Select Publications

Journal articles

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29

Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016

Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802

Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688

Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218

Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003

Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593

Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397

Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34

Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182

Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198

Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015

Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445

Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812

Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/352761

Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349

Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/764919

Liu K; Zhang W; Chen X; Chen X; Yang K; Zhang B; Chen Z; Zhou Z; Hu J, 2015, 'Comparison on Clinicopathological Features and Prognosis Between Esophagogastric Junctional Adenocarcinoma (Siewert II/III Types) and Distal Gastric Adenocarcinoma: Retrospective Cohort Study, a Single Institution, High Volume Experience in China', MEDICINE, 94, http://dx.doi.org/10.1097/MD.0000000000001386

Zhu H; Yang K; Hu JK, 2015, 'Gastrectomy for gastric carcinoma with situs inversus totalis: case report and literature review', HIPPOKRATIA, 19, pp. 360 - 362

Yu M; Yu J; Hu J; Huang L; Wang Y; Yin X; Nie Y; Meng X; Wang W; Liu Y, 2015, 'Identification of pathogenicity-related genes in the rice pathogen Ustilaginoidea virens through random insertional mutagenesis', FUNGAL GENETICS AND BIOLOGY, 76, pp. 10 - 19, http://dx.doi.org/10.1016/j.fgb.2015.01.004

Xu H; Xu K; Lu A; Wang X; Hu J, 2015, 'Microwave hydrothermal synthesis and white up-conversion emission of NaGd(WO4)2:(Yb3+/Tm3+/Ho3+) phosphors', JOURNAL OF MATERIALS SCIENCE-MATERIALS IN ELECTRONICS, 26, pp. 3921 - 3925, http://dx.doi.org/10.1007/s10854-015-2921-7

Xu H; Ying D; Lu A; Wang X; Hu J, 2015, 'Surfactant-assistant solvothermal synthesis of CaWO4:Eu3+ phosphors and luminescence', SUPERLATTICES AND MICROSTRUCTURES, 83, pp. 668 - 675, http://dx.doi.org/10.1016/j.spmi.2015.04.011

Liu K; Yang K; Wu B; Chen H; Chen X; Chen X; Jiang L; Ye F; He D; Lu Z; Xue L; Zhang W; Li Q; Zhou Z; Mo X; Hu J, 2015, 'Tumor-Infiltrating Immune Cells Are Associated With Prognosis of Gastric Cancer', MEDICINE, 94, http://dx.doi.org/10.1097/MD.0000000000001631

Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation: Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042

Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Hu Y; Ying M; Huang C; Wei H; Jiang Z; Peng X; Hu J; Du X; Wang B; Lin F; Xu J; Dong G; Mou T; Li G, 2014, 'Oncologic outcomes of laparoscopy-assisted gastrectomy for advanced gastric cancer: a large-scale multicenter retrospective cohort study from China', SURGICAL ENDOSCOPY AND OTHER INTERVENTIONAL TECHNIQUES, 28, pp. 2048 - 2056, http://dx.doi.org/10.1007/s00464-014-3426-9

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946

Wang S; Hu J, 2013, 'A Hadamard transform-based method for the design of cancellable fingerprint templates', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1682 - 1687, http://dx.doi.org/10.1109/CISP.2013.6743947

Yang W; Hu J; Wang S; Yang J; Shu L, 2013, 'Biometrics for securing mobile payments: Benefits, challenges and solutions', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1699 - 1704, http://dx.doi.org/10.1109/CISP.2013.6743950

Yang W; Hu J; Wang S; Yang J, 2013, 'Cancelable fingerprint templates with Delaunay triangle-based local structures', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8300 LNCS, pp. 81 - 91, http://dx.doi.org/10.1007/978-3-319-03584-0_7

Zhou W; Hu J; Petersen I; Wang S; Bennamoun M, 2013, 'Performance evaluation of 2D to 3D fingerprint recognition', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1736 - 1741, http://dx.doi.org/10.1109/CISP.2013.6743956

Xu Z; Yu X; Tari Z; Han F; Feng Y; Hu J, 2013, 'Top-k future system call prediction based multi-module anomaly detection system', Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, 3, pp. 1748 - 1753, http://dx.doi.org/10.1109/CISP.2013.6743958

Hu J; Li L; Zhang S; Gong L; Gong S, 2013, 'Novel phenyl-POSS/polyurethane aqueous dispersions and their hybrid coatings', JOURNAL OF APPLIED POLYMER SCIENCE, 130, pp. 1611 - 1620, http://dx.doi.org/10.1002/app.39303

Zhao H; Qin J; Hu J, 2013, 'An energy efficient key management scheme for body sensor networks', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 2202 - 2210, http://dx.doi.org/10.1109/TPDS.2012.320

Zhou W; Hu J; Petersen I; Bennamoun M, 2013, 'Partial fingerprint reconstruction with improved smooth extension', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7873 LNCS, pp. 756 - 762, http://dx.doi.org/10.1007/978-3-642-38631-2_67

Xie Y; Hu J; Xiang Y; Yu S; Tang S; Wang Y, 2013, 'Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1807 - 1817, http://dx.doi.org/10.1109/TPDS.2012.268

Xie Y; Hu J; Tang S; Huang , 2013, 'A forward-backward algorithm for nested hidden semi-markov model and application to network traffic', Computer Journal, 56, pp. 229 - 238, http://dx.doi.org/10.1093/comjnl/bxs124

Fei H; Jing Q; Huawei Z; Hu J, 2013, 'A general transformation from KP-ABE to searchable encryption', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Zhao H; Qin J; Shu M; Hu J, 2013, 'A hash chains based key management scheme for wireless sensor networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 296 - 308, http://dx.doi.org/10.1007/978-3-642-35362-8_23


Back to profile page