ORCID as entered in ROS

Select Publications
2023, 'Network Traffic Content Identification Based on Time-Scale Signal Modeling', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2607 - 2624, http://dx.doi.org/10.1109/TDSC.2022.3186665
,2023, 'Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration', IEEE Internet of Things Journal, 10, pp. 8155 - 8171, http://dx.doi.org/10.1109/JIOT.2022.3231381
,2023, 'A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications', IEEE Internet of Things Journal, 10, pp. 877 - 892, http://dx.doi.org/10.1109/JIOT.2022.3204246
,2023, 'An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Information Forensics and Security, 18, pp. 2538 - 2552, http://dx.doi.org/10.1109/TIFS.2023.3267892
,2023, 'Deep Learning in Diverse Intelligent Sensor Based Systems', Sensors, 23, pp. 62, http://dx.doi.org/10.3390/s23010062
,2023, 'Real-Time Malicious Traffic Detection with Online Isolation Forest over SD-WAN', IEEE Transactions on Information Forensics and Security, 18, pp. 2076 - 2090, http://dx.doi.org/10.1109/TIFS.2023.3262121
,2022, 'A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems', Sensors, 22, pp. 8188, http://dx.doi.org/10.3390/s22218188
,2022, 'RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing', Journal of Network and Computer Applications, 207, http://dx.doi.org/10.1016/j.jnca.2022.103484
,2022, 'Single underwater image haze removal with a learning-based approach to blurriness estimation', Journal of Visual Communication and Image Representation, 89, http://dx.doi.org/10.1016/j.jvcir.2022.103656
,2022, 'Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2022.3204222
,2022, 'Moving Vehicle Detection for Remote Sensing Video Surveillance with Nonstationary Satellite Platform', IEEE Transactions on Pattern Analysis and Machine Intelligence, 44, pp. 5185 - 5198, http://dx.doi.org/10.1109/TPAMI.2021.3066696
,2022, 'Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party', IEEE Internet of Things Journal, 9, pp. 16080 - 16095, http://dx.doi.org/10.1109/JIOT.2022.3153043
,2022, 'Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications', Future Generation Computer Systems, 133, pp. 169 - 170, http://dx.doi.org/10.1016/j.future.2022.03.021
,2022, 'A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions', ACM Computing Surveys, 54, http://dx.doi.org/10.1145/3460427
,2022, 'An IoT-Oriented Privacy-Preserving Fingerprint Authentication System', IEEE Internet of Things Journal, 9, pp. 11760 - 11771, http://dx.doi.org/10.1109/JIOT.2021.3131956
,2022, 'Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey', Sensors, 22, pp. 5111, http://dx.doi.org/10.3390/s22145111
,2022, 'An Anonymous Reputation Management System for Mobile Crowdsensing Based on Dual Blockchain', IEEE Internet of Things Journal, 9, pp. 6956 - 6968, http://dx.doi.org/10.1109/JIOT.2021.3113997
,2022, 'Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation', Concurrency and Computation Practice and Experience, 34, http://dx.doi.org/10.1002/cpe.5956
,2022, 'A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids', IEEE Transactions on Industrial Informatics, 18, pp. 1957 - 1967, http://dx.doi.org/10.1109/TII.2021.3102332
,2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10, http://dx.doi.org/10.1109/OJCS.2021.3138332
,2022, 'A Review on Security Issues and Solutions of the Internet of Drones', IEEE Open Journal of the Computer Society, 3, pp. 96 - 110, http://dx.doi.org/10.1109/OJCS.2022.3183003
,2022, 'PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems', IEEE Open Journal of the Computer Society, 3, pp. 149 - 161, http://dx.doi.org/10.1109/OJCS.2022.3199755
,2022, 'Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing', IEEE Transactions on Cloud Computing, 10, pp. 2050 - 2065, http://dx.doi.org/10.1109/TCC.2020.3002553
,2022, 'SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images', IEEE Transactions on Geoscience and Remote Sensing, 60, http://dx.doi.org/10.1109/TGRS.2021.3123268
,2022, 'Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field', IEEE Transactions on Dependable and Secure Computing, 19, pp. 1735 - 1752, http://dx.doi.org/10.1109/TDSC.2020.3036664
