default search action
Jiankun Hu
Person information
- affiliation: University of New South Wales at the Australian Defence Force Academy, UNSW@ADFA, Canberra, ACT, Australia
- affiliation (former): Monash University, Computer Science and Software Engineering, Australia
- affiliation (1998 - 1999): Melbourne University, Australia
- affiliation (1997 - 1998): Delft University, The Netherlands
- affiliation (1995 - 1996): Ruhr University, Germany
- affiliation (PhD 1983): Harbin Institute of Technology, Control Engineering, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j200]Wencheng Yang, Song Wang, Jiankun Hu, Xiaohui Tao, Yan Li:
Feature extraction and learning approaches for cancellable biometrics: A survey. CAAI Trans. Intell. Technol. 9(1): 4-25 (2024) - [j199]Yomna Mokhtar Ibrahim, Shabnam Kasra Kermanshahi, Kathryn Kasmarik, Jiankun Hu:
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems. IEEE Open J. Comput. Soc. 5: 511-529 (2024) - [j198]Misbah Khan, Frank T. H. den Hartog, Jiankun Hu:
Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation. Sensors 24(5): 1583 (2024) - [j197]Dawei Li, Di Liu, Yangkun Ren, Yu Sun, Zhenyu Guan, Qianhong Wu, Jiankun Hu, Jianwei Liu:
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network. IEEE Trans. Dependable Secur. Comput. 21(4): 3487-3500 (2024) - [j196]Hao-Tian Wu, Xin Cao, Ying Gao, Kaihan Zheng, Jiwu Huang, Jiankun Hu, Zhihong Tian:
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 313-326 (2024) - [j195]Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, Jiankun Hu:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. IEEE Trans. Inf. Forensics Secur. 19: 616-631 (2024) - [j194]Hao-Tian Wu, Yiu-Ming Cheung, Zhihong Tian, Dingcai Liu, Xiangyang Luo, Jiankun Hu:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. IEEE Trans. Inf. Forensics Secur. 19: 3719-3732 (2024) - [j193]Min Wang, Xuefei Yin, Jiankun Hu:
Cancellable Deep Learning Framework for EEG Biometrics. IEEE Trans. Inf. Forensics Secur. 19: 3745-3757 (2024) - [j192]Fangyuan Sun, Jia Yu, Jiankun Hu:
Privacy-Preserving Approximate Minimum Community Search on Large Networks. IEEE Trans. Inf. Forensics Secur. 19: 4146-4160 (2024) - [j191]Xiaojie Zhu, Peisong Shen, Yueyue Dai, Lei Xu, Jiankun Hu:
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud. IEEE Trans. Inf. Forensics Secur. 19: 4316-4330 (2024) - [j190]Hong-Yen Tran, Jiankun Hu, Wen Hu:
Biometrics-Based Authenticated Key Exchange With Multi-Factor Fuzzy Extractor. IEEE Trans. Inf. Forensics Secur. 19: 9344-9358 (2024) - [j189]Jue Zhang, Xiuping Jia, Jun Zhou, Junpeng Zhang, Jiankun Hu:
Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images. IEEE Trans. Image Process. 33: 881-896 (2024) - [i19]Hong-Yen Tran, Jiankun Hu, Wen Hu:
Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor. CoRR abs/2405.11456 (2024) - 2023
- [j188]Xuefei Yin, Song Wang, Yanming Zhu, Jiankun Hu:
A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications. IEEE Internet Things J. 10(1): 877-892 (2023) - [j187]Wei Song, Hong Jia, Min Wang, Yuezhong Wu, Wanli Xue, Chun Tung Chou, Jiankun Hu, Wen Hu:
Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration. IEEE Internet Things J. 10(9, May 1): 8155-8171 (2023) - [j186]Dawei Li, Ruonan Chen, Qinjun Wan, Zhenyu Guan, Yu Sun, Qianhong Wu, Jiankun Hu, Jianwei Liu:
Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain. IEEE Internet Things J. 10(24): 21135-21142 (2023) - [j185]Yanming Zhu, Xuefei Yin, Jiankun Hu:
FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement. IEEE Trans. Pattern Anal. Mach. Intell. 45(7): 8358-8371 (2023) - [j184]Yanming Zhu, Min Wang, Xuefei Yin, Jue Zhang, Erik Meijering, Jiankun Hu:
Deep Learning in Diverse Intelligent Sensor Based Systems. Sensors 23(1): 62 (2023) - [j183]Hao-Tian Wu, Yiu-Ming Cheung, Zhenwei Zhuang, Lingling Xu, Jiankun Hu:
Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing. IEEE Trans. Cybern. 53(6): 3688-3701 (2023) - [j182]Yu Liang, Yi Xie, Shensheng Tang, Shunzheng Yu, Xingcheng Liu, Jiankun Hu:
Network Traffic Content Identification Based on Time-Scale Signal Modeling. IEEE Trans. Dependable Secur. Comput. 20(3): 2607-2624 (2023) - [j181]Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota:
A Privacy-Preserving State Estimation Scheme for Smart Grids. IEEE Trans. Dependable Secur. Comput. 20(5): 3940-3956 (2023) - [j180]Min Wang, Song Wang, Jiankun Hu:
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System. IEEE Trans. Dependable Secur. Comput. 20(5): 4258-4272 (2023) - [j179]Wenting Shen, Jia Yu, Ming Yang, Jiankun Hu:
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(6): 4593-4606 (2023) - [j178]Pei Zhang, Fangzhou He, Han Zhang, Jiankun Hu, Xiaohong Huang, Jilong Wang, Xia Yin, Huahong Zhu, Yahui Li:
Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN. IEEE Trans. Inf. Forensics Secur. 18: 2076-2090 (2023) - [j177]Hong-Yen Tran, Jiankun Hu, Xuefei Yin, Hemanshu R. Pota:
An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids. IEEE Trans. Inf. Forensics Secur. 18: 2538-2552 (2023) - [c93]Ahmed S. Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Jiankun Hu, Sanjay K. Jha:
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems. SmartGridComm 2023: 1-6 - [c92]Jue Zhang, Jiankun Hu, Xiuping Jia:
Learning Discriminative Features with Attention Based Dual-Stream Decoder for Weakly Supervised Solar Panel Mapping. WHISPERS 2023: 1-5 - [i18]Sherif M. Abdelfattah, Kathryn E. Merrick, Jiankun Hu:
Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes. CoRR abs/2308.09733 (2023) - [i17]Sherif M. Abdelfattah, Kathryn E. Kasmarik, Jiankun Hu:
A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments. CoRR abs/2308.09734 (2023) - 2022
- [j176]Nam Nhat Tran, Hemanshu Roy Pota, Quang Nhat Tran, Xuefei Yin, Jiankun Hu:
Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j175]Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 54(6): 131:1-131:36 (2022) - [j174]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j173]Wencheng Yang, Song Wang, Jiankun Hu, Nickson M. Karie:
Multimedia security and privacy protection in the internet of things: research developments and challenges. Int. J. Multim. Intell. Secur. 4(1): 20-46 (2022) - [j172]Hao-Tian Wu, Yucong Zheng, Bowen Zhao, Jiankun Hu:
