Jiankun Hu

Orcid: 0000-0003-0230-1432

Affiliations:
  • University of New South Wales at the Australian Defence Force Academy, UNSW@ADFA, Canberra, ACT, Australia
  • Monash University, Computer Science and Software Engineering, Australia (former)
  • Melbourne University, Australia (1998 - 1999)
  • Delft University, The Netherlands (1997 - 1998)
  • Ruhr University, Germany (1995 - 1996)
  • Harbin Institute of Technology, Control Engineering, China (PhD 1983)


According to our database1, Jiankun Hu authored at least 304 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation.
Sensors, March, 2024

Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Feature extraction and learning approaches for cancellable biometrics: A survey.
CAAI Trans. Intell. Technol., February, 2024

Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images.
IEEE Trans. Image Process., 2024

Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
IEEE Trans. Inf. Forensics Secur., 2024

Cancellable Deep Learning Framework for EEG Biometrics.
IEEE Trans. Inf. Forensics Secur., 2024

Biometrics-Based Authenticated Key Exchange With Multi-Factor Fuzzy Extractor.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Approximate Minimum Community Search on Large Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
IEEE Trans. Inf. Forensics Secur., 2024

CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network.
IEEE Trans. Dependable Secur. Comput., 2024

A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems.
IEEE Open J. Comput. Soc., 2024

2023
FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement.
IEEE Trans. Pattern Anal. Mach. Intell., July, 2023

Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing.
IEEE Trans. Cybern., June, 2023

Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN.
IEEE Trans. Inf. Forensics Secur., 2023

An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2023

PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving State Estimation Scheme for Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Network Traffic Content Identification Based on Time-Scale Signal Modeling.
IEEE Trans. Dependable Secur. Comput., 2023

Deep Learning in Diverse Intelligent Sensor Based Systems.
Sensors, 2023

A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications.
IEEE Internet Things J., 2023

Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration.
IEEE Internet Things J., 2023

Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain.
IEEE Internet Things J., 2023

Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes.
CoRR, 2023

Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping.
Proceedings of the 13th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, 2023

Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids.
IEEE Trans. Ind. Informatics, 2022

Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2022

SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images.
IEEE Trans. Geosci. Remote. Sens., 2022

Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery.
IEEE Trans. Geosci. Remote. Sens., 2022

Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field.
IEEE Trans. Dependable Secur. Comput., 2022

Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing.
IEEE Trans. Cloud Comput., 2022

Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey.
Sensors, 2022

A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems.
Sensors, 2022

Moving Vehicle Detection for Remote Sensing Video Surveillance With Nonstationary Satellite Platform.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems.
IEEE Open J. Comput. Soc., 2022

A Review on Security Issues and Solutions of the Internet of Drones.
IEEE Open J. Comput. Soc., 2022

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.
IEEE Open J. Comput. Soc., 2022

Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images.
IEEE Geosci. Remote. Sens. Lett., 2022

Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022

RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing.
J. Netw. Comput. Appl., 2022

Shipping network optimization of port equipment components based on improved genetic algorithm.
J. Comput. Methods Sci. Eng., 2022

An IoT-Oriented Privacy-Preserving Fingerprint Authentication System.
IEEE Internet Things J., 2022

An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain.
IEEE Internet Things J., 2022

Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party.
IEEE Internet Things J., 2022

Multimedia security and privacy protection in the internet of things: research developments and challenges.
Int. J. Multim. Intell. Secur., 2022

Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications.
Future Gener. Comput. Syst., 2022

A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions.
ACM Comput. Surv., 2022

Pair-Relationship Modeling for Latent Fingerprint Recognition.
CoRR, 2022

Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation.
Concurr. Comput. Pract. Exp., 2022

Towards behavior-independent in-hand user authentication on smartphone using vibration: poster.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Towards Multi-Scale Speaking Style Modelling with Hierarchical Context Information for Mandarin Speech Synthesis.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021

A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design.
IEEE Trans. Inf. Forensics Secur., 2021

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021

Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Enhanced Locality-Sensitive Hashing for Fingerprint Forensics Over Large Multi-Sensor Databases.
IEEE Trans. Big Data, 2021

Intrinsically Motivated Hierarchical Policy Learning in Multiobjective Markov Decision Processes.
IEEE Trans. Cogn. Dev. Syst., 2021

Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility.
IEEE Signal Process. Lett., 2021

3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction.
IEEE Trans. Pattern Anal. Mach. Intell., 2021

A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions.
IEEE Open J. Comput. Soc., 2021

A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture.
IEEE Open J. Comput. Soc., 2021

Biometrics and Privacy-Preservation: How Do They Evolve?
IEEE Open J. Comput. Soc., 2021

