Jiankun Hu | The University of New South Wales (original) (raw)

Papers by Jiankun Hu

Research paper thumbnail of Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey

Research paper thumbnail of Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT

IEEE Transactions on Cloud Computing, Jul 1, 2021

Research paper thumbnail of Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks

IEEE Transactions on Computers, 2014

Research paper thumbnail of Content-based multi-source encrypted image retrieval in clouds with privacy preservation

Future Generation Computer Systems, Aug 1, 2020

Research paper thumbnail of Stable EEG Biometrics Using Convolutional Neural Networks and Functional Connectivity

Research paper thumbnail of IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks

arXiv (Cornell University), Oct 8, 2018

Research paper thumbnail of A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems

Research paper thumbnail of A Multistaged Automatic Restoration of Noisy Microscopy Cell Images

IEEE Journal of Biomedical and Health Informatics, 2015

Research paper thumbnail of A novel statistical technique for intrusion detection systems

Future Generation Computer Systems, Feb 1, 2018

Research paper thumbnail of FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement

arXiv (Cornell University), Jun 26, 2022

Research paper thumbnail of Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

arXiv (Cornell University), Sep 20, 2018

Research paper thumbnail of An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls

Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955)

Research paper thumbnail of Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids

IEEE Internet of Things Journal, 2021

Research paper thumbnail of Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field

IEEE Transactions on Dependable and Secure Computing, 2020

Research paper thumbnail of Preface: Security & privacy in social big data

Journal of Parallel and Distributed Computing, 2020

Research paper thumbnail of Multi-Resolution Weed Classification via Convolutional Neural Network and Superpixel Based Local Binary Pattern Using Remote Sensing Images

Remote Sensing, 2019

Automatic weed detection and classification faces the challenges of large intraclass variation an... more Automatic weed detection and classification faces the challenges of large intraclass variation and high spectral similarity to other vegetation. With the availability of new high-resolution remote sensing data from various platforms and sensors, it is possible to capture both spectral and spatial characteristics of weed species at multiple scales. Effective multi-resolution feature learning is then desirable to extract distinctive intensity, texture and shape features of each category of weed to enhance the weed separability. We propose a feature extraction method using a Convolutional Neural Network (CNN) and superpixel based Local Binary Pattern (LBP). Both middle and high level spatial features are learned using the CNN. Local texture features from superpixel-based LBP are extracted, and are also used as input to Support Vector Machines (SVM) for weed classification. Experimental results on the hyperspectral and remote sensing datasets verify the effectiveness of the proposed met...

Research paper thumbnail of Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

IEEE Transactions on Information Forensics and Security, 2019

Research paper thumbnail of Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks

Research paper thumbnail of A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

Research paper thumbnail of Top-k future system call prediction based multi-module anomaly detection system

2013 6th International Congress on Image and Signal Processing (CISP), 2013