ORCID as entered in ROS

Select Publications
2020, 'Preserving transaction privacy in bitcoin', Future Generation Computer Systems, 107, pp. 793 - 804, http://dx.doi.org/10.1016/j.future.2017.08.026
,2020, 'Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos', IEEE Transactions on Geoscience and Remote Sensing, 58, pp. 2659 - 2669, http://dx.doi.org/10.1109/TGRS.2019.2953181
,2020, 'Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm', IEEE Transactions on Information Forensics and Security, 15, pp. 28 - 41, http://dx.doi.org/10.1109/TIFS.2019.2918083
,2020, 'IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities', IEEE Access, 8, pp. 145033 - 145036, http://dx.doi.org/10.1109/ACCESS.2020.3014416
,2020, 'Characters of chloramine decay in large looped water distribution system - the case of Tianjin, China', WATER SUPPLY, 20, pp. 1474 - 1483, http://dx.doi.org/10.2166/ws.2020.063
,2020, 'Engineering controllable water transport of biosafety cuttlefish juice solar absorber toward remarkably enhanced solar-driven gas-liquid interfacial evaporation', NANO ENERGY, 73, http://dx.doi.org/10.1016/j.nanoen.2020.104834
,2020, 'Retrospective imaging studies of gastric cancer Study protocol clinical trial (SPIRIT Compliant)', MEDICINE, 99, http://dx.doi.org/10.1097/MD.0000000000019157
,2019, 'Adjuvant Chemoradiotherapy for Gastric Cancer: Efficacy and Cost-Effectiveness Analysis', FRONTIERS IN ONCOLOGY, 9, http://dx.doi.org/10.3389/fonc.2019.01357
,2019, 'Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States', IEEE Transactions on Information Forensics and Security, 14, pp. 3359 - 3372, http://dx.doi.org/10.1109/TIFS.2019.2916403
,2019, 'Privacy-preserving big data analytics a comprehensive survey', Journal of Parallel and Distributed Computing, 134, pp. 207 - 218, http://dx.doi.org/10.1016/j.jpdc.2019.08.007
,2019, 'Corrigendum to “Recognizing the content types of network traffic based on a hybrid DNN-HMM model” (Journal of Network and Computer Applications (2019) 142 (51–62), (S1084804519301948), (10.1016/j.jnca.2019.06.004))', Journal of Network and Computer Applications, 145, http://dx.doi.org/10.1016/j.jnca.2019.102411
,2019, 'Local Region Proposing for Frame-Based Vehicle Detection in Satellite Videos', Remote Sensing, 11, pp. 2372 - 2372, http://dx.doi.org/10.3390/rs11202372
,2019, 'Recognizing the content types of network traffic based on a hybrid DNN-HMM model', Journal of Network and Computer Applications, 142, pp. 51 - 62, http://dx.doi.org/10.1016/j.jnca.2019.06.004
,2019, 'A cancelable iris-and steganography-based user authentication system for the internet of things', Sensors Switzerland, 19, http://dx.doi.org/10.3390/s19132985
,2019, 'Detecting anomalous behavior in cloud servers by nested-arc hidden SEMI-markov model with state summarization', IEEE Transactions on Big Data, 5, pp. 305 - 316, http://dx.doi.org/10.1109/TBDATA.2017.2736555
,2019, 'Securing Deep Learning Based Edge Finger Vein Biometrics with Binary Decision Diagram', IEEE Transactions on Industrial Informatics, 15, pp. 4244 - 4253, http://dx.doi.org/10.1109/TII.2019.2900665
,2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
,2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879
,2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141
,2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692
,2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313
,2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
,2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273, http://dx.doi.org/10.1109/TCDS.2019.2948025
,2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011
,2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177
,2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
,2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132
,2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
,2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182
,2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026
,2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451
,2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029
,2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312
,2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410
,2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018, http://dx.doi.org/10.1155/2018/7107295
,2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics
,2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z
,2017, 'New secure healthcare system using cloud of things', Cluster Computing, 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x
,2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032
,2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033
,2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019
,2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
,2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6
,2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913
,2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017
,2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, 2017, http://dx.doi.org/10.1155/2017/3606424
,2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738
,2017, 'Q-learning-based adjustable fixed-phase quantum Grover search algorithm', Journal of the Physical Society of Japan, 86, http://dx.doi.org/10.7566/JPSJ.86.024006
,2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413
,2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664
,