Select Publications
Journal articles
, 2025, 'Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation', ACM Transactions on Privacy and Security, http://dx.doi.org/10.1145/3772076
, 2025, 'HandID: Towards Unobtrusive Gesture-independent User Authentication on Smartphones Using Vibration-based Hand Biometrics', Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies, 9, http://dx.doi.org/10.1145/3729489
, 2025, 'A survey on resilient microgrid system from cybersecurity perspective', Applied Soft Computing, 175, http://dx.doi.org/10.1016/j.asoc.2025.113088
, 2025, 'U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition', Sensors, 25, http://dx.doi.org/10.3390/s25051384
, 2025, 'A B-Spline Function Based 3D Point Cloud Flattening Scheme for 3D Fingerprint Recognition and Identification', IEEE Open Journal of the Computer Society, 6, pp. 1587 - 1598, http://dx.doi.org/10.1109/OJCS.2025.3616334
, 2025, 'A B-Spline Function Based 3D Point Cloud Unwrapping Scheme for 3D Fingerprint Recognition and Identification', IEEE Open Journal of the Computer Society, 6, pp. 480 - 490, http://dx.doi.org/10.1109/OJCS.2025.3559975
, 2025, 'A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids', IEEE Open Journal of the Computer Society, 6, pp. 1121 - 1132, http://dx.doi.org/10.1109/OJCS.2025.3585248
, 2025, 'A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy', IEEE Transactions on Dependable and Secure Computing, 22, pp. 2741 - 2755, http://dx.doi.org/10.1109/TDSC.2024.3521423
, 2025, 'Battery SOH Prediction Under Different Conditions via MBLSTM and Itransformer With Anomaly Detection and Explainability', IEEE Open Journal of the Computer Society, http://dx.doi.org/10.1109/OJCS.2025.3625209
, 2025, 'BGN Encryption Based Lossless Data Hiding by Random Number Replacement and Partitioning', IEEE Transactions on Dependable and Secure Computing, 22, pp. 8043 - 8055, http://dx.doi.org/10.1109/TDSC.2025.3603618
, 2025, 'Light-Weight Graph Matching Query over Encrypted Graphs', IEEE Transactions on Dependable and Secure Computing, 22, pp. 5170 - 5185, http://dx.doi.org/10.1109/TDSC.2025.3563396
, 2025, 'Optimized Block Ordering for DAG-Based Distributed Ledgers', IEEE Open Journal of the Computer Society, 6, pp. 1637 - 1648, http://dx.doi.org/10.1109/OJCS.2025.3616348
, 2025, 'Privacy-Preserving Closest Similar Community Search on Attributed Graphs', IEEE Transactions on Information Forensics and Security, 20, pp. 6662 - 6677, http://dx.doi.org/10.1109/TIFS.2025.3583247
, 2025, 'UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems', IEEE Open Journal of the Computer Society, 6, pp. 543 - 553, http://dx.doi.org/10.1109/OJCS.2025.3564266
, 2025, 'Wireless Power Transfer Technologies, Applications, and Future Trends: A Review', IEEE Transactions on Sustainable Computing, 10, pp. 1 - 17, http://dx.doi.org/10.1109/TSUSC.2024.3380607
, 2025, 'Atezolizumab and Trastuzumab Plus Chemotherapy for ERBB2-Positive Locally Advanced Resectable Gastric Cancer: A Randomized Clinical Trial', JAMA ONCOLOGY, 11, pp. 619 - 624, http://dx.doi.org/10.1001/jamaoncol.2025.0522
, 2024, 'Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation', Sensors, 24, http://dx.doi.org/10.3390/s24051583
, 2024, 'Feature extraction and learning approaches for cancellable biometrics: A survey', Caai Transactions on Intelligence Technology, 9, pp. 4 - 25, http://dx.doi.org/10.1049/cit2.12283
, 2024, 'Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation', IEEE Transactions on Emerging Topics in Computational Intelligence, 8, pp. 313 - 326, http://dx.doi.org/10.1109/TETCI.2023.3301337
, 2024, 'A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems', IEEE Open Journal of the Computer Society, 5, pp. 511 - 529, http://dx.doi.org/10.1109/OJCS.2024.3461808
, 2024, 'Analyzing temporal coherence for deepfake video detection', Electronic Research Archive, 32, pp. 2621 - 2641, http://dx.doi.org/10.3934/ERA.2024119
, 2024, 'Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor', IEEE Transactions on Information Forensics and Security, 19, pp. 9344 - 9358, http://dx.doi.org/10.1109/TIFS.2024.3468624
, 2024, 'Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning', IEEE Transactions on Information Forensics and Security, 19, pp. 616 - 631, http://dx.doi.org/10.1109/TIFS.2023.3326984