An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain. IEEE Internet Things J. 9(9): 6956-6968 (2022) - [j171]Xuefei Yin, Song Wang, Muhammad Shahzad, Jiankun Hu:
An IoT-Oriented Privacy-Preserving Fingerprint Authentication System. IEEE Internet Things J. 9(14): 11760-11771 (2022) - [j170]Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota:
Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party. IEEE Internet Things J. 9(17): 16080-16095 (2022) - [j169]Huaidong Li, Jiankun Hu, Bangyu Tong:
Shipping network optimization of port equipment components based on improved genetic algorithm. J. Comput. Methods Sci. Eng. 22(5): 1583-1590 (2022) - [j168]Yuxian Liu, Fagui Liu, Hao-Tian Wu, Jingfeng Yang, Kaihong Zheng, Lingling Xu, Xingfu Yan, Jiankun Hu:
RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing. J. Netw. Comput. Appl. 207: 103484 (2022) - [j167]Jian Chen, Hao-Tian Wu, Lu Lu, Xiangyang Luo, Jiankun Hu:
Single underwater image haze removal with a learning-based approach to blurriness estimation. J. Vis. Commun. Image Represent. 89: 103656 (2022) - [j166]Jue Zhang, Xiuping Jia, Jiankun Hu:
Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j165]Quang Nhat Tran, Benjamin P. Turnbull, Min Wang, Jiankun Hu:
A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol. IEEE Open J. Comput. Soc. 3: 1-10 (2022) - [j164]Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, Jiankun Hu:
A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open J. Comput. Soc. 3: 96-110 (2022) - [j163]Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu:
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems. IEEE Open J. Comput. Soc. 3: 149-161 (2022) - [j162]Junpeng Zhang, Xiuping Jia, Jiankun Hu, Kun Tan:
Moving Vehicle Detection for Remote Sensing Video Surveillance With Nonstationary Satellite Platform. IEEE Trans. Pattern Anal. Mach. Intell. 44(9): 5185-5198 (2022) - [j161]Min Wang, Xuefei Yin, Yanming Zhu, Jiankun Hu:
Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey. Sensors 22(14): 5111 (2022) - [j160]Misbah Khan, Frank T. H. den Hartog, Jiankun Hu:
A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems. Sensors 22(21): 8188 (2022) - [j159]Ye Su, Jiameng Sun, Jing Qin, Jiankun Hu:
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing. IEEE Trans. Cloud Comput. 10(3): 2050-2065 (2022) - [j158]Haishou Ma, Yi Xie, Shensheng Tang, Jiankun Hu, Xingcheng Liu:
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field. IEEE Trans. Dependable Secur. Comput. 19(3): 1735-1752 (2022) - [j157]Adnan Farooq, Xiuping Jia, Jiankun Hu, Jun Zhou:
Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery. IEEE Trans. Geosci. Remote. Sens. 60: 1-16 (2022) - [j156]Jue Zhang, Xiuping Jia, Jiankun Hu:
SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images. IEEE Trans. Geosci. Remote. Sens. 60: 1-15 (2022) - [j155]Min Wang, Song Wang, Jiankun Hu:
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems. IEEE Trans. Inf. Forensics Secur. 17: 3350-3364 (2022) - [j154]Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids. IEEE Trans. Ind. Informatics 18(3): 1957-1967 (2022) - [c91]Jue Zhang, Xiuping Jia, Jun Zhou, Jiankun Hu:
Learning Uncertainty-Aware Label Transition for Weakly Supervised Solar Panel Mapping with Aerial Images. IGARSS 2022: 1181-1184 - [c90]Shun Lei, Yixuan Zhou, Liyang Chen, Jiankun Hu, Zhiyong Wu, Shiyin Kang, Helen Meng:
Towards Multi-Scale Speaking Style Modelling with Hierarchical Context Information for Mandarin Speech Synthesis. INTERSPEECH 2022: 5523-5527 - [c89]Wei Song, Min Wang, Yuezhong Wu, Chun Tung Chou, Jiankun Hu, Wen Hu:
Towards behavior-independent in-hand user authentication on smartphone using vibration: poster. MobiCom 2022: 844-846 - [i16]Min Wang, Song Wang, Jiankun Hu:
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems. CoRR abs/2203.16730 (2022) - [i15]Shun Lei, Yixuan Zhou, Liyang Chen, Jiankun Hu, Zhiyong Wu, Shiyin Kang, Helen Meng:
Towards Multi-Scale Speaking Style Modelling with Hierarchical Context Information for Mandarin Speech Synthesis. CoRR abs/2204.02743 (2022) - [i14]Xuefei Yin, Song Wang, Yanming Zhu, Jiankun Hu:
A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications. CoRR abs/2206.12864 (2022) - [i13]Yanming Zhu, Xuefei Yin, Jiankun Hu:
FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement. CoRR abs/2206.12885 (2022) - [i12]Yanming Zhu, Xuefei Yin, Xiuping Jia, Jiankun Hu:
Pair-Relationship Modeling for Latent Fingerprint Recognition. CoRR abs/2207.00587 (2022) - [i11]Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu:
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems. CoRR abs/2207.10805 (2022) - 2021
- [j153]Ahmed Y. Al Hammadi, Chan Yeob Yeun, Ernesto Damiani, Paul D. Yoo, Jiankun Hu, Hyun Ku Yeun, Man-Sung Yim:
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework. Ad Hoc Networks 123: 102641 (2021) - [j152]Mengjiang Liu, Qianhong Wu, Yiming Hei, Dawei Li, Jiankun Hu:
Fair and smart spectrum allocation scheme for IIoT based on blockchain. Ad Hoc Networks 123: 102686 (2021) - [j151]Nam Nhat Tran, Hemanshu Roy Pota, Quang Nhat Tran, Jiankun Hu:
Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids. IEEE Internet Things J. 8(11): 9422-9435 (2021) - [j150]Xingrui Fei, Yi Xie, Shensheng Tang, Jiankun Hu:
Identifying click-requests for the network-side through traffic behavior. J. Netw. Comput. Appl. 173: 102872 (2021) - [j149]Qingtao Wu, Qianyu Wang, Mingchuan Zhang, Ruijuan Zheng, Junlong Zhu, Jiankun Hu:
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking. J. Netw. Comput. Appl. 186: 103077 (2021) - [j148]Quang Nhat Tran, Benjamin P. Turnbull, Hao-Tian Wu, A. J. S. de Silva, Katerina Kormusheva, Jiankun Hu:
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. IEEE Open J. Comput. Soc. 2: 72-84 (2021) - [j147]Quang Nhat Tran, Benjamin P. Turnbull, Jiankun Hu:
Biometrics and Privacy-Preservation: How Do They Evolve? IEEE Open J. Comput. Soc. 2: 179-191 (2021) - [j146]Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions. IEEE Open J. Comput. Soc. 2: 370-381 (2021) - [j145]Xuefei Yin, Yanming Zhu, Jiankun Hu:
3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction. IEEE Trans. Pattern Anal. Mach. Intell. 43(3): 1085-1091 (2021) - [j144]Hao-Tian Wu, Kaihan Zheng, Qi Huang, Jiankun Hu:
Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility. IEEE Signal Process. Lett. 28: 160-164 (2021) - [j143]Sherif M. Abdelfattah, Kathryn E. Merrick, Jiankun Hu:
Intrinsically Motivated Hierarchical Policy Learning in Multiobjective Markov Decision Processes. IEEE Trans. Cogn. Dev. Syst. 13(2): 262-273 (2021) - [j142]Wei Zhou, Jiankun Hu, Song Wang:
Enhanced Locality-Sensitive Hashing for Fingerprint Forensics Over Large Multi-Sensor Databases. IEEE Trans. Big Data 7(4): 759-769 (2021) - [j141]Jiameng Sun, Ye Su, Jing Qin, Jiankun Hu, Jixin Ma:
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT. IEEE Trans. Cloud Comput. 9(3): 1195-1209 (2021) - [j140]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [j139]Meng Shen, Yiting Liu, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic. IEEE Trans. Inf. Forensics Secur. 16: 2046-2059 (2021) - [j138]Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin, Jiankun Hu, Xingang Shi, Linfeng Liu, Xia Yin:
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning. IEEE Trans. Inf. Forensics Secur. 16: 2300-2311 (2021) - [j137]Quang Nhat Tran, Jiankun Hu:
A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design. IEEE Trans. Inf. Forensics Secur. 16: 2926-2940 (2021) - [j136]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 4063-4077 (2021) - [j135]Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil:
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems. IEEE Trans. Sustain. Comput. 6(1): 66-79 (2021) - [c88]Jue Zhang, Xiuping Jia, Jiankun Hu:
Weakly Supervised Solar Panel Mapping Using Residual Aggregated Network for Aerial Images. IGARSS 2021: 2787-2790 - [c87]Liangqi Liu, Jiankun Hu, Zhiyong Wu, Song Yang, Songfan Yang, Jia Jia, Helen Meng:
Controllable Emphatic Speech Synthesis based on Forward Attention for Expressive Speech Synthesis. SLT 2021: 410-414 - [d1]Ahmed Alhammadi, Chan Yeob Yeun, Ernesto Damiani, Paul D. Yoo, Jiankun Hu, Hyun Ku Yeun, Man-Sung Yim:
EEG Brainwave Dataset. IEEE DataPort, 2021 - 2020
- [j134]Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin:
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access 8: 145033-145036 (2020) - [j133]Sherif M. Abdelfattah, Kathryn Kasmarik, Jiankun Hu:
A robust policy bootstrapping algorithm for multi-objective reinforcement learning in non-stationary environments. Adapt. Behav. 28(4) (2020) - [j132]Qin Wang, Bo Qin, Jiankun Hu, Fu Xiao:
Preserving transaction privacy in bitcoin. Future Gener. Comput. Syst. 107: 793-804 (2020) - [j131]Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109: 621-632 (2020) - [j130]Qin Liu, Md. Zakirul Alam Bhuiyan, Jiankun Hu, Jie Wu:
Preface: Security & privacy in social big data. J. Parallel Distributed Comput. 141: 59-60 (2020) - [j129]Min Wang, Jiankun Hu, Hussein A. Abbass:
BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs. Pattern Recognit. 105: 107381 (2020) - [j128]Junpeng Zhang, Xiuping Jia, Jiankun Hu:
Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos. IEEE Trans. Geosci. Remote. Sens. 58(4): 2659-2669 (2020) - [j127]Junpeng Zhang, Xiuping Jia, Jiankun Hu, Jocelyn Chanussot:
Online Structured Sparsity-Based Moving-Object Detection From Satellite Videos. IEEE Trans. Geosci. Remote. Sens. 58(9): 6420-6433 (2020) - [j126]Xuefei Yin, Yanming Zhu, Jiankun Hu:
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm. IEEE Trans. Inf. Forensics Secur. 15: 28-41 (2020) - [c86]Jue Zhang, Xiuping Jia, Jiankun Hu:
Pseudo Supervised Solar Panel Mapping based on Deep Convolutional Networks with Label Correction Strategy in Aerial Images. DICTA 2020: 1-8 - [i10]Nam Nhat Tran, Hemanshu Roy Pota, Quang Nhat Tran, Xuefei Yin, Jiankun Hu:
Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation. CoRR abs/2003.05071 (2020) - [i9]Nam Nhat Tran, Hemanshu Roy Pota, Quang Nhat Tran, Jiankun Hu:
Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids. CoRR abs/2003.05088 (2020)
2010 – 2019
- 2019
- [j125]Min Wang, Jiankun Hu, Hussein A. Abbass:
Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity. Aust. J. Intell. Inf. Process. Syst. 15(3): 19-26 (2019) - [j124]Nour Moustafa, Jiankun Hu, Jill Slay:
A holistic review of Network Anomaly Detection Systems: A comprehensive survey. J. Netw. Comput. Appl. 128: 33-55 (2019) - [j123]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Recognizing the content types of network traffic based on a hybrid DNN-HMM model. J. Netw. Comput. Appl. 142: 51-62 (2019) - [j122]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62]. J. Netw. Comput. Appl. 145 (2019) - [j121]Hong-Yen Tran, Jiankun Hu:
Privacy-preserving big data analytics a comprehensive survey. J. Parallel Distributed Comput. 134: 207-218 (2019) - [j120]Adnan Farooq, Jiankun Hu, Xiuping Jia:
Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network. IEEE Geosci. Remote. Sens. Lett. 16(2): 183-187 (2019) - [j119]Adnan Farooq, Xiuping Jia, Jiankun Hu, Jun Zhou:
Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images. Remote. Sens. 11(14): 1692 (2019) - [j118]Junpeng Zhang, Xiuping Jia, Jiankun Hu:
Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos. Remote. Sens. 11(20): 2372 (2019) - [j117]Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone, Craig Valli:
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors 19(13): 2985 (2019) - [j116]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Craig Valli:
Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry 11(2): 141 (2019) - [j115]Waqas Haider, Jiankun Hu, Yi Xie, Xinghuo Yu, Qianhong Wu:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. IEEE Trans. Big Data 5(3): 305-316 (2019) - [j114]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - [j113]Min Wang, Heba El-Fiqi, Jiankun Hu, Hussein A. Abbass:
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States. IEEE Trans. Inf. Forensics Secur. 14(12): 3259-3272 (2019) - [j112]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Jucheng Yang, Craig Valli:
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram. IEEE Trans. Ind. Informatics 15(7): 4244-4253 (2019) - [c85]Adnan Farooq, Xiuping Jia, Jiankun Hu, Jun Zhou:
Knowledge Transfer via Convolution Neural Networks for Multi-Resolution Lawn Weed Classification. WHISPERS 2019: 1-5 - [i8]Junpeng Zhang, Xiuping Jia, Jiankun Hu:
Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos. CoRR abs/1908.09539 (2019) - [i7]Junpeng Zhang, Xiuping Jia, Jiankun Hu, Jocelyn Chanussot:
