Jiankun Hu
Orcid: 0000-0003-0230-1432Affiliations:
- University of New South Wales at the Australian Defence Force Academy, UNSW@ADFA, Canberra, ACT, Australia
- Monash University, Computer Science and Software Engineering, Australia (former)
- Melbourne University, Australia (1998 - 1999)
- Delft University, The Netherlands (1997 - 1998)
- Ruhr University, Germany (1995 - 1996)
- Harbin Institute of Technology, Control Engineering, China (PhD 1983)
According to our database1,
Jiankun Hu
authored at least 304 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation.
Sensors, March, 2024
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
CAAI Trans. Intell. Technol., February, 2024
Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images.
IEEE Trans. Image Process., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Open J. Comput. Soc., 2024
2023
FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement.
IEEE Trans. Pattern Anal. Mach. Intell., July, 2023
IEEE Trans. Cybern., June, 2023
IEEE Trans. Inf. Forensics Secur., 2023
An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications.
IEEE Internet Things J., 2023
Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes.
CoRR, 2023
Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping.
Proceedings of the 13th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, 2023
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems.
Proceedings of the IEEE International Conference on Communications, 2023
2022
A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids.
IEEE Trans. Ind. Informatics, 2022
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2022
SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images.
IEEE Trans. Geosci. Remote. Sens., 2022
IEEE Trans. Geosci. Remote. Sens., 2022
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field.
IEEE Trans. Dependable Secur. Comput., 2022
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing.
IEEE Trans. Cloud Comput., 2022
Sensors, 2022
A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems.
Sensors, 2022
Moving Vehicle Detection for Remote Sensing Video Surveillance With Nonstationary Satellite Platform.
IEEE Trans. Pattern Anal. Mach. Intell., 2022
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems.
IEEE Open J. Comput. Soc., 2022
IEEE Open J. Comput. Soc., 2022
A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.
IEEE Open J. Comput. Soc., 2022
Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images.
IEEE Geosci. Remote. Sens. Lett., 2022
Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022
RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing.
J. Netw. Comput. Appl., 2022
Shipping network optimization of port equipment components based on improved genetic algorithm.
J. Comput. Methods Sci. Eng., 2022
IEEE Internet Things J., 2022
An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain.
IEEE Internet Things J., 2022
Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party.
IEEE Internet Things J., 2022
Multimedia security and privacy protection in the internet of things: research developments and challenges.
Int. J. Multim. Intell. Secur., 2022
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications.
Future Gener. Comput. Syst., 2022
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions.
ACM Comput. Surv., 2022
Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation.
Concurr. Comput. Pract. Exp., 2022
Towards behavior-independent in-hand user authentication on smartphone using vibration: poster.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Towards Multi-Scale Speaking Style Modelling with Hierarchical Context Information for Mandarin Speech Synthesis.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022
Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022
2021
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021
IEEE Trans. Cloud Comput., 2021
Enhanced Locality-Sensitive Hashing for Fingerprint Forensics Over Large Multi-Sensor Databases.
IEEE Trans. Big Data, 2021
Intrinsically Motivated Hierarchical Policy Learning in Multiobjective Markov Decision Processes.
IEEE Trans. Cogn. Dev. Syst., 2021
IEEE Signal Process. Lett., 2021
3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction.
IEEE Trans. Pattern Anal. Mach. Intell., 2021
A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions.
IEEE Open J. Comput. Soc., 2021
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture.
IEEE Open J. Comput. Soc., 2021
IEEE Open J. Comput. Soc., 2021
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking.
J. Netw. Comput. Appl., 2021
J. Netw. Comput. Appl., 2021
Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids.
IEEE Internet Things J., 2021
Ad Hoc Networks, 2021
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021
Controllable Emphatic Speech Synthesis based on Forward Attention for Expressive Speech Synthesis.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021
Weakly Supervised Solar Panel Mapping Using Residual Aggregated Network for Aerial Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021
2020
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Geosci. Remote. Sens., 2020
Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos.
IEEE Trans. Geosci. Remote. Sens., 2020
BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs.
Pattern Recognit., 2020
J. Parallel Distributed Comput., 2020
Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020
Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids.
CoRR, 2020
A robust policy bootstrapping algorithm for multi-objective reinforcement learning in non-stationary environments.
Adapt. Behav., 2020
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020
Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images.
Proceedings of the Digital Image Computing: Techniques and Applications, 2020
2019
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram.
IEEE Trans. Ind. Informatics, 2019
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States.
IEEE Trans. Inf. Forensics Secur., 2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019
Remote. Sens., 2019
Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images.
Remote. Sens., 2019
Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2019
J. Parallel Distributed Comput., 2019
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62].
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity.
Aust. J. Intell. Inf. Process. Syst., 2019
Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification.
Proceedings of the 10th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Emerg. Top. Comput. Intell., 2018
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018
Pattern Recognit., 2018
J. Netw. Comput. Appl., 2018
Evolving Robust Policy Coverage Sets in Multi-Objective Markov Decision Processes Through Intrinsically Motivated Self-Play.
Frontiers Neurorobotics, 2018
Future Gener. Comput. Syst., 2018
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018
A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic.