Learned Bloom-filter for the efficient name lookup in Information-Centric Networking.
J. Netw. Comput. Appl., 2021

Identifying click-requests for the network-side through traffic behavior.
J. Netw. Comput. Appl., 2021

Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids.
IEEE Internet Things J., 2021

Fair and smart spectrum allocation scheme for IIoT based on blockchain.
Ad Hoc Networks, 2021

Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021

Controllable Emphatic Speech Synthesis based on Forward Attention for Expressive Speech Synthesis.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Weakly Supervised Solar Panel Mapping Using Residual Aggregated Network for Aerial Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2020

Online Structured Sparsity-Based Moving-Object Detection From Satellite Videos.
IEEE Trans. Geosci. Remote. Sens., 2020

Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos.
IEEE Trans. Geosci. Remote. Sens., 2020

BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs.
Pattern Recognit., 2020

Preface: Security & privacy in social big data.
J. Parallel Distributed Comput., 2020

Preserving transaction privacy in bitcoin.
Future Gener. Comput. Syst., 2020

Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020

Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids.
CoRR, 2020

A robust policy bootstrapping algorithm for multi-objective reinforcement learning in non-stationary environments.
Adapt. Behav., 2020

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020

Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images.
Proceedings of the Digital Image Computing: Techniques and Applications, 2020

2019
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram.
IEEE Trans. Ind. Informatics, 2019

Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States.
IEEE Trans. Inf. Forensics Secur., 2019

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019

Security and Accuracy of Fingerprint-Based Biometrics: A Review.
Symmetry, 2019

A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019

Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos.
Remote. Sens., 2019

Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images.
Remote. Sens., 2019

Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2019

Privacy-preserving big data analytics a comprehensive survey.
J. Parallel Distributed Comput., 2019

Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62].
J. Netw. Comput. Appl., 2019

Recognizing the content types of network traffic based on a hybrid DNN-HMM model.
J. Netw. Comput. Appl., 2019

A holistic review of Network Anomaly Detection Systems: A comprehensive survey.
J. Netw. Comput. Appl., 2019

Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity.
Aust. J. Intell. Inf. Process. Syst., 2019

Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification.
Proceedings of the 10th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, 2019

2018
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection.
Wirel. Commun. Mob. Comput., 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018

Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals.
IEEE Trans. Emerg. Top. Comput. Intell., 2018

Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018

A fingerprint and finger-vein based cancelable multi-biometric system.
Pattern Recognit., 2018

A new adaptive trust and reputation model for Mobile Agent Systems.
J. Netw. Comput. Appl., 2018

Evolving Robust Policy Coverage Sets in Multi-Objective Markov Decision Processes Through Intrinsically Motivated Self-Play.
Frontiers Neurorobotics, 2018

A novel statistical technique for intrusion detection systems.
Future Gener. Comput. Syst., 2018

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018

A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic.
Comput. Intell., 2018

Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems.
IEEE Access, 2018

An Effective Zoom-In Approach for Detecting DIM and Small Target Proposals in Satellite Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Weed Classification in Hyperspectral Remote Sensing Images Via Deep Convolutional Neural Network.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure.
Proceedings of the IEEE Global Communications Conference, 2018

Secure Autonomous Mobile Agents for Web Services.
Proceedings of the IEEE Global Communications Conference, 2018

Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization.
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018

2017
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017

Privacy-preserving identity-based file sharing in smart city.
Pers. Ubiquitous Comput., 2017

Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs.
Pattern Recognit., 2017

A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations.
Pattern Recognit., 2017

A new binary hybrid particle swarm optimization with wavelet mutation.
Knowl. Based Syst., 2017

Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Key negotiation schemes for body sensor networks on the surface of the human body.
Int. J. Auton. Adapt. Commun. Syst., 2017

Preface: Security and privacy in big data clouds.
Future Gener. Comput. Syst., 2017

From Deep to Shallow: Transformations of Deep Rectifier Networks.
CoRR, 2017

New secure healthcare system using cloud of things.
Clust. Comput., 2017

Latent fingerprint segmentation based on convolutional neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Robust Fingerprint Matching Based on Convolutional Neural Networks.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Robust Contactless Fingerprint Enhancement Algorithm.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Application of 3D Delaunay Triangulation in Fingerprint Authentication System.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Efficient object proposals extraction for target detection in VHR remote sensing images.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

State estimation for a TCP/IP network using terminal sliding-mode methodology.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video.
Proceedings of the 2017 International Conference on Digital Image Computing: Techniques and Applications, 2017

2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2016

Energy Big Data Analytics and Security: Challenges and Opportunities.
IEEE Trans. Smart Grid, 2016

