Select Publications

Journal articles

Xiang Y; Hu J; Zhou W, 2012, 'Advances in network and system security', Concurrency and Computation Practice and Experience, 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810

Yin J; Wang Y; Hu J, 2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397

Xie Y; Hu J; Tang S; Huang , 2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010

Hu J; Xiang Y; Zhou W, 2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123

Wang S; Hu J, 2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004

Yu S; Zhou W; Jia W; Hu J, 2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065

Yin J; Wang Y; Hu J, 2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004

Xi K; Hu J; Han F, 2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797

Xie M; Hu J; Han S; Chen H, 2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, http://dx.doi.org/10.1109/TPDS.2012.261

Yin J; Fu C; Hu J, 2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005

Xi K; Hu J; Han F, 2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications Iciea 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736

Xiang Y; Hu J; Zhou W, 2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001

Hu J; Bhagavatula V; Bennamoun M; Toh KA, 2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240

Sufi F; Han F; Khalil I; Hu J, 2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226

Xi K; Ahmad T; Han F; Hu J, 2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225

Wang S; Cao J; Hu J, 2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120

Tian B; Han S; Hu J; Dillion T, 2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88

Zhang P; Hu J; Li C; Bennamoun M; Bhagavatula V, 2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003

Hu J; Hoang XD; Khalil I, 2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909

Hu J; Vijaya Kumar BVK; Bennamoun M; Toh K, 2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486

Xi K; Tang Y; Hu J, 2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064

Wang Y; Hu J, 2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73

Ahmad T; Hu J; Wang S, 2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015

Hu J; Khalil I; Han S; Mahmood A, 2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013

Tian B; Han S; Parvin S; Hu J; Das S, 2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022

Guo S; Zeng D; Leung V; Hu J, 2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647

Han S; Tian B; Zhang Y; Hu J, 2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988

Wang Y; Hu J; Phillips D, 2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003

Hu J; Zheng Z, 2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on Ip Operations and Management Proceedings Ipom 2004 Self Measurement and Self Management of Ip Networks and Services, pp. 273 - 277

Hoang XD; Hu J, 2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings IEEE International Conference on Networks Icon, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210

Phillips D; Hu J, 2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings IEEE International Conference on Networks Icon, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271

Hoang XD; Hu J; Bertok P, 2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks Icon, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245

Phillips D; Hu J; Lloyd-Smith B; Harris R, 2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks Icon, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200

Hu JK; Zhou ZG; Chen ZX; Wang LL; Yu YY; Liu J; Zhang B; Li L; Shu Y; Chen JP, 2003, 'Comparative evaluation of immune response after laparoscopical and open total mesorectal excisions with anal sphincter preservation in patients with rectal cancer', WORLD JOURNAL OF GASTROENTEROLOGY, 9, pp. 2690 - 2694

Hoang XD; Hu J, 2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170

Hu J; Xi Z; Jennings A; Lee HYJ; Wahyudi D, 2001, 'DSP application in E-Commerce security', ICASSP IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2, pp. 1005 - 1008

Hu J; Bohn C; Wu HR, 2000, 'Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4

Hu J; Wu HR, 1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals Systems and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389

Hu J; Aldeen M, 1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927

Chen X; Zhang B; Chen Z; Hu J; Wang F; Yang H; Chen J, 'Modified Operation to Treat Types II and III Adenocarcinoma of the Esophagogastric Junction', HEPATO-GASTROENTEROLOGY, 59, pp. 422 - 425, http://dx.doi.org/10.5754/hge11435


Back to profile page