Select Publications

Preprints

Abdelfattah S; Kasmarik K; Hu J, 2023, A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments, http://dx.doi.org/10.48550/arxiv.2308.09734

Yin X; Zhu Y; Xie Y; Hu J, 2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, http://dx.doi.org/10.1109/OJCS.2022.3199755

Zhu Y; Yin X; Jia X; Hu J, 2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, http://arxiv.org/abs/2207.00587v1

Zhu Y; Yin X; Hu J, 2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, http://arxiv.org/abs/2206.12885v1

Yin X; Wang S; Zhu Y; Hu J, 2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, http://dx.doi.org/10.1109/JIOT.2022.3204246

Wang M; Wang S; Hu J, 2022, Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems, http://dx.doi.org/10.48550/arXiv.2203.16730

Tran NN; Pota HR; Tran QN; Yin X; Hu J, 2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, http://arxiv.org/abs/2003.05071v1

Tran NN; Pota HR; Tran QN; Hu J, 2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, http://dx.doi.org/10.48550/arxiv.2003.05088

Zhang J; Jia X; Hu J; Chanussot J, 2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, http://dx.doi.org/10.1109/TGRS.2020.2976855

Zhang J; Jia X; Hu J, 2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, http://dx.doi.org/10.1109/TGRS.2019.2953181

Shen M; Liao Z; Zhu L; Mijumbi R; Du X; Hu J, 2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, http://dx.doi.org/10.48550/arxiv.1810.03323

Shen M; Ma B; Zhu L; Mijumbi R; Du X; Hu J, 2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, http://dx.doi.org/10.48550/arxiv.1809.07912

An S; Boussaid F; Bennamoun M; Hu J, 2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, http://dx.doi.org/10.48550/arxiv.1703.10355


Back to profile page