Search Results - "Hu, Jiankun"

Refine Results
  1. 1

    A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns by Creech, Gideon, Jiankun Hu

    Published in IEEE transactions on computers (01-04-2014)
    “…Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based…”
    Get full text
    Journal Article
  2. 2

    A survey of network anomaly detection techniques by Ahmed, Mohiuddin, Naser Mahmood, Abdun, Hu, Jiankun

    “…Information and Communication Technology (ICT) has a great impact on social wellbeing, economic growth and national security in todays world. Generally, ICT…”
    Get full text
    Journal Article
  3. 3

    Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage by Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun

    “…With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is…”
    Get full text
    Journal Article
  4. 4

    A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing by Yi Wang, Jiankun Hu, Phillips, D.

    “…In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior…”
    Get full text
    Journal Article
  5. 5

    Energy Big Data Analytics and Security: Challenges and Opportunities by Jiankun Hu, Vasilakos, Athanasios V.

    Published in IEEE transactions on smart grid (01-09-2016)
    “…The limited available fossil fuels and the call for sustainable environment have brought about new technologies for the high efficiency in the use of fossil…”
    Get full text
    Journal Article
  6. 6

    Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach by Wang, Song, Hu, Jiankun

    Published in Pattern recognition (01-12-2012)
    “…Registration-based cancelable template schemes rely on accurate fingerprint image alignment, which is very difficult to achieve. In this paper, by exploiting…”
    Get full text
    Journal Article
  7. 7

    Design of alignment-free cancelable fingerprint templates via curtailed circular convolution by Wang, Song, Hu, Jiankun

    Published in Pattern recognition (01-03-2014)
    “…Fraudulent use of stolen fingerprint data and privacy invasion by tracking individuals unlawfully with shared or stolen fingerprint data justify the…”
    Get full text
    Journal Article
  8. 8

    Superpixel-Based Graphical Model for Remote Sensing Image Mapping by Zhang, Guangyun, Jia, Xiuping, Hu, Jiankun

    “…Object-oriented remote sensing image classification is becoming more and more popular because it can integrate spatial information from neighboring regions of…”
    Get full text
    Journal Article
  9. 9

    Security and Accuracy of Fingerprint-Based Biometrics: A Review by Yang, Wencheng, Wang, Song, Hu, Jiankun, Zheng, Guanglou, Valli, Craig

    Published in Symmetry (Basel) (01-02-2019)
    “…Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most…”
    Get full text
    Journal Article
  10. 10

    Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey by Wang, Min, Yin, Xuefei, Zhu, Yanming, Hu, Jiankun

    Published in Sensors (Basel, Switzerland) (07-07-2022)
    “…Cognitive biometrics is an emerging branch of biometric technology. Recent research has demonstrated great potential for using cognitive biometrics in…”
    Get full text
    Journal Article
  11. 11

    Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection by Meng Shen, Baoli Ma, Liehuang Zhu, Mijumbi, Rashid, Xiaojiang Du, Jiankun Hu

    “…Constrained shortest distance (CSD) querying is one of the fundamental graph query primitives, which finds the shortest distance from an origin to a…”
    Get full text
    Journal Article
  12. 12

    A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures by Li, Cai, Hu, Jiankun

    “…Alignment-free fingerprint cryptosystems perform matching using relative information between minutiae, e.g., local minutiae structures, is promising, because…”
    Get full text
    Journal Article
  13. 13

    Engineering controllable water transport of biosafety cuttlefish juice solar absorber toward remarkably enhanced solar-driven gas-liquid interfacial evaporation by Li, Zhengtong, Zhang, Jing, Zang, Shaohong, Yang, Chao, Liu, Yang, Jing, Fei, Jing, Hua, Hu, Jiankun, Wang, Chengbing, Zhou, Yingtang

    Published in Nano energy (01-07-2020)
    “…Recently, solar-driven gas-liquid interfacial evaporation has mainly concentrated on the improvement of sunlight absorption efficiency while neglecting the…”
    Get full text
    Journal Article
  14. 14

    A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection by Jiankun Hu, Xinghuo Yu, Qiu, D., Hsiao-Hwa Chen

    Published in IEEE network (01-01-2009)
    “…Extensive research activities have been observed on network-based intrusion detection systems (IDSs). However, there are always some attacks that penetrate…”
    Get full text
    Journal Article
  15. 15

    An Efficient Privacy-Preserving Ranked Keyword Search Method by Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Tari, Zahir, Zomaya, Albert Y.

    “…Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and…”
    Get full text
    Journal Article
  16. 16

    Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images by Farooq, Adnan, Jia, Xiuping, Hu, Jiankun, Zhou, Jun

    Published in Remote sensing (Basel, Switzerland) (17-07-2019)
    “…Automatic weed detection and classification faces the challenges of large intraclass variation and high spectral similarity to other vegetation. With the…”
    Get full text
    Journal Article
  17. 17

    Generation of a new IDS test dataset: Time to retire the KDD collection by Creech, Gideon, Jiankun Hu

    “…Intrusion detection systems are generally tested using datasets compiled at the end of last century, justified by the need for publicly available test data and…”
    Get full text
    Conference Proceeding
  18. 18

    A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems by Khan, Misbah, den Hartog, Frank, Hu, Jiankun

    Published in Sensors (Basel, Switzerland) (26-10-2022)
    “…The basic properties of blockchain, such as decentralization, security, and immutability, show promising potential for IoT applications. The main…”
    Get full text
    Journal Article
  19. 19

    Detection of Denial-of-Service Attacks Based on Computer Vision Techniques by Zhiyuan Tan, Jamdagni, Aruna, Xiangjian He, Nanda, Priyadarsi, Ren Ping Liu, Jiankun Hu

    Published in IEEE transactions on computers (01-09-2015)
    “…Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task…”
    Get full text
    Journal Article
  20. 20