Select Publications

Journal articles

Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency and Computation: Practice and Experience, 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810

Chen XF; Chen HN; Zhang B; Chen ZX; Hu JK; Wang F; Yang H; Chen JP, 2012, 'Clinical outcomes of surgical patients with types ii and iii adenocarcinoma of esophagogastric junction', Journal of Sichuan University (Medical Science), 43, pp. 289 - 292

Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397

Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010

Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123

Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004

Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065

Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004

Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797

Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, http://dx.doi.org/10.1109/TPDS.2012.261

Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005

Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736

Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001

Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240

Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226

Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225

Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120

Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88

Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003

Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909

Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486

Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064

Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73

Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015

Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013

Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022

Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647

Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988

Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003

Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277

Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210

Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271

Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245

Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200

Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170

Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2, pp. 1005 - 1008

Hu J; Bohn C; Wu HR, 2000, 'Systematic H weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4

Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389

Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927

Conference Papers

Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271

Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908

Zhang J; Hu J; Jia X, 2023, 'Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, http://dx.doi.org/10.1109/WHISPERS61460.2023.10430528

Song W; Wang M; Wu Y; Chou CT; Hu J; Hu W, 2022, 'Poster: Towards behavior-independent in-hand user authentication on smartphone using vibration', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 844 - 846, http://dx.doi.org/10.1145/3495243.3558257

Zhang J; Jia X; Zhou J; Hu J, 2022, 'Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 1181 - 1184, http://dx.doi.org/10.1109/IGARSS46834.2022.9884698

Zhang J; Jia X; Hu J, 2021, 'WEAKLY SUPERVISED SOLAR PANEL MAPPING USING RESIDUAL AGGREGATED NETWORK FOR AERIAL IMAGES', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 2787 - 2790, http://dx.doi.org/10.1109/IGARSS47720.2021.9555007

Zhang J; Jia X; Hu J, 2020, 'Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images', in 2020 Digital Image Computing: Techniques and Applications, DICTA 2020, Online, presented at 2020 Digital Image Computing: Techniques and Applications (DICTA), Online, 30 November 2020 - 02 December 2020, http://dx.doi.org/10.1109/DICTA51227.2020.9363379

Zhang J; Jia X; Hu J, 2020, 'Low-Rank Matrix Decomposition with Superpixel-Based Structured Sparse Regularization for Moving Object Detection in Satellite Videos', in ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pp. 941 - 948, http://dx.doi.org/10.5194/isprs-annals-V-2-2020-941-2020

Wang M; Hu J; Abbass H, 2019, 'Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity', in Australian Journal of Intelligent Information Processing Systems, Sydney, Australia, presented at 2019 - 26th International Conference on Neural Information Processing, Sydney, Australia, 12 December 2019 - 15 December 2019, http://ajiips.com.au/papers/V15.3/v15n3_23-30.pdf

Farooq A; Jia X; Hu J; Zhou J; Awan AF, 2019, 'Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, Institute of Electrical and Electronics Engineers (IEEE), NETHERLANDS, Amsterdam, pp. 01 - 05, presented at 2019 10th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS), NETHERLANDS, Amsterdam, 24 September 2019 - 26 September 2019, http://dx.doi.org/10.1109/WHISPERS.2019.8920832

Zhang J; Jia X; Hu J; Tan K, 2019, 'Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization', in 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018, http://dx.doi.org/10.1109/DICTA.2018.8615873


Back to profile page