Online Structured Sparsity-based Moving Object Detection from Satellite Videos. CoRR abs/1911.12989 (2019) - 2018
- [j111]Nour Moustafa, Erwin Adi, Benjamin P. Turnbull, Jiankun Hu:
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access 6: 32910-32924 (2018) - [j110]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Ahsenali Chaudhry, Erwin Adi, Craig Valli:
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. IEEE Access 6: 36939-36947 (2018) - [j109]Jinwei Xu, Jiankun Hu, Xiuping Jia:
A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic. Comput. Intell. 34(4): 1178-1198 (2018) - [j108]Md. Enamul Kabir, Jiankun Hu, Hua Wang, Guangping Zhuo:
A novel statistical technique for intrusion detection systems. Future Gener. Comput. Syst. 79: 303-318 (2018) - [j107]Sherif M. Abdelfattah, Kathryn Kasmarik, Jiankun Hu:
Evolving Robust Policy Coverage Sets in Multi-Objective Markov Decision Processes Through Intrinsically Motivated Self-Play. Frontiers Neurorobotics 12: 65 (2018) - [j106]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
A new adaptive trust and reputation model for Mobile Agent Systems. J. Netw. Comput. Appl. 124: 33-43 (2018) - [j105]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Craig Valli:
A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit. 78: 242-251 (2018) - [j104]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Jixin Ma:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. Secur. Commun. Networks 2018: 5275132:1-5275132:15 (2018) - [j103]Min Wang, Sherif M. Abdelfattah, Nour Moustafa, Jiankun Hu:
Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals. IEEE Trans. Emerg. Top. Comput. Intell. 2(4): 278-287 (2018) - [j102]Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940-953 (2018) - [j101]Wencheng Yang, Jiankun Hu, Song Wang, Qianhong Wu:
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection. Wirel. Commun. Mob. Comput. 2018: 7107295:1-7107295:17 (2018) - [c84]Junpeng Zhang, Xiuping Jia, Jiankun Hu, Kun Tan:
Satellite Multi-Vehicle Tracking under Inconsistent Detection Conditions by Bilevel K-Shortest Paths Optimization. DICTA 2018: 1-8 - [c83]Min Wang, Jiankun Hu, Hussein A. Abbass:
Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers. FUZZ-IEEE 2018: 1-8 - [c82]Tasneem Salah, Haya Hasan, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
Secure Autonomous Mobile Agents for Web Services. GLOBECOM 2018: 1-6 - [c81]Quang Nhat Tran, Jiankun Hu, Song Wang:
Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure. GLOBECOM 2018: 1-6 - [c80]Adnan Farooq, Jiankun Hu, Xiuping Jia:
Weed Classification in Hyperspectral Remote Sensing Images Via Deep Convolutional Neural Network. IGARSS 2018: 3816-3819 - [c79]Junpeng Zhang, Xiuping Jia, Jiankun Hu:
An Effective Zoom-In Approach for Detecting DIM and Small Target Proposals in Satellite Imagery. IGARSS 2018: 7074-7077 - [e6]Jiankun Hu, Ibrahim Khalil, Zahir Tari, Sheng Wen:
Mobile Networks and Management - 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 235, Springer 2018, ISBN 978-3-319-90774-1 [contents] - [i6]Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. CoRR abs/1809.07912 (2018) - [i5]Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation. CoRR abs/1809.08433 (2018) - [i4]Meng Shen, Zelin Liao, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks. CoRR abs/1810.03323 (2018) - 2017
- [j100]Ebrahim Al Alkeem, Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Jiankun Hu:
New secure healthcare system using cloud of things. Clust. Comput. 20(3): 2211-2229 (2017) - [j99]Qin Liu, Avinash Srinivasan, Jiankun Hu, Guojun Wang:
Preface: Security and privacy in big data clouds. Future Gener. Comput. Syst. 72: 206-207 (2017) - [j98]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
Key negotiation schemes for body sensor networks on the surface of the human body. Int. J. Auton. Adapt. Commun. Syst. 10(1): 55-66 (2017) - [j97]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. Int. J. Found. Comput. Sci. 28(6): 799-818 (2017) - [j96]Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, Jiankun Hu:
Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 177:1-177:22 (2017) - [j95]Waqas Haider, Jiankun Hu, Jill Slay, Benjamin P. Turnbull, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87: 185-192 (2017) - [j94]Frank Jiang, Haiying Xia, Quang-Anh Tran, Quang Minh Ha, Nhat-Quang Tran, Jiankun Hu:
A new binary hybrid particle swarm optimization with wavelet mutation. Knowl. Based Syst. 130: 90-101 (2017) - [j93]Song Wang, Guang Deng, Jiankun Hu:
A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit. 61: 447-458 (2017) - [j92]Song Wang, Wencheng Yang, Jiankun Hu:
Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs. Pattern Recognit. 66: 295-301 (2017) - [j91]Xiling Luo, Yili Ren, Jiankun Hu, Qianhong Wu, Jungang Lou:
Privacy-preserving identity-based file sharing in smart city. Pers. Ubiquitous Comput. 21(5): 923-936 (2017) - [j90]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Ernesto Damiani, Jiankun Hu:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. Secur. Commun. Networks 2017: 3606424:1-3606424:18 (2017) - [j89]Qianhong Wu, Xiuwen Zhou, Bo Qin, Jiankun Hu, Jianwei Liu, Yong Ding:
Secure joint Bitcoin trading with partially blind fuzzy signatures. Soft Comput. 21(11): 3123-3134 (2017) - [j88]Miao Xie, Jiankun Hu, Song Guo, Albert Y. Zomaya:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 12(1): 101-110 (2017) - [j87]Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. IEEE Trans. Inf. Forensics Secur. 12(4): 940-952 (2017) - [c78]Junpeng Zhang, Xiuping Jia, Jiankun Hu:
Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video. DICTA 2017: 1-7 - [c77]Long Xu, Xinghuo Yu, Yong Feng, Fengling Han, Jiankun Hu, Zahir Tari:
State estimation for a TCP/IP network using terminal sliding-mode methodology. IECON 2017: 6532-6536 - [c76]Adnan Farooq, Jiankun Hu, Xiuping Jia:
Efficient object proposals extraction for target detection in VHR remote sensing images. IGARSS 2017: 3337-3340 - [c75]Yanming Zhu, Xuefei Yin, Jiankun Hu:
Robust Fingerprint Matching Based on Convolutional Neural Networks. MONAMI 2017: 56-65 - [c74]Xue Tian, Peisong Shen, Tengfei Yang, Chi Chen, Jiankun Hu:
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. MONAMI 2017: 66-78 - [c73]Nam Nhat Tran, Ruhul A. Sarker, Jiankun Hu:
An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network. MONAMI 2017: 116-126 - [c72]Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Robust Contactless Fingerprint Enhancement Algorithm. MONAMI 2017: 127-136 - [c71]Waqas Haider, Jiankun Hu, Nour Moustafa:
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning. MONAMI 2017: 137-149 - [c70]Fei Li, Ying Guo, Jiankun Hu:
Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States. MONAMI 2017: 164-177 - [c69]Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang, Jiankun Hu, Craig Valli:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. MONAMI 2017: 291-298 - [c68]Yanming Zhu, Xuefei Yin, Xiuping Jia, Jiankun Hu:
Latent fingerprint segmentation based on convolutional neural networks. WIFS 2017: 1-6 - [e5]Sabu M. Thampi, Gregorio Martínez Pérez, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, Félix Gómez Mármol:
Security in Computing and Communications - 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings. Communications in Computer and Information Science 746, Springer 2017, ISBN 978-981-10-6897-3 [contents] - [i3]Senjian An, Farid Boussaïd, Mohammed Bennamoun, Jiankun Hu:
From Deep to Shallow: Transformations of Deep Rectifier Networks. CoRR abs/1703.10355 (2017) - 2016
- [j86]Peng Li, Song Guo, Toshiaki Miyazaki, Miao Xie, Jiankun Hu, Weihua Zhuang:
Privacy-Preserving Access to Big Data in the Cloud. IEEE Cloud Comput. 3(5): 34-42 (2016) - [j85]Wei Zhou, Jiankun Hu, Song Wang, Ian R. Petersen, Mohammed Bennamoun:
Partial fingerprint indexing: a combination of local and reconstructed global features. Concurr. Comput. Pract. Exp. 28(10): 2940-2957 (2016) - [j84]Fei Han, Jing Qin, Jiankun Hu:
Secure searches in the cloud: A survey. Future Gener. Comput. Syst. 62: 66-75 (2016) - [j83]Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu, Weiran Liu, Jianwei Liu, Yong Ding:
Batch Public Key Cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62: 196-204 (2016) - [j82]Waqas Haider, Gideon Creech, Yi Xie, Jiankun Hu:
Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks. Future Internet 8(3): 29 (2016) - [j81]Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu:
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios. Future Internet 8(3): 34 (2016) - [j80]Mohiuddin Ahmed, Abdun Naser Mahmood, Jiankun Hu:
A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60: 19-31 (2016) - [j79]Song Wang, Jiankun Hu:
A blind system identification approach to cancelable fingerprint templates. Pattern Recognit. 54: 14-22 (2016) - [j78]Guangjie Han, Lei Shu, Sammy Chan, Jiankun Hu:
Security and privacy in Internet of things: methods, architectures, and solutions. Secur. Commun. Networks 9(15): 2641-2642 (2016) - [j77]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Networks 9(18): 4914-4923 (2016) - [j76]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-signal-based key negotiation protocols for body sensor networks: A survey. Simul. Model. Pract. Theory 65: 32-44 (2016) - [j75]Lin Gu, Deze Zeng, Song Guo, Yong Xiang, Jiankun Hu:
A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers. IEEE Trans. Computers 65(1): 19-29 (2016) - [j74]Kai Xi, Jiankun Hu, B. V. K. Vijaya Kumar:
FE-SViT: A SViT-Based Fuzzy Extractor Framework. ACM Trans. Embed. Comput. Syst. 15(4): 78:1-78:24 (2016) - [j73]Cai Li, Jiankun Hu:
A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures. IEEE Trans. Inf. Forensics Secur. 11(3): 543-555 (2016) - [j72]Deze Zeng, Lin Gu, Lu Lian, Song Guo, Hong Yao, Jiankun Hu:
On Cost-Efficient Sensor Placement for Contaminant Detection in Water Distribution Systems. IEEE Trans. Ind. Informatics 12(6): 2177-2185 (2016) - [j71]Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Zahir Tari, Albert Y. Zomaya:
An Efficient Privacy-Preserving Ranked Keyword Search Method. IEEE Trans. Parallel Distributed Syst. 27(4): 951-963 (2016) - [j70]Jiankun Hu, Athanasios V. Vasilakos:
Energy Big Data Analytics and Security: Challenges and Opportunities. IEEE Trans. Smart Grid 7(5): 2423-2436 (2016) - [j69]Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman, Ibrahim Habib, Jiankun Hu:
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks. Wirel. Commun. Mob. Comput. 16(1): 59-78 (2016) - [c67]Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - [c66]Min Wang, Hussein A. Abbass, Jiankun Hu, Kathryn E. Merrick:
Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks. BICS 2016: 90-101 - [c65]Long Xu, Xinghuo Yu, Yong Feng, Fengling Han, Jiankun Hu, Zahir Tari:
Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks. ICIT 2016: 1832-1837 - [c64]Min Wang, Hussein A. Abbass, Jiankun Hu:
Continuous authentication using EEG and face images for trusted autonomous systems. PST 2016: 368-375 - [c63]Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu:
Vulnerability analysis of iPhone 6. PST 2016: 457-463 - [c62]Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu:
Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems. SSCI 2016: 1-8 - [c61]Jinwei Xu, Jiankun Hu:
Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails. TRIDENTCOM 2016: 137-147 - 2015
- [j68]Xuexiu Chen, Chi Chen, Yuan Tao, Jiankun Hu:
A Cloud Security Assessment System Based on Classifying and Grading. IEEE Cloud Comput. 2(2): 58-67 (2015) - [j67]Rongbo Zhu, Maode Ma, Yan Zhang, Jiankun Hu:
Collaborative Wireless Sensor Networks and Applications. Int. J. Distributed Sens. Networks 11: 352761:1-352761:2 (2015) - [j66]Huawei Zhao, Chi Chen, Jiankun Hu, Jing Qin:
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption. Int. J. Distributed Sens. Networks 11: 764919:1-764919:11 (2015) - [j65]Huawei Zhao, Jiankun Hu:
A Trusted Mobile Payment Scheme Based on Body Area Networks. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(2): e5 (2015) - [j64]Chi Chen, Xiaojie Zhu, Peisong Shen, Jing Yu, Hong Zou, Jiankun Hu:
SOLS: A scheme for outsourced location based service. J. Netw. Comput. Appl. 56: 158-165 (2015) - [j63]Ding Yuan, Miao Liu, Jihao Yin, Jiankun Hu:
Camera motion estimation through monocular normal flow vectors. Pattern Recognit. Lett. 52: 59-64 (2015) - [j62]Fu Jiang, Ying Guo, Jun Peng, Jiankun Hu:
An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks. Sensors 15(2): 2812-2831 (2015) - [j61]Peng Li, Song Guo, Jiankun Hu:
Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks. IEEE Trans. Computers 64(6): 1670-1679 (2015) - [j60]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Jiankun Hu:
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans. Computers 64(9): 2519-2533 (2015) - [j59]Deze Zeng, Peng Li, Song Guo, Toshiaki Miyazaki, Jiankun Hu, Yong Xiang:
Energy Minimization in Multi-Task Software-Defined Sensor Networks. IEEE Trans. Computers 64(11): 3128-3139 (2015) - [j58]Guangyun Zhang, Xiuping Jia, Jiankun Hu:
Superpixel-Based Graphical Model for Remote Sensing Image Mapping. IEEE Trans. Geosci. Remote. Sens. 53(11): 5861-5871 (2015) - [j57]Cai Li, Jiankun Hu, Josef Pieprzyk, Willy Susilo:
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. IEEE Trans. Inf. Forensics Secur. 10(6): 1193-1206 (2015) - [j56]Jinwei Xu, Jiankun Hu, Xiuping Jia:
A Multistaged Automatic Restoration of Noisy Microscopy Cell Images. IEEE J. Biomed. Health Informatics 19(1): 367-376 (2015) - [j55]Miao Xie, Jiankun Hu, Song Guo:
Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(2): 574-583 (2015) - [c60]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. CSCloud 2015: 187-193 - [c59]Waqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie:
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems. CSCloud 2015: 349-355 - [c58]Long Xu, Xinghuo Yu, Yong Feng, Fengling Han, Jiankun Hu, Zahir Tari:
A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection. ICIT 2015: 28-33 - [c57]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey. ISADS 2015: 63-70 - [c56]Jinwei Xu, Jiankun Hu:
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. NSS 2015: 176-187 - 2014
- [j54]Zhiyuan Tan, Upasana T. Nagar, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Song Wang, Jiankun Hu:
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Comput. 1(3): 27-33 (2014) - [j53]Cai Li, Jiankun Hu:
Attacks via record multiplicity on cancelable biometrics templates. Concurr. Comput. Pract. Exp. 26(8): 1593-1605 (2014) - [j52]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30: 107-115 (2014) - [j51]Jing Qin, Hongwei Duan, Huawei Zhao, Jiankun Hu:
A new Lagrange solution to the privacy-preserving general geometric intersection problem. J. Netw. Comput. Appl. 46: 94-99 (2014) - [j50]Abderrahim Benslimane, Jiankun Hu, Xuemin (Sherman) Shen:
Special issue on "quality of service in wireless and mobile networking". J. Netw. Comput. Appl. 46: 250-251 (2014) - [j49]Wencheng Yang, Jiankun Hu, Song Wang, Milos Stojmenovic:
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognit. 47(3): 1309-1320 (2014) - [j48]Song Wang, Jiankun Hu:
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recognit. 47(3): 1321-1329 (2014) - [j47]Gideon Creech, Jiankun Hu:
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns. IEEE Trans. Computers 63(4): 807-819 (2014) - [j46]Wencheng Yang, Jiankun Hu, Song Wang:
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. IEEE Trans. Inf. Forensics Secur. 9(7): 1179-1192 (2014) - [j45]Jiankun Hu, Hemanshu Roy Pota, Song Guo:
Taxonomy of Attacks for Agent-Based Smart Grids. IEEE Trans. Parallel Distributed Syst. 25(7): 1886-1895 (2014) - [j44]Deze Zeng, Song Guo, Jiankun Hu:
Reliable Bulk-Data Dissemination in Delay Tolerant Networks. IEEE Trans. Parallel Distributed Syst. 25(8): 2180-2189 (2014) - [j43]Peng Li, Song Guo, Jiankun Hu, Ruhul A. Sarker:
Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks. Wirel. Commun. Mob. Comput. 14(2): 221-231 (2014) - [c55]Wei Zhou, Jiankun Hu, Ian R. Petersen, Song Wang, Mohammed Bennamoun:
A benchmark 3D fingerprint database. FSKD 2014: 935-940 - [c54]Md. Enamul Kabir, Jiankun Hu:
A statistical framework for intrusion detection system. FSKD 2014: 941-946 - [c53]Harsha S. Gardiyawasam Pussewalage, Jiankun Hu, Josef Pieprzyk:
A survey: Error control methods used in bio-cryptography. FSKD 2014: 956-962 - [c52]Miao Xie, Jiankun Hu, Jill Slay:
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. FSKD 2014: 978-982 - [c51]Chi Chen, Chaogang Wang, Tengfei Yang, Dongdai Lin, Song Wang, Jiankun Hu:
Optional multi-biometric cryptosystem based on fuzzy extractor. FSKD 2014: 989-994 - [c50]Wencheng Yang, Jiankun Hu, Song Wang:
The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication. FSKD 2014: 995-999 - [c49]Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu:
A hierarchical clustering method for big data oriented ciphertext search. INFOCOM Workshops 2014: 559-564 - [c48]Wei Zhou, Jiankun Hu, Song Wang, Ian R. Petersen, Mohammed Bennamoun:
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. NSS 2014: 377-388 - [c47]Miao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang:
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. NSS 2014: 542-549 - [i2]Jinwei Xu, Jiankun Hu, Xiuping Jia:
A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module. CoRR abs/1406.6854 (2014) - [i1]Jinwei Xu, Jiankun Hu, Xiuping Jia:
A New Path to Construct Parametric Orientation Field: Sparse FOMFE Model and Compressed Sparse FOMFE Model. CoRR abs/1407.0342 (2014) - 2013
- [j42]Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic. Comput. J. 56(2): 229-238 (2013) - [j41]Rongbo Zhu, Zhili Sun, Tapani Ristaniemi, Jiankun Hu:
Guest Editorial - Special Issue on Green Telecommunications. Telecommun. Syst. 52(2): 1233-1234 (2013) - [j40]Yi Xie, Shensheng Tang, Yang Xiang, Jiankun Hu:
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. IEEE Trans. Parallel Distributed Syst. 24(7): 1401-1410 (2013) - [j39]Miao Xie, Jiankun Hu, Song Han, Hsiao-Hwa Chen:
Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 24(8): 1661-1670 (2013) - [j38]Yi Xie, Jiankun Hu, Yang Xiang, Shui Yu, Shensheng Tang, Yu Wang:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. IEEE Trans. Parallel Distributed Syst. 24(9): 1807-1817 (2013) - [j37]Huawei Zhao, Jing Qin, Jiankun Hu:
An Energy Efficient Key Management Scheme for Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 24(11): 2202-2210 (2013) - [j36]Song Wang, Jiankun Hu:
Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based? Wirel. Commun. Mob. Comput. 13(2): 204-210 (2013) - [c46]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
A Key Management Scheme between Body Sensor Networks and the Base Station. CIS 2013: 743-747 - [c45]Wencheng Yang, Jiankun Hu, Song Wang, Jucheng Yang:
