What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiankun Hu
Google Scholar
ORCID:
0000-0003-0230-1432
28
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Privacy-Preserving Closest Similar Community Search on Attributed Graphs.
Fangyuan Sun
Jia Yu
Jiankun Hu
2024
journals/tifs
Privacy-Preserving Approximate Minimum Community Search on Large Networks.
Fangyuan Sun
Jia Yu
Jiankun Hu
2024
journals/tifs
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
Hanbiao Du
Zheng Che
Meng Shen
Liehuang Zhu
Jiankun Hu
2024
journals/tifs
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments.
Yahui Li
Han Zhang
Jilong Wang
Xingang Shi
Xia Yin
Zhiliang Wang
Jiankun Hu
Congcong Miao
Jianping Wu
2024
journals/tifs
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud.
Xiaojie Zhu
Peisong Shen
Yueyue Dai
Lei Xu
Jiankun Hu
2024
journals/tifs
Cancellable Deep Learning Framework for EEG Biometrics.
Min Wang
Xuefei Yin
Jiankun Hu
2024
journals/tifs
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
Hao-Tian Wu
Yiu-Ming Cheung
Zhihong Tian
Dingcai Liu
Xiangyang Luo
Jiankun Hu
2024
journals/tifs
Biometrics-Based Authenticated Key Exchange With Multi-Factor Fuzzy Extractor.
Hong-Yen Tran
Jiankun Hu
Wen Hu
2024
conf/provsec
On Sealed-Bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.
Hong-Yen Tran
Jiankun Hu
Shabnam Kasra Kermanshahi
2023
journals/tifs
An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids.
Hong-Yen Tran
Jiankun Hu
Xuefei Yin
Hemanshu R. Pota
2023
journals/tifs
Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN.
Pei Zhang
Fangzhou He
Han Zhang
Jiankun Hu
Xiaohong Huang
Jilong Wang
Xia Yin
Huahong Zhu
Yahui Li
2022
journals/tifs
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems.
Min Wang
Song Wang
Jiankun Hu
2021
journals/tifs
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning.
Shangbin Han
Qianhong Wu
Han Zhang
Bo Qin
Jiankun Hu
Xingang Shi
Linfeng Liu
Xia Yin
2021
journals/tifs
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
Meng Shen
Yiting Liu
Liehuang Zhu
Xiaojiang Du
Jiankun Hu
2021
journals/tifs
A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design.
Quang Nhat Tran
Jiankun Hu
2021
journals/tifs
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
Meng Shen
Hao Yu
Liehuang Zhu
Ke Xu
Qi Li
Jiankun Hu
2020
journals/tifs
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm.
Xuefei Yin
Yanming Zhu
Jiankun Hu
2019
journals/tifs
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
Wenting Shen
Jing Qin
Jia Yu
Rong Hao
Jiankun Hu
2019
journals/tifs
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States.
Min Wang
Heba El-Fiqi
Jiankun Hu
Hussein A. Abbass
2018
journals/tifs
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
Meng Shen
Baoli Ma
Liehuang Zhu
Rashid Mijumbi
Xiaojiang Du
Jiankun Hu
2017
journals/tifs
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks.
Miao Xie
Jiankun Hu
Song Guo
Albert Y. Zomaya
2017
journals/tifs
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
Yujue Wang
Qianhong Wu
Bo Qin
Wenchang Shi
Robert H. Deng
Jiankun Hu
2016
journals/tifs
A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
Cai Li
Jiankun Hu
2016
conf/acisp
Identity-Based Group Encryption.
Xiling Luo
Yili Ren
Jingwen Liu
Jiankun Hu
Weiran Liu
Zhen Wang
Wei Xu
Qianhong Wu
2015
journals/tifs
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
Cai Li
Jiankun Hu
Josef Pieprzyk
Willy Susilo
2014
journals/tifs
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement.
Wencheng Yang
Jiankun Hu
Song Wang
2011
journals/compsec
A pitfall in fingerprint bio-cryptographic key generation.
Peng Zhang
Jiankun Hu
Cai Li
Mohammed Bennamoun
Vijayakumar Bhagavatula
2011
journals/compsec
Editorial: Advances in network and system security.
Yang Xiang
Jiankun Hu
Wanlei Zhou
Coauthors
Albert Y. Zomaya
(1)
Baoli Ma
(1)
Bo Qin
(2)
Cai Li
(3)
Congcong Miao
(1)
Dingcai Liu
(1)
Fangyuan Sun
(2)
Fangzhou He
(1)
Han Zhang
(3)
Hanbiao Du
(1)
Hao Yu
(1)
Hao-Tian Wu
(1)
Heba El-Fiqi
(1)
Hemanshu R. Pota
(1)
Hong-Yen Tran
(3)
Huahong Zhu
(1)
Hussein A. Abbass
(1)
Jia Yu
(3)
Jiankun Hu
(28)
Jianping Wu
(1)
Jilong Wang
(2)
Jing Qin
(1)
Jingwen Liu
(1)
Josef Pieprzyk
(1)
Ke Xu
(1)
Lei Xu
(1)
Liehuang Zhu
(4)
Linfeng Liu
(1)
Meng Shen
(4)
Miao Xie
(1)
Min Wang
(3)
Mohammed Bennamoun
(1)
Pei Zhang
(1)
Peisong Shen
(1)
Peng Zhang
(1)
Qi Li
(1)
Qianhong Wu
(3)
Quang Nhat Tran
(1)
Rashid Mijumbi
(1)
Robert H. Deng
(1)
Rong Hao
(1)
Shabnam Kasra Kermanshahi
(1)
Shangbin Han
(1)
Song Guo
(1)
Song Wang
(2)
Vijayakumar Bhagavatula
(1)
Wanlei Zhou
(1)
Wei Xu
(1)
Weiran Liu
(1)
Wen Hu
(1)
Wenchang Shi
(1)
Wencheng Yang
(1)
Wenting Shen
(1)
Willy Susilo
(1)
Xia Yin
(3)
Xiangyang Luo
(1)
Xiaohong Huang
(1)
Xiaojiang Du
(2)
Xiaojie Zhu
(1)
Xiling Luo
(1)
Xingang Shi
(2)
Xuefei Yin
(3)
Yahui Li
(2)
Yang Xiang
(1)
Yanming Zhu
(1)
Yili Ren
(1)
Yiting Liu
(1)
Yiu-Ming Cheung
(1)
Yueyue Dai
(1)
Yujue Wang
(1)
Zhen Wang
(1)
Zheng Che
(1)
Zhihong Tian
(1)
Zhiliang Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to