, 2024, 'Cancellable Deep Learning Framework for EEG Biometrics', IEEE Transactions on Information Forensics and Security, 19, pp. 3745 - 3757, http://dx.doi.org/10.1109/TIFS.2024.3369405
, 2024, 'CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network', IEEE Transactions on Dependable and Secure Computing, 21, pp. 3487 - 3500, http://dx.doi.org/10.1109/TDSC.2023.3333549
, 2024, 'GHOSTForge: A Scalable Consensus Mechanism for DAG-Based Blockchains', IEEE Open Journal of the Computer Society, 5, pp. 736 - 747, http://dx.doi.org/10.1109/OJCS.2024.3497892
, 2024, 'Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation', IEEE Transactions on Information Forensics and Security, 19, pp. 3719 - 3732, http://dx.doi.org/10.1109/TIFS.2024.3362592
, 2024, 'Preface', Lecture Notes in Networks and Systems, 966 LNNS, pp. xi - xii
, 2024, 'Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud', IEEE Transactions on Information Forensics and Security, 19, pp. 4316 - 4330, http://dx.doi.org/10.1109/TIFS.2024.3377549
, 2024, 'Privacy-Preserving Approximate Minimum Community Search on Large Networks', IEEE Transactions on Information Forensics and Security, 19, pp. 4146 - 4160, http://dx.doi.org/10.1109/TIFS.2024.3376201
, 2024, 'Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments', IEEE Transactions on Information Forensics and Security, 19, pp. 10099 - 10113, http://dx.doi.org/10.1109/TIFS.2024.3409935
, 2024, 'Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images', IEEE Transactions on Image Processing, 33, pp. 881 - 896, http://dx.doi.org/10.1109/TIP.2023.3336170
, 2024, 'Ferroptosis at the nexus of metabolism and metabolic diseases', THERANOSTICS, 14, pp. 5826 - 5852, http://dx.doi.org/10.7150/thno.100080
, 2023, 'Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain', IEEE Internet of Things Journal, 10, pp. 21135 - 21142, http://dx.doi.org/10.1109/JIOT.2022.3228799
, 2023, 'Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4593 - 4606, http://dx.doi.org/10.1109/TDSC.2022.3228699
, 2023, 'A Privacy-Preserving State Estimation Scheme for Smart Grids', IEEE Transactions on Dependable and Secure Computing, 20, pp. 3940 - 3956, http://dx.doi.org/10.1109/TDSC.2022.3210017
, 2023, 'PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4258 - 4272, http://dx.doi.org/10.1109/TDSC.2022.3218782
, 2023, 'FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 8358 - 8371, http://dx.doi.org/10.1109/TPAMI.2023.3236876
, 2023, 'Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing', IEEE Transactions on Cybernetics, 53, pp. 3688 - 3701, http://dx.doi.org/10.1109/TCYB.2022.3163245
, 2023, 'Network Traffic Content Identification Based on Time-Scale Signal Modeling', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2607 - 2624, http://dx.doi.org/10.1109/TDSC.2022.3186665
, 2023, 'Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration', IEEE Internet of Things Journal, 10, pp. 8155 - 8171, http://dx.doi.org/10.1109/JIOT.2022.3231381
, 2023, 'A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications', IEEE Internet of Things Journal, 10, pp. 877 - 892, http://dx.doi.org/10.1109/JIOT.2022.3204246
, 2023, 'An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Information Forensics and Security, 18, pp. 2538 - 2552, http://dx.doi.org/10.1109/TIFS.2023.3267892
, 2023, 'Deep Learning in Diverse Intelligent Sensor Based Systems', Sensors, 23, pp. 62, http://dx.doi.org/10.3390/s23010062
, 2023, 'Real-Time Malicious Traffic Detection with Online Isolation Forest over SD-WAN', IEEE Transactions on Information Forensics and Security, 18, pp. 2076 - 2090, http://dx.doi.org/10.1109/TIFS.2023.3262121
, 2022, 'A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems', Sensors, 22, pp. 8188, http://dx.doi.org/10.3390/s22218188
, 2022, 'RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing', Journal of Network and Computer Applications, 207, http://dx.doi.org/10.1016/j.jnca.2022.103484
, 2022, 'Single underwater image haze removal with a learning-based approach to blurriness estimation', Journal of Visual Communication and Image Representation, 89, http://dx.doi.org/10.1016/j.jvcir.2022.103656
, 2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2022.3204222
, 2022, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, 44, pp. 5185 - 5198, http://dx.doi.org/10.1109/TPAMI.2021.3066696