Select Publications

Conference Papers

Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271

Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908

Zhang J; Hu J; Jia X, 2023, 'Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, http://dx.doi.org/10.1109/WHISPERS61460.2023.10430528

Song W; Wang M; Wu Y; Chou CT; Hu J; Hu W, 2022, 'Poster: Towards behavior-independent in-hand user authentication on smartphone using vibration', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 844 - 846, http://dx.doi.org/10.1145/3495243.3558257

Zhang J; Jia X; Zhou J; Hu J, 2022, 'Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 1181 - 1184, http://dx.doi.org/10.1109/IGARSS46834.2022.9884698

Zhang J; Jia X; Hu J, 2021, 'WEAKLY SUPERVISED SOLAR PANEL MAPPING USING RESIDUAL AGGREGATED NETWORK FOR AERIAL IMAGES', in International Geoscience and Remote Sensing Symposium (IGARSS), pp. 2787 - 2790, http://dx.doi.org/10.1109/IGARSS47720.2021.9555007

Zhang J; Jia X; Hu J, 2020, 'Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images', in 2020 Digital Image Computing: Techniques and Applications, DICTA 2020, Online, presented at 2020 Digital Image Computing: Techniques and Applications (DICTA), Online, 30 November 2020 - 02 December 2020, http://dx.doi.org/10.1109/DICTA51227.2020.9363379

Zhang J; Jia X; Hu J, 2020, 'Low-Rank Matrix Decomposition with Superpixel-Based Structured Sparse Regularization for Moving Object Detection in Satellite Videos', in ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pp. 941 - 948, http://dx.doi.org/10.5194/isprs-annals-V-2-2020-941-2020

Wang M; Hu J; Abbass H, 2019, 'Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity', in Australian Journal of Intelligent Information Processing Systems, Sydney, Australia, presented at 2019 - 26th International Conference on Neural Information Processing, Sydney, Australia, 12 December 2019 - 15 December 2019, http://ajiips.com.au/papers/V15.3/v15n3_23-30.pdf

Farooq A; Jia X; Hu J; Zhou J; Awan AF, 2019, 'Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification', in Workshop on Hyperspectral Image and Signal Processing, Evolution in Remote Sensing, Institute of Electrical and Electronics Engineers (IEEE), NETHERLANDS, Amsterdam, pp. 01 - 05, presented at 2019 10th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS), NETHERLANDS, Amsterdam, 24 September 2019 - 26 September 2019, http://dx.doi.org/10.1109/WHISPERS.2019.8920832

Zhang J; Jia X; Hu J; Tan K, 2019, 'Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization', in 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018, http://dx.doi.org/10.1109/DICTA.2018.8615873

Farooq A; Hu J; Jia X; Awan AF, 2018, 'Weed classification in hyperspectral remote sensing images via deep convolutional neural network', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), SPAIN, Valencia, pp. 3816 - 3819, presented at IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, SPAIN, Valencia, 22 July 2018 - 27 July 2018, http://dx.doi.org/10.1109/IGARSS.2018.8518541

Zhang J; Jia X; Hu J, 2018, 'An effective zoom-in approach for detecting dim and small target proposals in satellite imagery', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Valencia, Spain, pp. 7074 - 7077, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Valencia, Spain, 22 July 2018 - 27 April 2018, http://dx.doi.org/10.1109/IGARSS.2018.8519575

Ghosh L; Konar A; Rakshit P; Parui S; Ralescu AL; Nagar AK, 2018, 'P-300 and N-400 Induced Decoding of Learning-Skill of Driving Learners Using Type-2 Fuzzy Sets', in 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, pp. 1 - 8, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/fuzz-ieee.2018.8491525

Wang M; Hu J; Abbass HA, 2018, 'Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers', in IEEE International Conference on Fuzzy Systems, IEEE, Rio de Janeiro, Brazil, presented at 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 08 July 2018 - 13 July 2018, http://dx.doi.org/10.1109/Fuzz-Ieee.2018.8491544

Nhat Tran Q; Hu J; Wang S, 2018, 'Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647290

Li F; Guo Y; Hu J, 2018, 'Quantum authentication scheme based on fingerprint-encoded graph states', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 164 - 177, http://dx.doi.org/10.1007/978-3-319-90775-8_14

Salah T; Hasan H; Zemerly MJ; Yeun CY; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'Secure Autonomous Mobile Agents for Web Services', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2018.8647435

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2017, 'State estimation for a TCP/IP network using terminal sliding-mode methodology', in Proceedings IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 6532 - 6536, http://dx.doi.org/10.1109/IECON.2017.8217138

Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812

Tian X; Shen P; Yang T; Chen C; Hu J, 2017, 'A personalized multi-keyword ranked search method over encrypted cloud data', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 66 - 78, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_6

Yin X; Zhu Y; Hu J, 2017, 'A robust contactless fingerprint enhancement algorithm', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 127 - 136, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_11

Tran NN; Sarker R; Hu J, 2017, 'An approach for host-based intrusion detection system design using convolutional neural network', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 116 - 126, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_10

Yang W; Zheng G; Ibrahim A; Chaudhry J; Wang S; Hu J; Valli C, 2017, 'Application of 3D delaunay triangulation in fingerprint authentication system', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Adelaide, pp. 291 - 298, presented at 9th International Conference, MONAMI 2017, Melbourne, Adelaide, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_23

