Select Publications

Journal articles

Wang Q; Qin B; Hu J; Xiao F, 2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026

Zhang J; Jia X; Hu J, 2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181

Yin X; Zhu Y; Hu J, 2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083

Li S; Choo KKR; Tan Z; He X; Hu J; Qin T, 2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416

Ma K; Hu J; Han H; Zhao L; Li R; Su X, 2020, 'Characters of chloramine decay in large looped water distribution system - the case of Tianjin, China', WATER SUPPLY, 20, pp. 1474 - 1483, http://dx.doi.org/10.2166/ws.2020.063

Li Z; Zhang J; Zang S; Yang C; Liu Y; Jing F; Jing H; Hu J; Wang C; Zhou Y, 2020, 'Engineering controllable water transport of biosafety cuttlefish juice solar absorber toward remarkably enhanced solar-driven gas-liquid interfacial evaporation', NANO ENERGY, 73, http://dx.doi.org/10.1016/j.nanoen.2020.104834

Huang Z; Liu D; Chen X; Yu P; Wu J; Song B; Hu J; Wu B, 2020, 'Retrospective imaging studies of gastric cancer Study protocol clinical trial (SPIRIT Compliant)', MEDICINE, 99, http://dx.doi.org/10.1097/MD.0000000000019157

Zhang M; Wen F; He X; Zhang W; Hu J; Li Q, 2019, 'Adjuvant Chemoradiotherapy for Gastric Cancer: Efficacy and Cost-Effectiveness Analysis', FRONTIERS IN ONCOLOGY, 9, http://dx.doi.org/10.3389/fonc.2019.01357

Wang M; El-Fiqi H; Hu J; Abbass HA, 2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403

Tran HY; Hu J, 2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145, http://dx.doi.org/10.1016/j.jnca.2019.102411

Zhang J; Jia X; Hu J, 2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372

Tan X; Xie Y; Ma H; Yu S; Hu J, 2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004

Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C, 2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors Switzerland, 19, http://dx.doi.org/10.3390/s19132985

Haider W; Hu J; Xie Y; Yu X; Wu Q, 2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555

Yang W; Wang S; Hu J; Zheng G; Yang J; Valli C, 2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Farooq A; Hu J; Jia X, 2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879

Yang W; Wang S; Hu J; Zheng G; Valli C, 2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141

Farooq A; Jia X; Hu J; Zhou J, 2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692

Abdelfattah S; Kasmarik K; Hu J, 2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Abdelfattah S; Kasmarik K; Hu J, 2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273, http://dx.doi.org/10.1109/TCDS.2019.2948025

Shehada D; Yeun CY; Jamal Zemerly M; Al-Qutayri M; Al-Hammadi Y; Hu J, 2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011

Xu J; Hu J; Jia X, 2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Sun J; Zhu B; Qin J; Hu J; Ma J, 2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182

Yang W; Wang S; Hu J; Zheng G; Valli C, 2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451

Kabir E; Hu J; Wang H; Zhuo G, 2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029

Shen W; Qin J; Yu J; Hao R; Hu J, 2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312

Zhang Y; Hu W; Xu W; Chou CT; Hu J, 2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410

Yang W; Hu J; Wang S; Wu Q, 2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018, http://dx.doi.org/10.1155/2018/7107295

Abdelfattah S; Kasmarik K; Hu J, 2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics

Luo X; Ren Y; Hu J; Wu Q; Lou J, 2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z

Alkeem EA; Shehada D; Yeun CY; Zemerly MJ; Hu J, 2017, 'New secure healthcare system using cloud of things', Cluster Computing, 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x

Jiang F; Xia H; Anh Tran Q; Minh Ha Q; Quang Tran N; Hu J, 2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032

Liu Q; Srinivasan A; Hu J; Wang G, 2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033

Wang S; Yang W; Hu J, 2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019

Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018

Wu Q; Zhou X; Qin B; Hu J; Liu J; Ding Y, 2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6

Wang Y; Wu Q; Qin B; Shi W; Deng RH; Hu J, 2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913

Wang S; Deng G; Hu J, 2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017

Shehada D; Yeun CY; Jamal Zemerly M; Al Qutayri M; Al Hammadi Y; Damiani E; Hu J, 2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, 2017, http://dx.doi.org/10.1155/2017/3606424

Zhao H; Shu M; Qin J; Hu J, 2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738

Guo Y; Shi W; Wang Y; Hu J, 2017, 'Q-learning-based adjustable fixed-phase quantum Grover search algorithm', Journal of the Physical Society of Japan, 86, http://dx.doi.org/10.7566/JPSJ.86.024006

Zeng D; Gu L; Lian L; Guo S; Yao H; Hu J, 2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413

Zheng H; Qin J; Hu J; Wu Q, 2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664


Back to profile page