Select Publications

Journal articles

Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73

Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015

Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013

Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022

Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647

Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988

Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003

Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277

Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210

Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271

Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245

Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200

Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170

Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2, pp. 1005 - 1008

Hu J; Bohn C; Wu HR, 2000, 'Systematic H weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4

Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389

Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927


Back to profile page