Zhu Y; Yin X; Hu J, 2017, 'Robust fingerprint matching based on convolutional neural networks', in Hu J; Khalil I; Tari Z; Wen S (eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, Melbourne, Australia, pp. 56 - 65, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_5

Zhu Y; Yin X; Jia X; Hu J, 2017, 'Latent Fingerprint Segmentation Based on Convolutional Neural Networks', in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, presented at 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 04 December 2017 - 07 December 2017, http://dx.doi.org/10.1109/WIFS.2017.8267655

Zhang J; Jia X; Hu J, 2017, 'Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video', in 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, presented at 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Sydney, NSW, Australia, 29 November 2017 - 01 December 2017, http://dx.doi.org/10.1109/DICTA.2017.8227465

Sun J; Zhu B; Qin J; Hu J; Wu Q, 2017, 'Confidentiality-Preserving Publicly Verifiable Computation', in International Journal of Foundations of Computer Science, pp. 799 - 818, http://dx.doi.org/10.1142/S0129054117400196

Farooq A; Hu J; Jia X; Awan AF, 2017, 'Efficient object proposals extraction for target detection in VHR remote sensing images', in International Geoscience and Remote Sensing Symposium (IGARSS), Institute of Electrical and Electronics Engineers (IEEE), Fort Worth, TX, USA, pp. 3337 - 3340, presented at 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23 July 2017 - 28 July 2017, http://dx.doi.org/10.1109/IGARSS.2017.8127712

Xu J; Hu J, 2017, 'Direct feature point correspondence discovery for multiview images: An alternative solution when SIFT-based matching fails', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 147, http://dx.doi.org/10.1007/978-3-319-49580-4_13

Yang W; Hu J; Fernandes C; Sivaraman V; Wu Q, 2016, 'Vulnerability analysis of iPhone 6', in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, pp. 457 - 463, presented at 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7907000

Wang M; Abbass HA; Hu J, 2016, 'Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems', in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pp. 368 - 375, presented at Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, 12 December 2016 - 14 December 2016, http://dx.doi.org/10.1109/PST.2016.7906958

Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'Using Game Theory with Intrinsic Motivation to Examine Anti-Hacking Policies for Autonomous Systems', in Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, presented at IEEE Symposium Series on Computational Intelligence, Athens, Greece, 06 December 2016 - 09 December 2016, http://dx.doi.org/10.1109/SSCI.2016.7850035

Luo X; Ren Y; Liu J; Hu J; Liu W; Wang Z; Xu W; Wu Q, 2016, 'Identity-based group encryption', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia, pp. 87 - 102, presented at Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 04 July 2016 - 06 July 2016, http://dx.doi.org/10.1007/978-3-319-40367-0_6

Zhu Y; Hu J; Xu J, 2016, 'A robust multi-constrained model for fingerprint orientation field construction', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, China, pp. 156 - 160, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603569

Yin X; Hu J; Xu J, 2016, 'Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 144 - 149, presented at 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603567

Han F; Xu L; Yu X; Tari Z; Feng Y; Hu J, 2016, 'Sliding-mode observers for real-time DDoS detection', in Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications, ICIEA 2016, Hefei, China, pp. 825 - 830, presented at Industrial Electronics and Applications (ICIEA), 2016 IEEE 11th Conference on, Hefei, China, 05 June 2016 - 07 June 2016, http://dx.doi.org/10.1109/ICIEA.2016.7603695

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016, http://dx.doi.org/10.1109/ICIT.2016.7475043

Wang M; Abbass H; Hu J; Merrick K, 2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Nature, China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - , http://dx.doi.org/10.1007/978-3-319-49685-6_9

Haider W; Hu J; Xie M, 2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015, http://dx.doi.org/10.1109/ICIEA.2015.7334166

Li C; Hu J, 2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 312 - 316, http://dx.doi.org/10.1109/ICIEA.2015.7334131

Guo Y; Jiang F; Hu J, 2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 306 - 311, http://dx.doi.org/10.1109/ICIEA.2015.7334130

Guo Y; Hu J, 2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 284 - 289, http://dx.doi.org/10.1109/ICIEA.2015.7334126

Zhu X; Chen C; Tian X; Hu J, 2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, pp. 290 - 295, http://dx.doi.org/10.1109/ICIEA.2015.7334127

Haider W; Hu J; Yu X; Xie Y, 2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.11

Zheng H; Qin J; Hu J; Wu Q, 2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.16

Xu J; Hu J, 2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1007/978-3-319-25645-0_12

Cai X; Zhang M; Hu J; Wu Q, 2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, PEOPLES R CHINA, Zhuhai, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), PEOPLES R CHINA, Zhuhai, 30 October 2015 - 31 October 2015, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000371518700099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Xu L; Yu X; Feng Y; Han F; Hu J; Tari Z, 2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, http://dx.doi.org/10.1109/ICIT.2015.7125071

Zhao H; Xu R; Shu M; Hu J, 2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015, pp. 63 - 70, http://dx.doi.org/10.1109/ISADS.2015.13


Back to profile page