Select Publications


Tran NN; Pota HR; Tran QN; Hu J, 2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids

Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation

Shen M; Liao Z; Zhu L; Mijumbi R; Du X; Hu J, 2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

An S; Boussaid F; Bennamoun M; Hu J, 2017, From Deep to Shallow: Transformations of Deep Rectifier Networks

Song C-X; Yin S; Ma L; Wheeler A; Chen Y; Zhang Y; Liu B; Xiong J; Zhang W; Hu J; Zhou Z; Dong B; Tian Z; Jeffrey SS; Chua M-S; So S; Li W; Wei Y; Diao J; Xie D; Quake SR, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages,

Back to profile page