Select Publications
Journal articles
, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630
, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566
, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488
, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, PP, http://dx.doi.org/10.1109/TIFS.2016.2603961
, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, 15, pp. 1 - 24, http://dx.doi.org/10.1145/2930669
, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003
, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107
, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, 8, http://dx.doi.org/10.3390/fi8030034
, 2016, 'Comparison of survival outcomes between transthoracic and transabdominal surgical approaches in patients with Siewert-II/III esophagogastric junction adenocarcinoma: a single-institution retrospective cohort study', CHINESE JOURNAL OF CANCER RESEARCH, 28, pp. 413 - 422, http://dx.doi.org/10.21147/j.issn.1000-9604.2016.04.04
, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29
, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016
, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802
, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688
, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218
, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003
, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593
, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397
, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34
, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182
, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198
, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015
, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445
, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812
, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/352761
, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349
, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/764919
, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002
, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53
, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488
, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927
, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042
, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003
, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247
, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095
, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004
, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001
, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221
, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301
, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13
, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946
, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947
, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950
, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7
, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956
, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958
, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320
, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67
, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268
, 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124
, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14