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. CSS 2013: 81-91 - [c44]Biming Tian, Kathryn E. Merrick, Shui Yu, Jiankun Hu:
A hierarchical pea-based anomaly detection model. ICNC 2013: 621-625 - [c43]Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun:
Partial Fingerprint Reconstruction with Improved Smooth Extension. NSS 2013: 756-762 - [c42]Wencheng Yang, Jiankun Hu, Song Wang:
A Finger-Vein Based Cancellable Bio-cryptosystem. NSS 2013: 784-790 - [c41]Frank Jiang, Jiankun Hu:
Cooperative multi-target tracking in passive sensor-based networks. WCNC 2013: 4340-4345 - [c40]Gideon Creech, Jiankun Hu:
Generation of a new IDS test dataset: Time to retire the KDD collection. WCNC 2013: 4487-4492 - 2012
- [j35]Jiankun Hu, Yang Xiang, Wanlei Zhou:
Advances in Network and System Security: Editorial Statement. Comput. J. 55(4): 382-383 (2012) - [j34]Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu:
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics. Comput. J. 55(4): 410-421 (2012) - [j33]Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das:
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. Comput. J. 55(4): 438 (2012) - [j32]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Advances in network and system security. Concurr. Comput. Pract. Exp. 24(10): 1035-1036 (2012) - [j31]Kai Xi, Jiankun Hu, Fengling Han:
Mobile device access control: an improved correlation based face authentication scheme and its Java ME application. Concurr. Comput. Pract. Exp. 24(10): 1066-1085 (2012) - [j30]Rongbo Zhu, Zhili Sun, Jiankun Hu:
Special section: Green computing. Future Gener. Comput. Syst. 28(2): 368-370 (2012) - [j29]Jihao Yin, Yifei Wang, Jiankun Hu:
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration. J. Netw. Comput. Appl. 35(3): 1035-1051 (2012) - [j28]Jihao Yin, Chongyang Fu, Jiankun Hu:
Using incremental subspace and contour template for object tracking. J. Netw. Comput. Appl. 35(6): 1740-1748 (2012) - [j27]Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network. J. Netw. Comput. Appl. 35(6): 2081-2091 (2012) - [j26]Song Wang, Jiankun Hu:
Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognit. 45(12): 4129-4137 (2012) - [j25]Jihao Yin, Yifei Wang, Jiankun Hu:
A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy. IEEE Trans. Ind. Informatics 8(4): 935-943 (2012) - [c39]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A General Transformation from KP-ABE to Searchable Encryption. CSS 2012: 165-178 - [c38]Huawei Zhao, Jing Qin, Minglei Shu, Jiankun Hu:
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. CSS 2012: 296-308 - [c37]Yong Feng, Fengling Han, Xinghuo Yu, Zahir Tari, Lilin Li, Jiankun Hu:
High-Order Terminal Sliding-Mode Observers for Anomaly Detection. ICIC (1) 2012: 497-504 - [c36]Wencheng Yang, Jiankun Hu, Song Wang:
A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. TrustCom 2012: 66-70 - [c35]Quang-Anh Tran, Frank Jiang, Jiankun Hu:
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. TrustCom 2012: 201-208 - [c34]Jing Qin, Jiankun Hu, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. TrustCom 2012: 466-473 - [c33]Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. TrustCom 2012: 706-713 - [c32]Miao Xie, Jiankun Hu, Biming Tian:
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. TrustCom 2012: 751-759 - 2011
- [j24]Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das:
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. Comput. J. 54(4): 549-569 (2011) - [j23]Kai Xi, Yan Tang, Jiankun Hu:
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment. Comput. J. 54(10): 1632-1644 (2011) - [j22]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Editorial: Advances in network and system security. Comput. Secur. 30(5): 295-296 (2011) - [j21]Peng Zhang, Jiankun Hu, Cai Li, Mohammed Bennamoun, Vijayakumar Bhagavatula:
A pitfall in fingerprint bio-cryptographic key generation. Comput. Secur. 30(5): 311-319 (2011) - [j20]Deze Zeng, Song Guo, Victor C. M. Leung, Jiankun Hu:
The Exploration of Network Coding in IEEE 802.15.4 Networks. Int. J. Digit. Multim. Broadcast. 2011: 310647:1-310647:9 (2011) - [j19]Biming Tian, Song Han, Jiankun Hu, Tharam S. Dillon:
A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34(1): 80-88 (2011) - [j18]Song Wang, Jinli Cao, Jiankun Hu:
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems. J. Netw. Comput. Appl. 34(1): 116-120 (2011) - [j17]Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood:
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy. J. Netw. Comput. Appl. 34(4): 1150-1159 (2011) - [j16]Yi Wang, Jiankun Hu:
Global Ridge Orientation Modeling for Partial Fingerprint Identification. IEEE Trans. Pattern Anal. Mach. Intell. 33(1): 72-87 (2011) - [j15]Tohari Ahmad, Jiankun Hu, Song Wang:
Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognit. 44(10-11): 2555-2564 (2011) - [j14]Jiankun Hu, Vijayakumar Bhagavatula, Mohammed Bennamoun, Kar-Ann Toh:
Biometric security for mobile computing. Secur. Commun. Networks 4(5): 483-486 (2011) - [j13]Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu:
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Networks 4(5): 487-499 (2011) - [j12]Fahim K. Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu:
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Secur. Commun. Networks 4(5): 515-524 (2011) - [j11]Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil:
An embedded DSP hardware encryption module for secure e-commerce transactions. Secur. Commun. Networks 4(8): 902-909 (2011) - [c31]Frank Jiang, Michael R. Frater, Jiankun Hu:
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition. DASC 2011: 145-150 - [c30]Naimah Yaakob, Ibrahim Khalil, Jiankun Hu:
On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks. MobiHealth 2011: 16-23 - [c29]Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu:
Foreword from the Conference Chairs. NSS 2011 - [e4]Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga:
5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. IEEE 2011, ISBN 978-1-4577-0458-1 [contents] - 2010
- [j10]Jiankun Hu, Hsiao-Hwa Chen, Ting-Wei Hou:
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interfaces 32(5-6): 274-280 (2010) - [j9]Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Christopher Leckie:
