Select Publications

Journal articles

Wu Q; Wang Q; Zhang M; Zheng R; Zhu J; Hu J, 2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, 186, http://dx.doi.org/10.1016/j.jnca.2021.103077

Yin X; Zhu Y; Hu J, 2021, 'A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions', ACM Computing Surveys, 54, http://dx.doi.org/10.1145/3460427

Sun J; Su Y; Qin J; Hu J; Ma J, 2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, 9, pp. 1195 - 1209, http://dx.doi.org/10.1109/TCC.2019.2902380

Tran NN; Pota HR; Tran QN; Hu J, 2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, 8, pp. 9422 - 9435, http://dx.doi.org/10.1109/JIOT.2021.3056649

Yin X; Zhu Y; Hu J, 2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/TPAMI.2019.2949299

Tran QN; Hu J, 2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170

Yin X; Zhu Y; Hu J, 2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, 2, pp. 370 - 381, http://dx.doi.org/10.1109/OJCS.2021.3119572

Tran QN; Turnbull BP; Wu HT; De Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032

Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385

Wu HT; Zheng K; Huang Q; Hu J, 2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840

Shen W; Qin J; Yu J; Hao R; Hu J; Ma J, 2021, 'Data Integrity Auditing without Private Key Storage for Secure Cloud Storage', IEEE Transactions on Cloud Computing, 9, pp. 1408 - 1421, http://dx.doi.org/10.1109/TCC.2019.2921553

Shen M; Yu H; Zhu L; Xu K; Li Q; Hu J, 2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, 16, pp. 4063 - 4077, http://dx.doi.org/10.1109/TIFS.2021.3102492

Shen M; Liu Y; Zhu L; Du X; Hu J, 2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876

Fei X; Xie Y; Tang S; Hu J, 2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, 173, http://dx.doi.org/10.1016/j.jnca.2020.102872

Han S; Wu Q; Zhang H; Qin B; Hu J; Shi X; Liu L; Yin X, 2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371

Wang M; Hu J; Abbass HA, 2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, 105, http://dx.doi.org/10.1016/j.patcog.2020.107381

Zhang J; Jia X; Hu J; Chanussot J, 2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855

Shen M; Cheng G; Zhu L; Du X; Hu J, 2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089

Liu Q; Bhuiyan MZA; Hu J; Wu J, 2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011

Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026

Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181

Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083

Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416

Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403

Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145, http://dx.doi.org/10.1016/j.jnca.2019.102411

Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004

Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors (Switzerland), 19, http://dx.doi.org/10.3390/s19132985

Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555

Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879

Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141

Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692

Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Abdelfattah S; Kasmarik K; Hu J, 2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273, http://dx.doi.org/10.1109/TCDS.2019.2948025

Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011

Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182

Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451

Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029

Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312

Zhang Y; Hu W; Xu W; Chou CT; Hu J, 2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410

Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018, http://dx.doi.org/10.1155/2018/7107295


Back to profile page