Select Publications

Journal articles

Fang C; Fan C; Wang C; Huang Q; Meng W; Yu Y; Yang L; Peng Z; Hu J; Li Y; Mo X; Zhou Z, 2016, 'CD133+CD54+CD44+ circulating tumor cells as a biomarker of treatment selection and liver metastasis in patients with colorectal cancer', ONCOTARGET, 7, pp. 77389 - 77403, http://dx.doi.org/10.18632/oncotarget.12675

Wei Y; Li K; Yao S; Gao J; Li J; Shang Y; Zhang J; Zhang L; Li Y; Mo X; Meng W; Xiang R; Hu J; Lin P; Wei Y, 2016, 'Loss of ZNF32 augments the regeneration of nervous lateral line system through negative regulation of SOX2 transcription', ONCOTARGET, 7, pp. 70420 - 70436, http://dx.doi.org/10.18632/oncotarget.11895

Han G; Shu L; Chan S; Hu J, 2016, 'Security and privacy in Internet of things: methods, architectures, and solutions', Security and Communication Networks, 9, pp. 2641 - 2642, http://dx.doi.org/10.1002/sec.1497

Wu Q; Sun Y; Qin B; Hu J; Liu W; Liu J; Ding Y, 2016, 'Batch Public Key Cryptosystem with batch multi-exponentiation', Future Generation Computer Systems, 62, pp. 196 - 204, http://dx.doi.org/10.1016/j.future.2015.12.009

Hu J; Vasilakos AV, 2016, 'Energy Big Data Analytics and Security: Challenges and Opportunities', IEEE Transactions on Smart Grid, 7, pp. 2423 - 2436, http://dx.doi.org/10.1109/TSG.2016.2563461

Han F; Qin J; Hu J, 2016, 'Secure searches in the cloud: A survey', Future Generation Computer Systems, 62, pp. 66 - 75, http://dx.doi.org/10.1016/j.future.2016.01.007

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2016, 'Partial fingerprint indexing: a combination of local and reconstructed global features', Concurrency and Computation Practice and Experience, 28, pp. 2940 - 2957, http://dx.doi.org/10.1002/cpe.3600

Wang S; Hu J, 2016, 'A blind system identification approach to cancelable fingerprint templates', Pattern Recognition, 54, pp. 14 - 22, http://dx.doi.org/10.1016/j.patcog.2016.01.001

Hu Y; Huang C; Sun Y; Su X; Cao H; Hu J; Xue Y; Suo J; Tao K; He X; Wei H; Ying M; Hu W; Du X; Chen P; Liu H; Zheng C; Liu F; Yu J; Li Z; Zhao G; Chen X; Wang K; Li P; Xing J; Li G, 2016, 'Morbidity and Mortality of Laparoscopic Versus Open D2 Distal Gastrectomy for Advanced Gastric Cancer: A Randomized Controlled Trial', JOURNAL OF CLINICAL ONCOLOGY, 34, pp. 1350 - +, http://dx.doi.org/10.1200/JCO.2015.63.7215

Chen C; Zhu X; Shen P; Hu J; Guo S; Tari Z; Zomaya AY, 2016, 'An Efficient Privacy-Preserving Ranked Keyword Search Method', IEEE Transactions on Parallel and Distributed Systems, 27, pp. 951 - 963, http://dx.doi.org/10.1109/TPDS.2015.2425407

Li C; Hu J, 2016, 'A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11, pp. 543 - 555, http://dx.doi.org/10.1109/TIFS.2015.2505630

Gu L; Zeng D; Guo S; Xiang Y; Hu J, 2016, 'A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers', IEEE Transactions on Computers, 65, pp. 19 - 29, http://dx.doi.org/10.1109/TC.2015.2417566

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2016, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, 16, pp. 59 - 78, http://dx.doi.org/10.1002/wcm.2488

Xie M; Hu J; Guo S; Zomaya A, 2016, 'Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks', IEEE Transactions on Information Forensics and Security, PP, http://dx.doi.org/10.1109/TIFS.2016.2603961

