A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 1759 | 2016 |
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions X Yin, Y Zhu, J Hu ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021 | 496 | 2021 |
A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns G Creech, J Hu IEEE Transactions on Computers 63 (4), 807-819, 2013 | 438 | 2013 |
Generation of a new IDS test dataset: Time to retire the KDD collection G Creech, J Hu 2013 IEEE Wireless Communications and Networking Conference (WCNC), 4487-4492, 2013 | 395 | 2013 |
A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing Y Wang, J Hu, D Phillips IEEE Transactions on Pattern Analysis and Machine Intelligence 29 (4), 573-585, 2007 | 375 | 2007 |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage W Shen, J Qin, J Yu, R Hao, J Hu IEEE Transactions on Information Forensics and Security 14 (2), 331-346, 2019 | 355 | 2019 |
A holistic review of Network Anomaly Detection Systems: A comprehensive survey N Moustafa, J Hu, J Slay Journal of Network and Computer Applications 128, 33-55, 2019 | 349 | 2019 |
Energy Big data analytics and security: challenges and opportunities J Hu, AV Vasilakos IEEE Transactions on Smart Grid 7 (5), 2423-2436, 2016 | 269 | 2016 |
Security and Accuracy of Fingerprint-Based Biometrics: A Review W Yang, S Wang, J Hu, G Zheng, C Valli Symmetry 11 (2), 141, 2019 | 266 | 2019 |
A novel statistical technique for intrusion detection systems E Kabir, J Hu, H Wang, G Zhuo Future Generation Computer Systems 79, 303-318, 2018 | 252 | 2018 |
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection J Hu, X Yu, D Qiu, HH Chen IEEE network 23 (1), 42-47, 2009 | 246 | 2009 |
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling W Haider, J Hu, J Slay, BP Turnbull, Y Xie Journal of Network and Computer Applications 87, 185-192, 2017 | 229 | 2017 |
A fingerprint and finger-vein based cancelable multi-biometric system W Yang, S Wang, J Hu, G Zheng, C Valli Pattern Recognition 78, 242-251, 2018 | 227 | 2018 |
A framework for distributed key management schemes in heterogeneous wireless sensor networks K Lu, Y Qian, J Hu Performance, Computing, and Communications Conference, 2006. IPCCC 2006 …, 2006 | 202 | 2006 |
An efficient privacy-preserving ranked keyword search method C Chen, X Zhu, P Shen, J Hu, S Guo, Z Tari, AY Zomaya IEEE Transactions on Parallel and Distributed Systems 27 (4), 951-963, 2016 | 201 | 2016 |
Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach S Wang, J Hu Pattern Recognition 45 (12), 4129-4137, 2012 | 201 | 2012 |
Detection of denial-of-service attacks based on computer vision techniques Z Tan, A Jamdagni, X He, P Nanda, RP Liu, J Hu IEEE transactions on computers 64 (9), 2519-2533, 2015 | 197 | 2015 |
Pair-polar coordinate-based cancelable fingerprint templates T Ahmad, J Hu, S Wang Pattern Recognition 44 (10-11), 2555-2564, 2011 | 191 | 2011 |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems N Moustafa, E Adi, B Turnbull, J Hu IEEE Access 6, 32910-32924, 2018 | 178 | 2018 |
Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection M Shen, B Ma, L Zhu, R Mijumbi, X Du, J Hu IEEE Transactions on Information Forensics and Security 13 (4), 940-953, 2018 | 177 | 2018 |