Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Preprints

Yin X; Zhu Y; Xie Y; Hu J, 2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, , http://dx.doi.org/10.1109/OJCS.2022.3199755

Zhu Y; Yin X; Jia X; Hu J, 2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, , http://arxiv.org/abs/2207.00587v1

Zhu Y; Yin X; Hu J, 2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, , http://arxiv.org/abs/2206.12885v1

Yin X; Wang S; Zhu Y; Hu J, 2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, , http://dx.doi.org/10.1109/JIOT.2022.3204246

Han Y; Zheng B; Zhao L; Hu J; Zhang C; Xiao R; Wang C; Pu D, 2021, Impact of Background Music on the Performance of Laparoscopy Teams, , http://dx.doi.org/10.21203/rs.3.rs-1050433/v1

Tran NN; Pota HR; Tran QN; Hu J, 2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, , http://dx.doi.org/10.48550/arxiv.2003.05088

Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, , http://dx.doi.org/10.48550/arxiv.2003.05071

Zhang J; Jia X; Hu J; Chanussot J, 2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, , http://dx.doi.org/10.48550/arxiv.1911.12989

Zhang J; Jia X; Hu J, 2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, , http://dx.doi.org/10.48550/arxiv.1908.09539

Shen M; Liao Z; Zhu L; Mijumbi R; Du X; Hu J, 2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, , http://dx.doi.org/10.48550/arxiv.1810.03323

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, , http://dx.doi.org/10.48550/arxiv.1809.07912

Song C-X; Yin S; Ma L; Wheeler A; Chen Y; Zhang Y; Liu B; Xiong J; Zhang W; Hu J; Zhou Z; Dong B; Tian Z; Jeffrey SS; Chua M-S; So S; Li W; Wei Y; Diao J; Xie D; Quake SR, 2017, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages, , http://dx.doi.org/10.1101/162081

An S; Boussaid F; Bennamoun M; Hu J, 2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, , http://dx.doi.org/10.48550/arxiv.1703.10355


Back to profile page