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. J. Netw. Comput. Appl. 33(4): 491-502 (2010) - [c28]Tohari Ahmad, Jiankun Hu:
Generating cancelable biometrie templates using a projection line. ICARCV 2010: 7-12 - [c27]Peng Zhang, Cai Li, Jiankun Hu:
A pitfall in fingerprint features extraction. ICARCV 2010: 13-18 - [c26]Song Han, Biming Tian, Yuting Zhang, Jiankun Hu:
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks. ICC 2010: 1-5 - [c25]Naimah Yaakob, Ibrahim Khalil, Jiankun Hu:
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks. NCA 2010: 210-213 - [p5]Kai Xi, Jiankun Hu:
Bio-Cryptography. Handbook of Information and Communication Security 2010: 129-157 - [p4]Inderjeet Pabla, Ibrahim Khalil, Jiankun Hu:
Intranet Security via Firewalls. Handbook of Information and Communication Security 2010: 207-219 - [p3]Jiankun Hu:
Host-Based Anomaly Intrusion Detection. Handbook of Information and Communication Security 2010: 235-255 - [p2]Fahim K. Sufi, Ibrahim Khalil, Jiankun Hu:
ECG-Based Authentication. Handbook of Information and Communication Security 2010: 309-331 - [p1]Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman:
Network Traffic Analysis and SCADA Security. Handbook of Information and Communication Security 2010: 383-405 - [e3]Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:
Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3 [contents]
2000 – 2009
- 2009
- [j8]Jiankun Hu, Fengling Han:
A pixel-based scrambling scheme for digital medical images protection. J. Netw. Comput. Appl. 32(4): 788-794 (2009) - [j7]Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. J. Netw. Comput. Appl. 32(6): 1219-1228 (2009) - [j6]Jiankun Hu, Xinghuo Yu, Dong Qiu, Hsiao-Hwa Chen:
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Netw. 23(1): 42-47 (2009) - [c24]Kai Xi, Jiankun Hu:
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault. ICC 2009: 1-5 - [c23]Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu:
Building a SCADA Security Testbed. NSS 2009: 357-364 - [c22]Tohari Ahmad, Jiankun Hu, Song Han:
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. NSS 2009: 474-479 - 2008
- [j5]Jiankun Hu, Fabio Zambetta:
Security issues in massive online games. Secur. Commun. Networks 1(1): 83-92 (2008) - [c21]Jiankun Hu, Don Gingrich, Andy Sentosa:
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics. ICC 2008: 1556-1560 - 2007
- [j4]Yi Wang, Jiankun Hu, Fengling Han:
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields. Appl. Math. Comput. 185(2): 823-833 (2007) - [j3]Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang:
Fingerprint images encryption via multi-scroll chaotic attractors. Appl. Math. Comput. 185(2): 931-939 (2007) - [j2]Yi Wang, Jiankun Hu, Damien Phillips:
A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing. IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 573-585 (2007) - [j1]Fengling Han, Xinghuo Yu, Yong Feng, Jiankun Hu:
On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems. IEEE Trans. Circuits Syst. II Express Briefs 54-II(11): 1004-1008 (2007) - [c20]Yi Wang, Jiankun Hu, Kai Xi, Vijayakumar Bhagavatula:
Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology. AutoID 2007: 35-40 - [c19]Yi Wang, Jiankun Hu:
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems. ICC 2007: 1179-1184 - [c18]Fengling Han, Jiankun Hu, Leilei He, Yi Wang:
Generation of Reliable PINs from Fingerprints. ICC 2007: 1191-1196 - [c17]Farid Naït-Abdesselam, Jiankun Hu, Azzedine Boukerche:
PPN 2007 PC Co-chairs' Message. OTM Workshops (2) 2007: 909 - 2006
- [c16]Damien Phillips, Jiankun Hu:
Enhancements for RTT-Fair HighSpeed TCP. GLOBECOM 2006 - [c15]Fengling Han, Jiankun Hu, Xinghuo Yu, Yong Feng, Jie Zhou:
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications. ICB 2006: 675-681 - [c14]Fengling Han, Jiankun Hu, Xinghuo Yu:
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation. ICIC (3) 2006: 342-351 - [c13]Kejie Lu, Yi Qian, Jiankun Hu:
A framework for distributed key management schemes in heterogeneous wireless sensor networks. IPCCC 2006 - 2005
- [c12]Yi Wang, Jiankun Hu, Heiko Schröder:
A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields. DICTA 2005: 29 - [c11]Jiankun Hu, J. Lin, L. Xie:
Robust Congestion Control for High Speed Data Networks with Uncertain Time-Variant Delays: an LMI Control Approach. LCN 2005: 474-475 - [c10]Damien Phillips, Jiankun Hu:
Modelling of SACK TCP and application to the HTTP File Transfer Environment. LCN 2005: 515-516 - 2004
- [c9]Jiankun Hu, Konrad Eriksson:
A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms. ICETE (3) 2004: 393-401 - [c8]Xuan Dau Hoang, Jiankun Hu:
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. ICON 2004: 470-474 - [c7]Damien Phillips, Jiankun Hu:
Analytic models for highspeed TCP fairness analysis. ICON 2004: 725-730 - [e2]Savitri Bevinakoppa, Jiankun Hu:
Web Services: Modeling, Architecture and Infrastructure - Proceedings of the 2nd International Workshop on Web Services: Modeling, Architecture and Infrastructure, WSMAI 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-09-0 [contents] - 2003
- [c6]Damien Phillips, Jiankun Hu:
Simulation Study of TCP Performance Over Mobile IPV4 and Mobile IPV6. ICEIS (4) 2003: 224-231 - [c5]Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
Intrusion Detection Based on Data Mining. ICEIS (3) 2003: 341-346 - [c4]Damien Phillips, Jiankun Hu, Bill Lloyd-Smith, Richard Harris:
A note on an analytic model for slow start in TCP. ICON 2003: 261-264 - [c3]Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
A multi-layer model for anomaly intrusion detection using program sequences of system calls. ICON 2003: 531-536 - [e1]Jean Bézivin, Jiankun Hu, Zahir Tari:
Web Services: Modeling, Architecture and Infrastructure, Proceedings of the 1st Workshop on Web Services: Modeling, Architecture and Infrastructure (WSMAI-2003), In conjunction with ICEIS 2003, Angers, France, April 2003. ICEIS Press 2003, ISBN 972-98816-4-2 [contents] - 2001
- [c2]Jiankun Hu, Ziping Xi, Andrew Jennings, H. Y. J. Lee, D. Wahyudi:
DSP application in e-commerce security. ICASSP 2001: 1005-1008
1990 – 1999
- 1999
- [c1]Jiankun Hu, Hong Ren Wu:
Robust adaptive equalization using the filtered-X LMS algorithm. ISSPA 1999: 419-422
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint