Select Publications
Conference Papers
2018, 'Weed classification in hyperspectral remote sensing images via deep convolutional neural network', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), SPAIN, Valencia, pp. 3816 - 3819, presented at IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, SPAIN, Valencia, 22 July 2018 - 27 July 2018, http://dx.doi.org/10.1109/IGARSS.2018.8518541
,2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Valencia, Spain, pp. 7074 - 7077, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July 2018 - 27 April 2018, http://dx.doi.org/10.1109/IGARSS.2018.8519575
,2018, 'P-300 and N-400 Induced Decoding of Learning-Skill of Driving Learners Using Type-2 Fuzzy Sets', in 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, pp. 1 - 8, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/fuzz-ieee.2018.8491525
,2018, 'Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers', in IEEE International Conference on Fuzzy Systems, IEEE, Rio de Janeiro, Brazil, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/Fuzz-Ieee.2018.8491544
,2018, 'Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647290
,2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177, http://dx.doi.org/10.1007/978-3-319-90775-8_14
,2018, 'Secure Autonomous Mobile Agents for Web Services', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647435
,2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536, http://dx.doi.org/10.1109/IECON.2017.8217138
,2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812
,2017, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 66 - 78, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_6
,2017, 'A robust contactless fingerprint enhancement algorithm', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 127 - 136, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_11
,2017, 'An approach for host-based intrusion detection system design using convolutional neural network', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 116 - 126, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_10
,2017, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Adelaide, pp. 291 - 298, presented at 9th International Conference, MONAMI 2017, Melbourne, Adelaide, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_23
,2017, 'Robust fingerprint matching based on convolutional neural networks', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 56 - 65, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_5
,2017, 'Latent Fingerprint Segmentation Based on Convolutional Neural Networks', in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, presented at 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 04 December 2017 - 07 December 2017, http://dx.doi.org/10.1109/WIFS.2017.8267655
,2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, presented at 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, 29 November 2017 - 01 December 2017, http://dx.doi.org/10.1109/DICTA.2017.8227465
,2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818, http://dx.doi.org/10.1142/S0129054117400196
,2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Fort Worth, TX, USA, pp. 3337 - 3340, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23 July 2017 - 28 July 2017, http://dx.doi.org/10.1109/IGARSS.2017.8127712
,2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147, http://dx.doi.org/10.1007/978-3-319-49580-4_13
,2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, pp. 457 - 463, presented at 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7907000
,2016, 'Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems', in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pp. 368 - 375, presented at Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7906958
,2016, 'Using Game Theory with Intrinsic Motivation to Examine Anti-Hacking Policies for Autonomous Systems', in Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, presented at IEEE Symposium Series on Computational Intelligence, Athens, Greece, 06 December 2016 - 09 December 2016, http://dx.doi.org/10.1109/SSCI.2016.7850035
,2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia, pp. 87 - 102, presented at Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 04 July 2016 - 06 July 2016, http://dx.doi.org/10.1007/978-3-319-40367-0_6
,2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, China, pp. 156 - 160, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603569
,2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 144 - 149, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603567
,2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 825 - 830, presented at Industrial Electronics and Applications (ICIEA), 2016 IEEE 11th Conference on, Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603695
,2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016, http://dx.doi.org/10.1109/ICIT.2016.7475043
,2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Nature, China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - , http://dx.doi.org/10.1007/978-3-319-49685-6_9
,2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015, http://dx.doi.org/10.1109/ICIEA.2015.7334166
,2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316, http://dx.doi.org/10.1109/ICIEA.2015.7334131
,2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311, http://dx.doi.org/10.1109/ICIEA.2015.7334130
,2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289, http://dx.doi.org/10.1109/ICIEA.2015.7334126
,2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295, http://dx.doi.org/10.1109/ICIEA.2015.7334127
,2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.11
,2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.16
,2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1007/978-3-319-25645-0_12
,2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, PEOPLES R CHINA, Zhuhai, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), PEOPLES R CHINA, Zhuhai, 30 October 2015 - 31 October 2015, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000371518700099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, http://dx.doi.org/10.1109/ICIT.2015.7125071
,2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70, http://dx.doi.org/10.1109/ISADS.2015.13
,2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015, http://dx.doi.org/10.1109/FSKD.2014.6980972
,2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 935 - 940, http://dx.doi.org/10.1109/FSKD.2014.6980965
,2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 941 - 946, http://dx.doi.org/10.1109/FSKD.2014.6980966
,2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, pp. 995 - 999, http://dx.doi.org/10.1109/FSKD.2014.6980975
,2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980968
,2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980974
,2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings - IEEE INFOCOM, pp. 559 - 564, http://dx.doi.org/10.1109/INFCOMW.2014.6849292
,2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 377 - 388, http://dx.doi.org/10.1007/978-3-319-11698-3_29
,2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549, http://dx.doi.org/10.1007/978-3-319-11698-3_44
,2013, 'A key management scheme between body sensor networks and the base station', in Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 743 - 747, http://dx.doi.org/10.1109/CIS.2013.162
,2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1711 - 1716, http://dx.doi.org/10.1109/CISP.2013.6743952
,