Xi K; Hu J; Vijaya Kumar BVK, 2016, 'FE-SViT: A SViT-based fuzzy extractor framework', ACM Transactions on Embedded Computing Systems, 15, pp. 1 - 24, http://dx.doi.org/10.1145/2930669

Zhao H; Xu R; Shu M; Hu J, 2016, 'Physiological-signal-based key negotiation protocols for body sensor networks: A survey', Simulation Modelling Practice and Theory, 65, pp. 32 - 44, http://dx.doi.org/10.1016/j.simpat.2015.12.003

Li P; Guo S; Miyazaki T; Xie M; Hu J; Zhuang W, 2016, 'Privacy-Preserving Access to Big Data in the Cloud', IEEE Cloud Computing, 3, pp. 34 - 42, http://dx.doi.org/10.1109/MCC.2016.107

Merrick K; Hardhienata M; Shafi K; Hu J, 2016, 'A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios', Future Internet, 8, http://dx.doi.org/10.3390/fi8030034

Zhang W; Chen X; Liu K; Yang K; Chen X; Zhao Y; Zhao Y; Chen J; Chen L; Hu J, 2016, 'Comparison of survival outcomes between transthoracic and transabdominal surgical approaches in patients with Siewert-II/III esophagogastric junction adenocarcinoma: a single-institution retrospective cohort study', CHINESE JOURNAL OF CANCER RESEARCH, 28, pp. 413 - 422, http://dx.doi.org/10.21147/j.issn.1000-9604.2016.04.04

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, 8, pp. 29 - 29

Ahmed M; Mahmood ABDUN; Hu JIANKUN, 2015, 'A Survey of Network Anomaly Detection Techniques', Journal of Network and Computer Applications, 60, pp. 19 - 31, http://dx.doi.org/10.1016/j.jnca.2015.11.016

Zeng D; Li P; Guo S; Miyazaki T; Hu J; Xiang Y, 2015, 'Energy Minimization in Multi-Task Software-Defined Sensor Networks', IEEE Transactions on Computers, 64, pp. 3128 - 3139, http://dx.doi.org/10.1109/TC.2015.2389802

Zhang G; Jia X; Hu J, 2015, 'Superpixel-based graphical model for remote sensing image mapping', IEEE Transactions on Geoscience and Remote Sensing, 53, pp. 5861 - 5871, http://dx.doi.org/10.1109/TGRS.2015.2423688

Tan Z; Jamdagni A; He X; Nanda P; Liu RP; Hu J, 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, 64, pp. 2519 - 2533, http://dx.doi.org/10.1109/TC.2014.2375218

Chen C; Zhu X; Shen P; Yu J; Zou H; Hu J, 2015, 'SOLS: A scheme for outsourced location based service', Journal of Network and Computer Applications, 56, pp. 158 - 165, http://dx.doi.org/10.1016/j.jnca.2015.06.003

Li C; Hu J; Pieprzyk J; Susilo W, 2015, 'A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion', IEEE Transactions on Information Forensics and Security, 10, pp. 1193 - 1206, http://dx.doi.org/10.1109/TIFS.2015.2402593

Li P; Guo S; Hu J, 2015, 'Energy-efficient cooperative communications for multimedia applications in multi-channel wireless networks', IEEE Transactions on Computers, 64, pp. 1670 - 1679, http://dx.doi.org/10.1109/TC.2014.2345397

Chen X; Chen C; Tao Y; Hu J, 2015, 'A cloud security assessment system based on classifying and grading', IEEE Cloud Computing, 2, pp. 58 - 67, http://dx.doi.org/10.1109/MCC.2015.34

Yang W; Hu J; Wang S; Chen C, 2015, 'Mutual dependency of features in multimodal biometric systems', Electronics Letters, 51, pp. 234 - 235, http://dx.doi.org/10.1049/el.2014.4182

Xie M; Hu J; Guo S, 2015, 'Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 574 - 583, http://dx.doi.org/10.1109/TPDS.2014.2308198

Yuan D; Liu M; Yin J; Hu J, 2015, 'Camera motion estimation through monocular normal flow vectors', Pattern Recognition Letters, 52, pp. 59 - 64, http://dx.doi.org/10.1016/j.patrec.2014.09.015

