Jiankun Hu

According to our database1, Jiankun Hu authored at least 188 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2019

2018
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection.
Wireless Communications and Mobile Computing, 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Information Forensics and Security, 2018

Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals.
IEEE Trans. Emerging Topics in Comput. Intellig., 2018

Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Security and Communication Networks, 2018

A fingerprint and finger-vein based cancelable multi-biometric system.
Pattern Recognition, 2018

A new adaptive trust and reputation model for Mobile Agent Systems.
J. Network and Computer Applications, 2018

Evolving Robust Policy Coverage Sets in Multi-Objective Markov Decision Processes Through Intrinsically Motivated Self-Play.
Front. Neurorobot., 2018

A novel statistical technique for intrusion detection systems.
Future Generation Comp. Syst., 2018

A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic.
Computational Intelligence, 2018

Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems.
IEEE Access, 2018

An Effective Zoom-In Approach for Detecting DIM and Small Target Proposals in Satellite Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Weed Classification in Hyperspectral Remote Sensing Images Via Deep Convolutional Neural Network.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Multi-scale Weighted Inherent Fuzzy Entropy for EEG Biomarkers.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

2017
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Information Forensics and Security, 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Security and Communication Networks, 2017

Privacy-preserving identity-based file sharing in smart city.
Personal and Ubiquitous Computing, 2017

Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs.
Pattern Recognition, 2017

A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations.
Pattern Recognition, 2017

A new binary hybrid particle swarm optimization with wavelet mutation.
Knowl.-Based Syst., 2017

Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Network and Computer Applications, 2017

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli.
IMWUT, 2017

Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Key negotiation schemes for body sensor networks on the surface of the human body.
IJAACS, 2017

Preface: Security and privacy in big data clouds.
Future Generation Comp. Syst., 2017

New secure healthcare system using cloud of things.
Cluster Computing, 2017

Latent fingerprint segmentation based on convolutional neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Robust Fingerprint Matching Based on Convolutional Neural Networks.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Robust Contactless Fingerprint Enhancement Algorithm.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Application of 3D Delaunay Triangulation in Fingerprint Authentication System.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Efficient object proposals extraction for target detection in VHR remote sensing images.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video.
Proceedings of the 2017 International Conference on Digital Image Computing: Techniques and Applications, 2017

2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wireless Communications and Mobile Computing, 2016

Energy Big Data Analytics and Security: Challenges and Opportunities.
IEEE Trans. Smart Grid, 2016

An Efficient Privacy-Preserving Ranked Keyword Search Method.
IEEE Trans. Parallel Distrib. Syst., 2016

On Cost-Efficient Sensor Placement for Contaminant Detection in Water Distribution Systems.
IEEE Trans. Industrial Informatics, 2016

A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
IEEE Trans. Information Forensics and Security, 2016

FE-SViT: A SViT-Based Fuzzy Extractor Framework.
ACM Trans. Embedded Comput. Syst., 2016

A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers.
IEEE Trans. Computers, 2016

Threshold attribute-based signcryption and its application to authenticated key agreement.
Security and Communication Networks, 2016

Security and privacy in Internet of things: methods, architectures, and solutions.
Security and Communication Networks, 2016

A blind system identification approach to cancelable fingerprint templates.
Pattern Recognition, 2016

A survey of network anomaly detection techniques.
J. Network and Computer Applications, 2016

A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios.
Future Internet, 2016

Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.
Future Internet, 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Secure searches in the cloud: A survey.
Future Generation Comp. Syst., 2016

Partial fingerprint indexing: a combination of local and reconstructed global features.
Concurrency and Computation: Practice and Experience, 2016

Privacy-Preserving Access to Big Data in the Cloud.
IEEE Cloud Computing, 2016

Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities, 2016

Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Vulnerability analysis of iPhone 6.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Continuous authentication using EEG and face images for trusted autonomous systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Detecting Rare Visual and Auditory Events from EEG Using Pairwise-Comparison Neural Networks.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

A Multistaged Automatic Restoration of Noisy Microscopy Cell Images.
IEEE J. Biomedical and Health Informatics, 2015

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Information Forensics and Security, 2015

Superpixel-Based Graphical Model for Remote Sensing Image Mapping.
IEEE Trans. Geoscience and Remote Sensing, 2015

Energy Minimization in Multi-Task Software-Defined Sensor Networks.
IEEE Trans. Computers, 2015

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks.
IEEE Trans. Computers, 2015

An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks.
Sensors, 2015

Camera motion estimation through monocular normal flow vectors.
Pattern Recognition Letters, 2015

SOLS: A scheme for outsourced location based service.
J. Network and Computer Applications, 2015

A Trusted Mobile Payment Scheme Based on Body Area Networks.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2015

Collaborative Wireless Sensor Networks and Applications.
IJDSN, 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
IJDSN, 2015

A Cloud Security Assessment System Based on Classifying and Grading.
IEEE Cloud Computing, 2015

Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing.
Proceedings of the Network and System Security - 9th International Conference, 2015

Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks.
Wireless Communications and Mobile Computing, 2014

Reliable Bulk-Data Dissemination in Delay Tolerant Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Taxonomy of Attacks for Agent-Based Smart Grids.
IEEE Trans. Parallel Distrib. Syst., 2014

A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement.
IEEE Trans. Information Forensics and Security, 2014

A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns.
IEEE Trans. Computers, 2014

An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures.
Pattern Recognition, 2014

Design of alignment-free cancelable fingerprint templates via curtailed circular convolution.
Pattern Recognition, 2014

A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Network and Computer Applications, 2014

Special issue on "quality of service in wireless and mobile networking".
J. Network and Computer Applications, 2014

