Zhang B; Chen ZX; Chen JP; Hu JK, 2012, 'Transthoracic resection versus non-transthoracic resection for gastroesophageal junction cancer: A meta-analysis', PLoS ONE, 7, http://dx.doi.org/10.1371/journal.pone.0037698

Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, 55, pp. 438, http://dx.doi.org/10.1093/comjnl/bxs016

Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, 28, pp. 368 - 370, http://dx.doi.org/10.1016/j.future.2011.06.011


Back to profile page