ORCID as entered in ROS

Select Publications
2016, 'Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks', in Proceedings of the IEEE International Conference on Industrial Technology, Taipei, Taiwamn, pp. 1832 - 1837, presented at 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, Taiwamn, 14 March 2016 - 17 March 2016, http://dx.doi.org/10.1109/ICIT.2016.7475043
,2016, 'Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, Springer Nature, China, pp. 90 - 101, presented at The 8th International Conference on Brain-Inspired Cognitive Systems, China, - , http://dx.doi.org/10.1007/978-3-319-49685-6_9
,2015, 'Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications, ICIEA 2015, ., pp. 513 - 517, presented at 10th IEEE Conference on Industrial Electronics and Applications, ., 20 November 2015 - 24 November 2015, http://dx.doi.org/10.1109/ICIEA.2015.7334166
,2015, 'A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications Iciea 2015, pp. 312 - 316, http://dx.doi.org/10.1109/ICIEA.2015.7334131
,2015, 'Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications Iciea 2015, pp. 306 - 311, http://dx.doi.org/10.1109/ICIEA.2015.7334130
,2015, 'Emergency data gathering with buffer constraint in actuator-based wireless sensor networks', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications Iciea 2015, pp. 284 - 289, http://dx.doi.org/10.1109/ICIEA.2015.7334126
,2015, 'HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search', in Proceedings of the 2015 10th IEEE Conference on Industrial Electronics and Applications Iciea 2015, pp. 290 - 295, http://dx.doi.org/10.1109/ICIEA.2015.7334127
,2015, 'Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, New York, NY, USA, pp. 349 - 355, presented at 2015 IEEE 2nd International Conference on : Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.11
,2015, 'Threshold Attribute-Based Signcryption in Standard Model', in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, IEEE, New York, pp. 187 - 193, presented at The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/CSCloud.2015.16
,2015, 'Multi-constrained orientation field modeling and its application for fingerprint indexing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, pp. 176 - 187, presented at Network and System Security, 9th International Conference, New York, 03 November 2015 - 05 November 2015, http://dx.doi.org/10.1007/978-3-319-25645-0_12
,2015, 'A Reputation Revision Method Based on the Credibility for Cloud Services', in Choi SB (ed.), PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, ATLANTIS PRESS, PEOPLES R CHINA, Zhuhai, pp. 581 - 586, presented at 3rd International Conference on Mechatronics and Industrial Informatics (ICMII), PEOPLES R CHINA, Zhuhai, 30 October 2015 - 31 October 2015, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000371518700099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2015, 'A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection', in Proceedings of the IEEE International Conference on Industrial Technology, pp. 28 - 33, http://dx.doi.org/10.1109/ICIT.2015.7125071
,2015, 'Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey', in Proceedings 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems Isads 2015, pp. 63 - 70, http://dx.doi.org/10.1109/ISADS.2015.13
,2015, 'Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 978 - 982, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 01 April 2015 - 01 April 2015, http://dx.doi.org/10.1109/FSKD.2014.6980972
,2014, 'A benchmark 3D fingerprint database', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery Fskd 2014, pp. 935 - 940, http://dx.doi.org/10.1109/FSKD.2014.6980965
,2014, 'A statistical framework for intrusion detection system', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery Fskd 2014, pp. 941 - 946, http://dx.doi.org/10.1109/FSKD.2014.6980966
,2014, 'The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery Fskd 2014, pp. 995 - 999, http://dx.doi.org/10.1109/FSKD.2014.6980975
,2014, 'A survey: Error control methods used in bio-cryptography', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 956 - 962, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980968
,2014, 'Optional multi-biometric cryptosystem based on fuzzy extractor', in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Institute of Electrical and Electronics Engineers Inc., pp. 989 - 994, presented at 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, 19 August 2014 - 21 August 2014, http://dx.doi.org/10.1109/FSKD.2014.6980974
,2014, 'A hierarchical clustering method for big data oriented ciphertext search', in Proceedings IEEE INFOCOM, pp. 559 - 564, http://dx.doi.org/10.1109/INFCOMW.2014.6849292
,2014, 'Fingerprint indexing based on combination of novel minutiae triplet features', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 377 - 388, http://dx.doi.org/10.1007/978-3-319-11698-3_29
,2014, 'Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 542 - 549, http://dx.doi.org/10.1007/978-3-319-11698-3_44
,2013, 'A key management scheme between body sensor networks and the base station', in Proceedings 9th International Conference on Computational Intelligence and Security Cis 2013, pp. 743 - 747, http://dx.doi.org/10.1109/CIS.2013.162
,2013, 'Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD', in Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, pp. 1711 - 1716, http://dx.doi.org/10.1109/CISP.2013.6743952
,2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing Cisp 2013, pp. 1724 - 1729, http://dx.doi.org/10.1109/CISP.2013.6743954
,2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference Wcnc, pp. 4340 - 4345, http://dx.doi.org/10.1109/WCNC.2013.6555276
,2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference Wcnc, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301
,2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications Iciea 2013, pp. 1376 - 1381, http://dx.doi.org/10.1109/ICIEA.2013.6566581
,2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013, http://dx.doi.org/10.1007/978-3-642-38631-2_71
,2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012, http://dx.doi.org/10.1007/978-3-642-31588-6_64
,2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012, http://dx.doi.org/10.1109/ICIEA.2012.6360846
,2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.23
,2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.51
,2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.171
,2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.173
,2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.263
,2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011
,2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011, http://dx.doi.org/10.1109/DASC.2011.46
,2011, 'Foreword from the conference chairs', in Proceedings 2011 5th International Conference on Network and System Security NSS 2011, http://dx.doi.org/10.1109/ICNSS.2011.6059949
,2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011
,2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975740
,2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975739
,2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975591
,2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975738
,2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings 2010 4th International Conference on Network and System Security NSS 2010, http://dx.doi.org/10.1109/NSS.2010.5
,2010, 'A Correlation based Face Verification Scheme Designed for Mobile Device Access Control: From Algorithm to Java ME Implementation', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 340 - +, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010
,2010, 'Highly Efficient One-time Pad Key Generation For Large Volume Medical Data Protection', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 353 - 358, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010
,2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000293666000066&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology Futuretech 2010 Proceedings, http://dx.doi.org/10.1109/FUTURETECH.2010.5482638
,2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, PEOPLES R CHINA, Xian, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, PEOPLES R CHINA, Xian, 25 May 2009 - 27 May 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000273183200122&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,