An Efficient Privacy-Preserving Ranked Keyword Search Method.
IEEE Trans. Parallel Distributed Syst., 2016

On Cost-Efficient Sensor Placement for Contaminant Detection in Water Distribution Systems.
IEEE Trans. Ind. Informatics, 2016

A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
IEEE Trans. Inf. Forensics Secur., 2016

FE-SViT: A SViT-Based Fuzzy Extractor Framework.
ACM Trans. Embed. Comput. Syst., 2016

A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers.
IEEE Trans. Computers, 2016

Physiological-signal-based key negotiation protocols for body sensor networks: A survey.
Simul. Model. Pract. Theory, 2016

Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016

Security and privacy in Internet of things: methods, architectures, and solutions.
Secur. Commun. Networks, 2016

A blind system identification approach to cancelable fingerprint templates.
Pattern Recognit., 2016

A survey of network anomaly detection techniques.
J. Netw. Comput. Appl., 2016

A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios.
Future Internet, 2016

Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.
Future Internet, 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Secure searches in the cloud: A survey.
Future Gener. Comput. Syst., 2016

Partial fingerprint indexing: a combination of local and reconstructed global features.
Concurr. Comput. Pract. Exp., 2016

Privacy-Preserving Access to Big Data in the Cloud.
IEEE Cloud Comput., 2016

Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities, 2016

Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Vulnerability analysis of iPhone 6.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Continuous authentication using EEG and face images for trusted autonomous systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

A Multistaged Automatic Restoration of Noisy Microscopy Cell Images.
IEEE J. Biomed. Health Informatics, 2015

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Inf. Forensics Secur., 2015

Superpixel-Based Graphical Model for Remote Sensing Image Mapping.
IEEE Trans. Geosci. Remote. Sens., 2015

Energy Minimization in Multi-Task Software-Defined Sensor Networks.
IEEE Trans. Computers, 2015

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks.
IEEE Trans. Computers, 2015

An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks.
Sensors, 2015

Camera motion estimation through monocular normal flow vectors.
Pattern Recognit. Lett., 2015

SOLS: A scheme for outsourced location based service.
J. Netw. Comput. Appl., 2015

A Trusted Mobile Payment Scheme Based on Body Area Networks.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Collaborative Wireless Sensor Networks and Applications.
Int. J. Distributed Sens. Networks, 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015

A Cloud Security Assessment System Based on Classifying and Grading.
IEEE Cloud Comput., 2015

Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing.
Proceedings of the Network and System Security - 9th International Conference, 2015

A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection.
Proceedings of the IEEE International Conference on Industrial Technology, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Lifetime optimization for reliable broadcast and multicast in wireless <i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2014

Reliable Bulk-Data Dissemination in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Taxonomy of Attacks for Agent-Based Smart Grids.
IEEE Trans. Parallel Distributed Syst., 2014

A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement.
IEEE Trans. Inf. Forensics Secur., 2014

A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns.
IEEE Trans. Computers, 2014

An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures.
Pattern Recognit., 2014

Design of alignment-free cancelable fingerprint templates via curtailed circular convolution.
Pattern Recognit., 2014

A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Netw. Comput. Appl., 2014

Special issue on "quality of service in wireless and mobile networking".
J. Netw. Comput. Appl., 2014

A general transformation from KP-ABE to searchable encryption.
Future Gener. Comput. Syst., 2014

A New Path to Construct Parametric Orientation Field: Sparse FOMFE Model and Compressed Sparse FOMFE Model.
CoRR, 2014

A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module.
CoRR, 2014

Attacks via record multiplicity on cancelable biometrics templates.
Concurr. Comput. Pract. Exp., 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Comput., 2014

Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features.
Proceedings of the Network and System Security - 8th International Conference, 2014

Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.
Proceedings of the Network and System Security - 8th International Conference, 2014

A hierarchical clustering method for big data oriented ciphertext search.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A benchmark 3D fingerprint database.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A survey: Error control methods used in bio-cryptography.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A statistical framework for intrusion detection system.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
Wirel. Commun. Mob. Comput., 2013

An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013

Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Guest Editorial - Special Issue on Green Telecommunications.
Telecommun. Syst., 2013

A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic.
Comput. J., 2013

Cooperative multi-target tracking in passive sensor-based networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Generation of a new IDS test dataset: Time to retire the KDD collection.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Partial Fingerprint Reconstruction with Improved Smooth Extension.
Proceedings of the Network and System Security - 7th International Conference, 2013

A Finger-Vein Based Cancellable Bio-cryptosystem.
Proceedings of the Network and System Security - 7th International Conference, 2013

A hierarchical pea-based anomaly detection model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy.
IEEE Trans. Ind. Informatics, 2012

Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach.
Pattern Recognit., 2012

Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration.
J. Netw. Comput. Appl., 2012

Using incremental subspace and contour template for object tracking.
J. Netw. Comput. Appl., 2012

A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network.
J. Netw. Comput. Appl., 2012

Special section: Green computing.
Future Gener. Comput. Syst., 2012

Advances in network and system security.
Concurr. Comput. Pract. Exp., 2012

Mobile device access control: an improved correlation based face authentication scheme and its Java ME application.
Concurr. Comput. Pract. Exp., 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Simulatable Oblivious Transfer Protocols Based on Blind Signature.
Proceedings of the 11th IEEE International Conference on Trust, 2012

High-Order Terminal Sliding-Mode Observers for Anomaly Detection.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
Secur. Commun. Networks, 2011

A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Secur. Commun. Networks, 2011

An embedded DSP hardware encryption module for secure e-commerce transactions.
Secur. Commun. Networks, 2011

Biometric security for mobile computing.
Secur. Commun. Networks, 2011

Pair-polar coordinate-based cancelable fingerprint templates.
Pattern Recognit., 2011

Global Ridge Orientation Modeling for Partial Fingerprint Identification.
IEEE Trans. Pattern Anal. Mach. Intell., 2011

A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
J. Netw. Comput. Appl., 2011

A mutual-healing key distribution scheme in wireless sensor networks.
J. Netw. Comput. Appl., 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Netw. Comput. Appl., 2011

The Exploration of Network Coding in IEEE 802.15.4 Networks.
Int. J. Digit. Multim. Broadcast., 2011

A pitfall in fingerprint bio-cryptographic key generation.
Comput. Secur., 2011

Editorial: Advances in network and system security.
Comput. Secur., 2011

Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
Comput. J., 2011

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2011

Foreword from the Conference Chairs.
Proceedings of the 5th International Conference on Network and System Security, 2011

On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Bio-Cryptography.
Proceedings of the Handbook of Information and Communication Security, 2010

ECG-Based Authentication.
Proceedings of the Handbook of Information and Communication Security, 2010

Intranet Security via Firewalls.
Proceedings of the Handbook of Information and Communication Security, 2010

Network Traffic Analysis and SCADA Security.
Proceedings of the Handbook of Information and Communication Security, 2010

Host-Based Anomaly Intrusion Detection.
Proceedings of the Handbook of Information and Communication Security, 2010

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Netw. Comput. Appl., 2010

A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations.
Comput. Stand. Interfaces, 2010

Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A pitfall in fingerprint features extraction.
Proceedings of the 11th International Conference on Control, 2010

Generating cancelable biometrie templates using a projection line.
Proceedings of the 11th International Conference on Control, 2010

2009
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection.
IEEE Netw., 2009

A pixel-based scrambling scheme for digital medical images protection.
J. Netw. Comput. Appl., 2009

A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Netw. Comput. Appl., 2009

Building a SCADA Security Testbed.
Proceedings of the Third International Conference on Network and System Security, 2009

An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009

Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault.
Proceedings of IEEE International Conference on Communications, 2009

2008
Security issues in massive online games.
Secur. Commun. Networks, 2008

A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics.
Proceedings of IEEE International Conference on Communications, 2008

2007
On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields.
Appl. Math. Comput., 2007

Fingerprint images encryption via multi-scroll chaotic attractors.
Appl. Math. Comput., 2007

PPN 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems.
Proceedings of IEEE International Conference on Communications, 2007

Generation of Reliable PINs from Fingerprints.
Proceedings of IEEE International Conference on Communications, 2007

Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
A framework for distributed key management schemes in heterogeneous wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications.
Proceedings of the Advances in Biometrics, International Conference, 2006

Enhancements for RTT-Fair HighSpeed TCP.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Modelling of SACK TCP and application to the HTTP File Transfer Environment.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Robust Congestion Control for High Speed Data Networks with Uncertain Time-Variant Delays: an LMI Control Approach.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

2004
Analytic models for highspeed TCP fairness analysis.
Proceedings of the 12th IEEE International Conference on Networks, 2004

An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls.
Proceedings of the 12th IEEE International Conference on Networks, 2004

A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms.
Proceedings of the ICETE 2004, 2004

2003
A note on an analytic model for slow start in TCP.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Simulation Study of TCP Performance Over Mobile IPV4 and Mobile IPV6.
Proceedings of the ICEIS 2003, 2003

Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003

2001
DSP application in e-commerce security.
Proceedings of the IEEE International Conference on Acoustics, 2001

1999
Robust adaptive equalization using the filtered-X LMS algorithm.
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999


  Loading...