,2022, 'Transferable Convolutional Neural Network for Weed Mapping With Multisensor Imagery', IEEE Transactions on Geoscience and Remote Sensing, 60, http://dx.doi.org/10.1109/TGRS.2021.3102243
,2022, 'Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping from High-Resolution Aerial Images', IEEE Geoscience and Remote Sensing Letters, 19, http://dx.doi.org/10.1109/LGRS.2021.3132935
,2021, 'Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102641
,2021, 'Fair and smart spectrum allocation scheme for IIoT based on blockchain', Ad Hoc Networks, 123, http://dx.doi.org/10.1016/j.adhoc.2021.102686
,2021, 'Enhanced Locality-Sensitive Hashing for Fingerprint Forensics Over Large Multi-Sensor Databases', IEEE TRANSACTIONS ON BIG DATA, 7, pp. 759 - 769, http://dx.doi.org/10.1109/TBDATA.2017.2736547
,2021, 'Learned Bloom-filter for the efficient name lookup in Information-Centric Networking', Journal of Network and Computer Applications, 186, http://dx.doi.org/10.1016/j.jnca.2021.103077
,2021, 'Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT', IEEE Transactions on Cloud Computing, 9, pp. 1195 - 1209, http://dx.doi.org/10.1109/TCC.2019.2902380
,2021, 'Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids', IEEE Internet of Things Journal, 8, pp. 9422 - 9435, http://dx.doi.org/10.1109/JIOT.2021.3056649
,2021, '3D Fingerprint Recognition based on Ridge-Valley-Guided 3D Reconstruction and 3D Topology Polymer Feature Extraction', IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, pp. 1085 - 1091, http://dx.doi.org/10.1109/tpami.2019.2949299
,2021, 'A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design', IEEE Transactions on Information Forensics and Security, 16, pp. 2926 - 2940, http://dx.doi.org/10.1109/TIFS.2021.3069170
,2021, 'A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions', IEEE Open Journal of the Computer Society, 2, pp. 370 - 381, http://dx.doi.org/10.1109/OJCS.2021.3119572
,2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032
,2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385
,2021, 'Contrast Enhancement of Multiple Tissues in MR Brain Images with Reversibility', IEEE Signal Processing Letters, 28, pp. 160 - 164, http://dx.doi.org/10.1109/LSP.2020.3048840
,2021, 'Data Integrity Auditing without Private Key Storage for Secure Cloud Storage', IEEE Transactions on Cloud Computing, 9, pp. 1408 - 1421, http://dx.doi.org/10.1109/TCC.2019.2921553
,2021, 'Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems', IEEE Transactions on Information Forensics and Security, 16, pp. 4063 - 4077, http://dx.doi.org/10.1109/TIFS.2021.3102492
,2021, 'Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic', IEEE Transactions on Information Forensics and Security, 16, pp. 2046 - 2059, http://dx.doi.org/10.1109/TIFS.2020.3046876
,2021, 'Identifying click-requests for the network-side through traffic behavior', Journal of Network and Computer Applications, 173, http://dx.doi.org/10.1016/j.jnca.2020.102872
,2021, 'Log-Based Anomaly Detection with Robust Feature Extraction and Online Learning', IEEE Transactions on Information Forensics and Security, 16, pp. 2300 - 2311, http://dx.doi.org/10.1109/TIFS.2021.3053371
,2021, 'A Cognitive Control Approach for Networked Control Systems with Random Packet Losses', ADVANCED THEORY AND SIMULATIONS, 4, http://dx.doi.org/10.1002/adts.202100163
,2020, 'Deep Convolutional Neural Network Based on Computed Tomography Images for the Preoperative Diagnosis of Occult Peritoneal Metastasis in Advanced Gastric Cancer', FRONTIERS IN ONCOLOGY, 10, http://dx.doi.org/10.3389/fonc.2020.601869
,2020, 'BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs', Pattern Recognition, 105, http://dx.doi.org/10.1016/j.patcog.2020.107381
,2020, 'Online structured sparsity-based moving-object detection from satellite videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 6420 - 6433, http://dx.doi.org/10.1109/TGRS.2020.2976855
,2020, 'Content-based multi-source encrypted image retrieval in clouds with privacy preservation', Future Generation Computer Systems, 109, pp. 621 - 632, http://dx.doi.org/10.1016/j.future.2018.04.089
,2020, 'Preface: Security & privacy in social big data', Journal of Parallel and Distributed Computing, 141, pp. 59 - 60, http://dx.doi.org/10.1016/j.jpdc.2020.03.011
,