Select Publications

Journal articles

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation: Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042

Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946

Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947

Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950

Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956

Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958

Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320

Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67

Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268

Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124

Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23

Wang S; Hu J, 2013, 'Blind channel estimation for single-input multiple-output OFDM systems: Zero padding based or cyclic prefix based?', Wireless Communications and Mobile Computing, 13, pp. 204 - 210, http://dx.doi.org/10.1002/wcm.1109

Xie Y; Tang S; Xiang Y; Hu J, 2013, 'Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1401 - 1410, http://dx.doi.org/10.1109/TPDS.2012.232

Zhou W; Mueller P; Hu J, 2012, 'Message from CSS 2012 general chairs', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672 LNCS

Hu J; Jiang F, 2012, 'Preface of the "workshop on computational intelligence and cyber security"', AIP Conference Proceedings, 1479, pp. 1492 - 1493, http://dx.doi.org/10.1063/1.4756447

Yaakob N; Khalil I; Hu J, 2012, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 83 LNICST, pp. 16 - 23, http://dx.doi.org/10.1007/978-3-642-29734-2_3

Yang K; Chen HN; Chen XZ; Lu QC; Pan L; Liu J; Dai B; Zhang B; Chen ZX; Chen JP; Hu JK, 2012, 'Transthoracic resection versus non-transthoracic resection for gastroesophageal junction cancer: A meta-analysis', PLoS ONE, 7, http://dx.doi.org/10.1371/journal.pone.0037698

Tian B; Han S; Parvin S; Hu J; Das S, 2012, 'Erratum: Self-healing key distribution schemes for wireless networks: A survey (Computer Journal (2011) 54:4 (549-569) DOI: 10.1093/comjnl/bxr022)', Computer Journal, 55, pp. 438, http://dx.doi.org/10.1093/comjnl/bxs016

Zhu R; Sun Z; Hu J, 2012, 'Special section: Green computing', Future Generation Computer Systems, 28, pp. 368 - 370, http://dx.doi.org/10.1016/j.future.2011.06.011

Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency and Computation: Practice and Experience, 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810

Chen XF; Chen HN; Zhang B; Chen ZX; Hu JK; Wang F; Yang H; Chen JP, 2012, 'Clinical outcomes of surgical patients with types ii and iii adenocarcinoma of esophagogastric junction', Journal of Sichuan University (Medical Science), 43, pp. 289 - 292

Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397

Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010

Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123

Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004

Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065

Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004

Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797

Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, http://dx.doi.org/10.1109/TPDS.2012.261

Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005

Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736

Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001

Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240

Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226

Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225

Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120

Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88


Back to profile page