Attacks via record multiplicity on cancelable biometrics templates.
Concurrency and Computation: Practice and Experience, 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Computing, 2014

Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features.
Proceedings of the Network and System Security - 8th International Conference, 2014

Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.
Proceedings of the Network and System Security - 8th International Conference, 2014

A hierarchical clustering method for big data oriented ciphertext search.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A benchmark 3D fingerprint database.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A survey: Error control methods used in bio-cryptography.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A statistical framework for intrusion detection system.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
Wireless Communications and Mobile Computing, 2013

An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distrib. Syst., 2013

Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Guest Editorial - Special Issue on Green Telecommunications.
Telecommunication Systems, 2013

Cooperative multi-target tracking in passive sensor-based networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Generation of a new IDS test dataset: Time to retire the KDD collection.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Partial Fingerprint Reconstruction with Improved Smooth Extension.
Proceedings of the Network and System Security - 7th International Conference, 2013

A Finger-Vein Based Cancellable Bio-cryptosystem.
Proceedings of the Network and System Security - 7th International Conference, 2013

A hierarchical pea-based anomaly detection model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy.
IEEE Trans. Industrial Informatics, 2012

Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach.
Pattern Recognition, 2012

Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration.
J. Network and Computer Applications, 2012

Using incremental subspace and contour template for object tracking.
J. Network and Computer Applications, 2012

Special section: Green computing.
Future Generation Comp. Syst., 2012

Advances in network and system security.
Concurrency and Computation: Practice and Experience, 2012

Mobile device access control: an improved correlation based face authentication scheme and its Java ME application.
Concurrency and Computation: Practice and Experience, 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays.
Proceedings of the 11th IEEE International Conference on Trust, 2012

High-Order Terminal Sliding-Mode Observers for Anomaly Detection.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A General Transformation from KP-ABE to Searchable Encryption.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
Security and Communication Networks, 2011

A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Security and Communication Networks, 2011

An embedded DSP hardware encryption module for secure e-commerce transactions.
Security and Communication Networks, 2011

Biometric security for mobile computing.
Security and Communication Networks, 2011

Pair-polar coordinate-based cancelable fingerprint templates.
Pattern Recognition, 2011

Global Ridge Orientation Modeling for Partial Fingerprint Identification.
IEEE Trans. Pattern Anal. Mach. Intell., 2011

A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
J. Network and Computer Applications, 2011

A mutual-healing key distribution scheme in wireless sensor networks.
J. Network and Computer Applications, 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Network and Computer Applications, 2011

The Exploration of Network Coding in IEEE 802.15.4 Networks.
Int. J. Digital Multimedia Broadcasting, 2011

A pitfall in fingerprint bio-cryptographic key generation.
Computers & Security, 2011

Editorial: Advances in network and system security.
Computers & Security, 2011

Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
Comput. J., 2011

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2011

Foreword from the Conference Chairs.
Proceedings of the 5th International Conference on Network and System Security, 2011

On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Bio-Cryptography.
Proceedings of the Handbook of Information and Communication Security, 2010

ECG-Based Authentication.
Proceedings of the Handbook of Information and Communication Security, 2010

Intranet Security via Firewalls.
Proceedings of the Handbook of Information and Communication Security, 2010

Network Traffic Analysis and SCADA Security.
Proceedings of the Handbook of Information and Communication Security, 2010

Host-Based Anomaly Intrusion Detection.
Proceedings of the Handbook of Information and Communication Security, 2010

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Network and Computer Applications, 2010

A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations.
Computer Standards & Interfaces, 2010

Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A pitfall in fingerprint features extraction.
Proceedings of the 11th International Conference on Control, 2010

Generating cancelable biometrie templates using a projection line.
Proceedings of the 11th International Conference on Control, 2010

2009
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection.
IEEE Network, 2009

A pixel-based scrambling scheme for digital medical images protection.
J. Network and Computer Applications, 2009

A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Network and Computer Applications, 2009

Building a SCADA Security Testbed.
Proceedings of the Third International Conference on Network and System Security, 2009

An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009

Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault.
Proceedings of IEEE International Conference on Communications, 2009

2008
Security issues in massive online games.
Security and Communication Networks, 2008

A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics.
Proceedings of IEEE International Conference on Communications, 2008

2007
On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems.
IEEE Trans. on Circuits and Systems, 2007

A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields.
Applied Mathematics and Computation, 2007

Fingerprint images encryption via multi-scroll chaotic attractors.
Applied Mathematics and Computation, 2007

PPN 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems.
Proceedings of IEEE International Conference on Communications, 2007

Generation of Reliable PINs from Fingerprints.
Proceedings of IEEE International Conference on Communications, 2007

Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
A framework for distributed key management schemes in heterogeneous wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications.
Proceedings of the Advances in Biometrics, International Conference, 2006

Enhancements for RTT-Fair HighSpeed TCP.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Modelling of SACK TCP and application to the HTTP File Transfer Environment.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

2004
Analytic models for highspeed TCP fairness analysis.
Proceedings of the 12th IEEE International Conference on Networks, 2004

An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls.
Proceedings of the 12th IEEE International Conference on Networks, 2004

A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms.
Proceedings of the ICETE 2004, 2004

2003
A note on an analytic model for slow start in TCP.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Simulation Study of TCP Performance Over Mobile IPV4 and Mobile IPV6.
Proceedings of the ICEIS 2003, 2003

Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003

2001
DSP application in e-commerce security.
Proceedings of the IEEE International Conference on Acoustics, 2001

1999
Robust adaptive equalization using the filtered-X LMS algorithm.
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999


  Loading...