ORCID as entered in ROS

Select Publications
2019, 'Analysis of Spectral Bands and Spatial Resolutions for Weed Classification Via Deep Convolutional Neural Network', IEEE Geoscience and Remote Sensing Letters, 16, pp. 183 - 187, http://dx.doi.org/10.1109/LGRS.2018.2869879
,2019, 'Security and accuracy of fingerprint-based biometrics: A review', Symmetry, 11, http://dx.doi.org/10.3390/sym11020141
,2019, 'Multi-resolution weed classification via convolutional neural network and superpixel based local binary pattern using remote sensing images', Remote Sensing, 11, http://dx.doi.org/10.3390/rs11141692
,2019, 'A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments', Adaptive Behavior, 28, pp. 273 - 292, http://dx.doi.org/10.1177/1059712319869313
,2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
,2019, 'Intrinsically Motivated Hierarchical Policy Learning in Multi-objective Markov Decision Processes', IEEE Transactions on Cognitive and Developmental Systems, Special Issue on Continual Unsupervised Sensorimotor Learning, 13, pp. 262 - 273, http://dx.doi.org/10.1109/TCDS.2019.2948025
,2018, 'A new adaptive trust and reputation model for Mobile Agent Systems', Journal of Network and Computer Applications, 124, pp. 33 - 43, http://dx.doi.org/10.1016/j.jnca.2018.09.011
,2018, 'A target image–oriented dictionary learning–based method for fully automated latent fingerprint forensic', Computational Intelligence, 34, pp. 1178 - 1198, http://dx.doi.org/10.1111/coin.12177
,2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
,2018, 'Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication', Security and Communication Networks, 2018, http://dx.doi.org/10.1155/2018/5275132
,2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
,2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182
,2018, 'A fingerprint and finger-vein based cancelable multi-biometric system', Pattern Recognition, 78, pp. 242 - 251, http://dx.doi.org/10.1016/j.patcog.2018.01.026
,2018, 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection', IEEE Transactions on Information Forensics and Security, 13, pp. 940 - 953, http://dx.doi.org/10.1109/TIFS.2017.2774451
,2018, 'A novel statistical technique for intrusion detection systems', Future Generation Computer Systems, 79, pp. 303 - 318, http://dx.doi.org/10.1016/j.future.2017.01.029
,2018, 'Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage', IEEE Transactions on Information Forensics and Security, 14, pp. 331 - 346, http://dx.doi.org/10.1109/TIFS.2018.2850312
,2018, 'Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli', Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1, pp. 1 - 22, http://dx.doi.org/10.1145/3161410
,2018, 'Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection', Wireless Communications and Mobile Computing, 2018, http://dx.doi.org/10.1155/2018/7107295
,2018, 'Evolving Robust Policy Coverage Sets in Multi-objective Markov Decision Processes Through Intrinsically Motivated Self-play', Frontiers in Neurorobotics
,2017, 'Privacy-preserving identity-based file sharing in smart city', Personal and Ubiquitous Computing, 21, pp. 923 - 936, http://dx.doi.org/10.1007/s00779-017-1051-z
,2017, 'New secure healthcare system using cloud of things', Cluster Computing, 20, pp. 2211 - 2229, http://dx.doi.org/10.1007/s10586-017-0872-x
,2017, 'A new binary hybrid particle swarm optimization with wavelet mutation', Knowledge-Based Systems, 130, pp. 90 - 101, http://dx.doi.org/10.1016/j.knosys.2017.03.032
,2017, 'Preface: Security and privacy in big data clouds', Future Generation Computer Systems, 72, pp. 206 - 207, http://dx.doi.org/10.1016/j.future.2017.03.033
,2017, 'Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs', Pattern Recognition, 66, pp. 295 - 301, http://dx.doi.org/10.1016/j.patcog.2017.01.019
,2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
,2017, 'Secure joint Bitcoin trading with partially blind fuzzy signatures', Soft Computing, 21, pp. 3123 - 3134, http://dx.doi.org/10.1007/s00500-015-1997-6
,2017, 'Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds', IEEE Transactions on Information Forensics and Security, 12, pp. 940 - 952, http://dx.doi.org/10.1109/TIFS.2016.2646913
,2017, 'A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations', Pattern Recognition, 61, pp. 447 - 458, http://dx.doi.org/10.1016/j.patcog.2016.08.017
,2017, 'BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications', Security and Communication Networks, 2017, http://dx.doi.org/10.1155/2017/3606424
,2017, 'Key negotiation schemes for body sensor networks on the surface of the human body', International Journal of Autonomous and Adaptive Communications Systems, 10, pp. 55 - 66, http://dx.doi.org/10.1504/IJAACS.2017.082738
,2017, 'Q-learning-based adjustable fixed-phase quantum Grover search algorithm', Journal of the Physical Society of Japan, 86, http://dx.doi.org/10.7566/JPSJ.86.024006
,2016, 'On cost-efficient sensor placement for contaminant detection in water distribution systems', IEEE Transactions on Industrial Informatics, 12, pp. 2177 - 2185, http://dx.doi.org/10.1109/TII.2016.2569413
,2016, 'Threshold attribute-based signcryption and its application to authenticated key agreement', Security and Communication Networks, 9, pp. 4914 - 4923, http://dx.doi.org/10.1002/sec.1664
,2016, 'CD133+CD54+CD44+ circulating tumor cells as a biomarker of treatment selection and liver metastasis in patients with colorectal cancer', ONCOTARGET, 7, pp. 77389 - 77403, http://dx.doi.org/10.18632/oncotarget.12675
,2016, 'Loss of ZNF32 augments the regeneration of nervous lateral line system through negative regulation of SOX2 transcription', ONCOTARGET, 7, pp. 70420 - 70436, http://dx.doi.org/10.18632/oncotarget.11895
,2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, 9, pp. 2641 - 2642, http://dx.doi.org/10.1002/sec.1497
,2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, 62, pp. 196 - 204, http://dx.doi.org/10.1016/j.future.2015.12.009
,2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, 7, pp. 2423 - 2436, http://dx.doi.org/10.1109/TSG.2016.2563461
,2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, 62, pp. 66 - 75, http://dx.doi.org/10.1016/j.future.2016.01.007
,2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency and Computation Practice and Experience, 28, pp. 2940 - 2957, http://dx.doi.org/10.1002/cpe.3600
,2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, 54, pp. 14 - 22, http://dx.doi.org/10.1016/j.patcog.2016.01.001
,2016, 'Morbidity and Mortality of Laparoscopic Versus Open D2 Distal Gastrectomy for Advanced Gastric Cancer: A Randomized Controlled Trial', JOURNAL OF CLINICAL ONCOLOGY, 34, pp. 1350 - +, http://dx.doi.org/10.1200/JCO.2015.63.7215
,2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, 27, pp. 951 - 963, http://dx.doi.org/10.1109/TPDS.2015.2425407
,2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630
,2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566
,2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488
,2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, PP, http://dx.doi.org/10.1109/TIFS.2016.2603961
,2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, 15, pp. 1 - 24, http://dx.doi.org/10.1145/2930669
,2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003
,2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107
,