Prof. Jiankun Hu
Prof. Jiankun Hu
University of New South Wales, Canberra
Verified email at adfa.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of network anomaly detection techniques
M Ahmed, AN Mahmood, J Hu
Journal of Network and Computer Applications 60, 19-31, 2016
4402016
A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
Y Wang, J Hu, D Phillips
IEEE Transactions on Pattern Analysis and Machine Intelligence 29 (4), 573-585, 2007
3302007
A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns
G Creech, J Hu
IEEE Transactions on Computers 63 (4), 807-819, 2013
1912013
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
J Hu, X Yu, D Qiu, HH Chen
IEEE network 23 (1), 42-47, 2009
182*2009
A framework for distributed key management schemes in heterogeneous wireless sensor networks
K Lu, Y Qian, J Hu
Performance, Computing, and Communications Conference, 2006. IPCCC 2006 …, 2006
1732006
Generation of a new IDS test dataset: Time to retire the KDD collection
G Creech, J Hu
2013 IEEE Wireless Communications and Networking Conference (WCNC), 4487-4492, 2013
1492013
Pair-polar coordinate-based cancelable fingerprint templates
T Ahmad, J Hu, S Wang
Pattern Recognition 44 (10-11), 2555-2564, 2011
1402011
Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
S Wang, J Hu
Pattern Recognition 45 (12), 4129-4137, 2012
1362012
Global ridge orientation modeling for partial fingerprint identification
Y Wang, J Hu
IEEE Transactions on Pattern Analysis and Machine Intelligence 33 (1), 72-87, 2011
1342011
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
J Hu, HH Chen, TW Hou
Computer Standards & Interfaces 32 (5-6), 274-280, 2010
1272010
An efficient privacy-preserving ranked keyword search method
C Chen, X Zhu, P Shen, J Hu, S Guo, Z Tari, AY Zomaya
IEEE Transactions on Parallel and Distributed Systems 27 (4), 951-963, 2016
1212016
A multi-layer model for anomaly intrusion detection using program sequences of system calls
XD Hoang, J Hu, P Bertok
Proc. 11th IEEE Int’l. Conf, 2003
1192003
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
XD Hoang, J Hu, P Bertok
Journal of Network and Computer Applications 32 (6), 1219-1228, 2009
1152009
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
Y Wang, J Hu, F Han
Applied Mathematics and Computation 185 (2), 823-833, 2007
1152007
A k-nearest neighbor approach for user authentication through biometric keystroke dynamics
J Hu, D Gingrich, A Sentosa
2008 IEEE International Conference on Communications, 1556-1560, 2008
1082008
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
XA Hoang, J Hu
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
1012004
A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
K Xi, T Ahmad, F Han, J Hu
Security and Communication Networks 4 (5), 487-499, 2011
992011
A pixel-based scrambling scheme for digital medical images protection
J Hu, F Han
Journal of Network and Computer Applications 32 (4), 788-794, 2009
982009
Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks
M Xie, J Hu, S Han, HH Chen
IEEE Transactions on Parallel and Distributed Systems 24 (8), 1661-1670, 2013
972013
Building a SCADA security testbed
C Queiroz, A Mahmood, J Hu, Z Tari, X Yu
2009 Third International Conference on Network and System Security, 357-364, 2009
952009
The system can't perform the operation now. Try again later.
Articles 1–20