Search Results - "Hu, Jiankun"
-
1
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Published in IEEE transactions on computers (01-04-2014)“…Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based…”
Get full text
Journal Article -
2
A survey of network anomaly detection techniques
Published in Journal of network and computer applications (01-01-2016)“…Information and Communication Technology (ICT) has a great impact on social wellbeing, economic growth and national security in todays world. Generally, ICT…”
Get full text
Journal Article -
3
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Published in IEEE transactions on information forensics and security (01-02-2019)“…With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is…”
Get full text
Journal Article -
4
A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
Published in IEEE transactions on pattern analysis and machine intelligence (01-04-2007)“…In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior…”
Get full text
Journal Article -
5
Energy Big Data Analytics and Security: Challenges and Opportunities
Published in IEEE transactions on smart grid (01-09-2016)“…The limited available fossil fuels and the call for sustainable environment have brought about new technologies for the high efficiency in the use of fossil…”
Get full text
Journal Article -
6
Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
Published in Pattern recognition (01-12-2012)“…Registration-based cancelable template schemes rely on accurate fingerprint image alignment, which is very difficult to achieve. In this paper, by exploiting…”
Get full text
Journal Article -
7
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
Published in Pattern recognition (01-03-2014)“…Fraudulent use of stolen fingerprint data and privacy invasion by tracking individuals unlawfully with shared or stolen fingerprint data justify the…”
Get full text
Journal Article -
8
Superpixel-Based Graphical Model for Remote Sensing Image Mapping
Published in IEEE transactions on geoscience and remote sensing (01-11-2015)“…Object-oriented remote sensing image classification is becoming more and more popular because it can integrate spatial information from neighboring regions of…”
Get full text
Journal Article -
9
Security and Accuracy of Fingerprint-Based Biometrics: A Review
Published in Symmetry (Basel) (01-02-2019)“…Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most…”
Get full text
Journal Article -
10
Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey
Published in Sensors (Basel, Switzerland) (07-07-2022)“…Cognitive biometrics is an emerging branch of biometric technology. Recent research has demonstrated great potential for using cognitive biometrics in…”
Get full text
Journal Article -
11
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection
Published in IEEE transactions on information forensics and security (01-04-2018)“…Constrained shortest distance (CSD) querying is one of the fundamental graph query primitives, which finds the shortest distance from an origin to a…”
Get full text
Journal Article -
12
A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
Published in IEEE transactions on information forensics and security (01-03-2016)“…Alignment-free fingerprint cryptosystems perform matching using relative information between minutiae, e.g., local minutiae structures, is promising, because…”
Get full text
Journal Article -
13
Engineering controllable water transport of biosafety cuttlefish juice solar absorber toward remarkably enhanced solar-driven gas-liquid interfacial evaporation
Published in Nano energy (01-07-2020)“…Recently, solar-driven gas-liquid interfacial evaporation has mainly concentrated on the improvement of sunlight absorption efficiency while neglecting the…”
Get full text
Journal Article -
14
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
Published in IEEE network (01-01-2009)“…Extensive research activities have been observed on network-based intrusion detection systems (IDSs). However, there are always some attacks that penetrate…”
Get full text
Journal Article -
15
An Efficient Privacy-Preserving Ranked Keyword Search Method
Published in IEEE transactions on parallel and distributed systems (01-04-2016)“…Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and…”
Get full text
Journal Article -
16
Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images
Published in Remote sensing (Basel, Switzerland) (17-07-2019)“…Automatic weed detection and classification faces the challenges of large intraclass variation and high spectral similarity to other vegetation. With the…”
Get full text
Journal Article -
17
Generation of a new IDS test dataset: Time to retire the KDD collection
Published in 2013 IEEE Wireless Communications and Networking Conference (WCNC) (01-04-2013)“…Intrusion detection systems are generally tested using datasets compiled at the end of last century, justified by the need for publicly available test data and…”
Get full text
Conference Proceeding -
18
A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems
Published in Sensors (Basel, Switzerland) (26-10-2022)“…The basic properties of blockchain, such as decentralization, security, and immutability, show promising potential for IoT applications. The main…”
Get full text
Journal Article -
19
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Published in IEEE transactions on computers (01-09-2015)“…Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task…”
Get full text
Journal Article -
20
Morbidity and Mortality of Laparoscopic Versus Open D2 Distal Gastrectomy for Advanced Gastric Cancer: A Randomized Controlled Trial
Published in Journal of clinical oncology (20-04-2016)“…The safety and efficacy of radical laparoscopic distal gastrectomy (LG) with D2 lymphadenectomy for the treatment of advanced gastric cancer (AGC) remain…”
Get full text
Journal Article