Xu J; Hu J; Jia X, 2015, 'A multistaged automatic restoration of noisy microscopy cell images', IEEE Journal of Biomedical and Health Informatics, 19, pp. 367 - 376, http://dx.doi.org/10.1109/JBHI.2014.2305445

Jiang F; Guo Y; Peng J; Hu J, 2015, 'An active cooperation-aware spectrum allocation mechanism for body sensor networks', Sensors (Basel, Switzerland), 15, pp. 2812 - 2831, http://dx.doi.org/10.3390/s150202812

Zhu R; Ma M; Zhang Y; Hu J, 2015, 'Collaborative wireless sensor networks and applications', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/352761

Li C; Hu J, 2015, 'Impact of trivial quantisation on discrimination power in biometric systems', Electronics Letters, 51, pp. 1247 - 1249, http://dx.doi.org/10.1049/el.2015.1349

Zhao H; Chen C; Hu J; Qin J, 2015, 'Securing body sensor networks with biometric methods: A new key negotiation method and a key sampling method for linear interpolation encryption', International Journal of Distributed Sensor Networks, 2015, http://dx.doi.org/10.1155/2015/764919

Benslimane A; Hu J; Shen X, 2014, 'Special issue on "quality of service in wireless and mobile networking"', Journal of Network and Computer Applications, 46, pp. 250 - 251, http://dx.doi.org/10.1016/j.jnca.2014.11.002

Tan Z; Nagar UT; He X; Nanda P; Liu RP; Wang S; Hu J, 2014, 'Enhancing big data security with collaborative intrusion detection', IEEE Cloud Computing, 1, pp. 27 - 33, http://dx.doi.org/10.1109/MCC.2014.53

Yaakob N; Khalil I; Atiquzzaman M; Habib I; Hu J, 2014, 'Distributed collision control with the integration of packet size for congestion control in wireless sensor networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.2488

Zhou W; Hu J; Wang S; Petersen I; Bennamoun M, 2014, 'Performance evaluation of large 3D fingerprint databases', Electronics Letters, 50, pp. 1060 - 1061, http://dx.doi.org/10.1049/el.2014.1927

Li C; Hu J, 2014, 'Attacks via record multiplicity on cancelable biometrics templates', Concurrency and Computation Practice and Experience, 26, pp. 1593 - 1605, http://dx.doi.org/10.1002/cpe.3042

Wang S; Hu J, 2014, 'Design of alignment-free cancelable fingerprint templates via curtailed circular convolution', Pattern Recognition, 47, pp. 1321 - 1329, http://dx.doi.org/10.1016/j.patcog.2013.10.003

Li P; Guo S; Hu J; Sarker R, 2014, 'Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks', Wireless Communications and Mobile Computing, 14, pp. 221 - 231, http://dx.doi.org/10.1002/wcm.1247

Yang W; Hu J; Wang S, 2014, 'A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement', IEEE Transactions on Information Forensics and Security, 9, pp. 1179 - 1192, http://dx.doi.org/10.1109/TIFS.2014.2328095

Qin J; Duan H; Zhao H; Hu J, 2014, 'A new Lagrange solution to the privacy-preserving general geometric intersection problem', Journal of Network and Computer Applications, 46, pp. 94 - 99, http://dx.doi.org/10.1016/j.jnca.2014.08.004

Yang W; Hu J; Wang S; Stojmenovic M, 2014, 'An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures', Pattern Recognition, 47, pp. 1309 - 1320, http://dx.doi.org/10.1016/j.patcog.2013.10.001

Zeng D; Guo S; Hu J, 2014, 'Reliable Bulk-Data Dissemination in Delay Tolerant Networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2180 - 2189, http://dx.doi.org/10.1109/TPDS.2013.221

Hu J; Pota HR; Guo S, 2014, 'Taxonomy of attacks for agent-based smart grids', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 1886 - 1895, http://dx.doi.org/10.1109/TPDS.2013.301

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Yang W; Hu J; Wang S, 2013, 'A Delaunay triangle group based fuzzy vault with cancellability', Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, 3, pp. 1676 - 1681, http://dx.doi.org/10.1109/CISP.2013.6743946


Back to profile page