Comput. Intell., 2018
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018
IEEE Access, 2018
An Effective Zoom-In Approach for Detecting DIM and Small Target Proposals in Satellite Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
Weed Classification in Hyperspectral Remote Sensing Images Via Deep Convolutional Neural Network.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization.
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018
2017
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Soft Comput., 2017
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Pattern Recognit., 2017
A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations.
Pattern Recognit., 2017
Knowl. Based Syst., 2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Int. J. Found. Comput. Sci., 2017
Int. J. Auton. Adapt. Commun. Syst., 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Efficient object proposals extraction for target detection in VHR remote sensing images.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video.
Proceedings of the 2017 International Conference on Digital Image Computing: Techniques and Applications, 2017
2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2016
IEEE Trans. Smart Grid, 2016
IEEE Trans. Parallel Distributed Syst., 2016
On Cost-Efficient Sensor Placement for Contaminant Detection in Water Distribution Systems.
IEEE Trans. Ind. Informatics, 2016
A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
IEEE Trans. Inf. Forensics Secur., 2016
ACM Trans. Embed. Comput. Syst., 2016
A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers.
IEEE Trans. Computers, 2016
Physiological-signal-based key negotiation protocols for body sensor networks: A survey.
Simul. Model. Pract. Theory, 2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Pattern Recognit., 2016
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios.
Future Internet, 2016
Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.
Future Internet, 2016
Future Gener. Comput. Syst., 2016
Partial fingerprint indexing: a combination of local and reconstructed global features.
Concurr. Comput. Pract. Exp., 2016
Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities, 2016
Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks.
Proceedings of the IEEE International Conference on Industrial Technology, 2016
Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE J. Biomed. Health Informatics, 2015
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Geosci. Remote. Sens., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks.
IEEE Trans. Computers, 2015
Sensors, 2015
Pattern Recognit. Lett., 2015
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
Int. J. Distributed Sens. Networks, 2015
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015
IEEE Cloud Comput., 2015
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the IEEE International Conference on Industrial Technology, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Lifetime optimization for reliable broadcast and multicast in wireless <i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement.
IEEE Trans. Inf. Forensics Secur., 2014
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns.
IEEE Trans. Computers, 2014
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures.
Pattern Recognit., 2014
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution.
Pattern Recognit., 2014
A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Netw. Comput. Appl., 2014
J. Netw. Comput. Appl., 2014
Future Gener. Comput. Syst., 2014
A New Path to Construct Parametric Orientation Field: Sparse FOMFE Model and Compressed Sparse FOMFE Model.
CoRR, 2014
A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module.
CoRR, 2014
Concurr. Comput. Pract. Exp., 2014
IEEE Cloud Comput., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
2013
Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
Wirel. Commun. Mob. Comput., 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic.
Comput. J., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy.
IEEE Trans. Ind. Informatics, 2012
Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach.
Pattern Recognit., 2012
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration.
J. Netw. Comput. Appl., 2012
J. Netw. Comput. Appl., 2012
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network.
J. Netw. Comput. Appl., 2012
Mobile device access control: an improved correlation based face authentication scheme and its Java ME application.
Concurr. Comput. Pract. Exp., 2012
Comput. J., 2012
Comput. J., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
Secur. Commun. Networks, 2011
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
Pattern Recognit., 2011
IEEE Trans. Pattern Anal. Mach. Intell., 2011
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
J. Netw. Comput. Appl., 2011
J. Netw. Comput. Appl., 2011
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Netw. Comput. Appl., 2011
Int. J. Digit. Multim. Broadcast., 2011
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
Comput. J., 2011
Comput. J., 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Information and Communication Security, 2010
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Netw. Comput. Appl., 2010
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations.
Comput. Stand. Interfaces, 2010
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 11th International Conference on Control, 2010
Proceedings of the 11th International Conference on Control, 2010
2009
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection.
IEEE Netw., 2009
J. Netw. Comput. Appl., 2009
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Netw. Comput. Appl., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault.
Proceedings of IEEE International Conference on Communications, 2009
2008
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics.
Proceedings of IEEE International Conference on Communications, 2008
2007
IEEE Trans. Circuits Syst. II Express Briefs, 2007
A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing.
IEEE Trans. Pattern Anal. Mach. Intell., 2007
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields.
Appl. Math. Comput., 2007
Appl. Math. Comput., 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007
2006
A framework for distributed key management schemes in heterogeneous wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation.
Proceedings of the Computational Intelligence and Bioinformatics, 2006
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications.
Proceedings of the Advances in Biometrics, International Conference, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Robust Congestion Control for High Speed Data Networks with Uncertain Time-Variant Delays: an LMI Control Approach.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005
2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls.
Proceedings of the 12th IEEE International Conference on Networks, 2004
A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms.
Proceedings of the ICETE 2004, 2004
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Simulation Study of TCP Performance Over Mobile IPV4 and Mobile IPV6.
Proceedings of the ICEIS 2003, 2003
Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003
2001
Proceedings of the IEEE International Conference on Acoustics, 2001
1999
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999