Professor Jiankun Hu
Jiankun Hu is a full professor of Cyber Security at the School of Engineering and Information Technology, the University of New South Wales at the Australian Defence Force Academy (UNSW@¶¶Òõ¶ÌÊÓƵ), Australia. His major research interest is in computer networking and computer security, especially biometric security. He has been awarded tenÌýAustralia Research Council Grants. He served as Security Symposium Co-Chair for IEEE GLOBECOM ’08 and IEEE ICC ’09. ÌýHe was Program Co-Chair of the 2008 International Symposium on Computer Science and its Applications. HeÌýis serving as an Associate Editor of the following journals: Journal of Security and Communication Networks, Wiley; ÌýIEEE TIFS (Senior Area Editor); KSII TIIS (Area Editor); IET CPS; IEEE OJCS; and Wiley S&P.Ìý
He received a Bachelor’s degree in industrial automation in 1983 from Hunan University, PR China, a PhD degree in engineering in 1993 from the Harbin Institute of Technology, PR China, and a Master’s degree for research in computer science and software engineering from Monash University, Australia, in 2000.
In 1995 he completed his postdoctoral fellow work in the Department of Electrical and Electronic Engineering, Harbin Shipbuilding College, PR China. He was a research fellow of the Alexander von Humboldt Foundation in the Department of Electrical and Electronic Engineering, Ruhr University, Germany, during 1995–1997. He worked as a research fellow in the Department of Electrical and Electronic Engineering, Delft University of Technology, the Netherlands, in 1997. Before he moved to RMIT University Australia, he was a research fellow in the Department of Electrical and Electronic Engineering, University of Melbourne, Australia.
Ìý
¶¶Òõ¶ÌÊÓƵ Dataset download on one link:Ìý
Ìý
Ìý
Ìý
- Publications
- Media
- Grants
- Awards
- Research Activities
- Engagement
- Teaching and Supervision
1. J. Hu,Ìý"Energy Big Data Analytics from a Cybersecurity Perspective,"ÌýDP190103660.
This project investigates data-driven algorithms for the privacy and security of smart grids. Research outputs include a research dataset for false data injection attack () and the following publications.
Ìý
Publications
(1) Khan, Misbah, Frank den Hartog, and Jiankun Hu. 2022. "A Survey and Ontology of Blockchain Consensus Algorithms for Resource-Constrained IoT Systems"ÌýSensorsÌý22, no. 21: 8188. https://doi.org/10.3390/s22218188.Ìý.
(2)ÌýX. Yin, S. Wang, Y. Zhu and J. Hu, "A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications," inÌýIEEE Internet of Things Journal, vol. 10, no. 1, pp. 877-892, 1 Jan.1, 2023, doi: 10.1109/JIOT.2022.3204246.Ìý
(3)ÌýQ. N. Tran, B. P. Turnbull, M. Wang and J. Hu, "A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol," inÌýIEEE Open Journal of the Computer Society, vol. 3, pp. 1-10, 2022, doi: 10.1109/OJCS.2021.3138332.Ìý
(4)ÌýH. -Y. Tran, J. Hu and H. R. Pota, "A Privacy-Preserving State Estimation Scheme for Smart Grids," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3940-3956, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3210017.Ìý
(5)ÌýX. Yin, Y. Zhu and J. Hu, "A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids," inÌýIEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1957-1967, March 2022, doi: 10.1109/TII.2021.3102332.Ìý
(6)ÌýX. Yin, Y. Zhu and J. Hu, "A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions," inÌýIEEE Open Journal of the Computer Society, vol. 2, pp. 370-381, 2021, doi: 10.1109/OJCS.2021.3119572.Ìý
(7)ÌýH. -Y. Tran, J. Hu, X. Yin and H. R. Pota, "An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids," inÌýIEEE Transactions on Information Forensics and Security, vol. 18, pp. 2538-2552, 2023, doi: 10.1109/TIFS.2023.3267892.Ìý
(8)ÌýQ. N. Tran, B. P. Turnbull and J. Hu, "Biometrics and Privacy-Preservation: How Do They Evolve?," inÌýIEEE Open Journal of the Computer Society, vol. 2, pp. 179-191, 2021, doi: 10.1109/OJCS.2021.3068385.Ìý.
(9)ÌýKhan, Misbah, Frank den Hartog, and Jiankun Hu. 2024. "Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation"ÌýSensorsÌý24, no. 5: 1583. https://doi.org/10.3390/s24051583.Ìý.
(10)ÌýM. Wang, S. Wang and J. Hu, "PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4258-4272, 1 Sept.-Oct. 2023, doi: 10.1109/TDSC.2022.3218782.Ìý
(11)ÌýX. Yin, Y. Zhu, Y. Xie and J. Hu, "PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems," inÌýIEEE Open Journal of the Computer Society, vol. 3, pp. 149-161, 2022, doi: 10.1109/OJCS.2022.3199755.Ìý.
(12)ÌýH. Ma, Y. Xie, S. Tang, J. Hu and X. Liu, "Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field," inÌýIEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1735-1752, 1 May-June 2022, doi: 10.1109/TDSC.2020.3036664.Ìý.
(13)ÌýH. -T. Wu, K. Zheng, Q. Huang and J. Hu, "Contrast Enhancement of Multiple Tissues in MR Brain Images With Reversibility," in IEEE Signal Processing Letters, vol. 28, pp. 160-164, 2021, doi: 10.1109/LSP.2020.3048840.Ìý
(14)ÌýJ. Zhang, X. Jia and J. Hu, "Uncertainty-Aware Forward Correction for Weakly Supervised Solar Panel Mapping From High-Resolution Aerial Images," in IEEE Geoscience and Remote Sensing Letters, vol. 19, pp. 1-5, 2022, Art no. 6504005, doi: 10.1109/LGRS.2021.3132935.Ìý
(15)ÌýH. Du, Z. Che, M. Shen, L. Zhu and J. Hu, "Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 616-631, 2024, doi: 10.1109/TIFS.2023.3326984.Ìý
(16)ÌýJ. Zhang, X. Jia and J. Hu, "SP-RAN: Self-Paced Residual Aggregated Network for Solar Panel Mapping in Weakly Labeled Aerial Images," in IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-15, 2022, Art no. 5612715, doi: 10.1109/TGRS.2021.3123268.Ìý
(17)ÌýH. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043.Ìý
(18)ÌýQ. N. Tran and J. Hu, "A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2926-2940, 2021, doi: 10.1109/TIFS.2021.3069170.Ìý
(19)ÌýN. N. Tran, H. R. Pota, Q. N. Tran and J. Hu, "Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9422-9435, 1 June 1, 2021, doi: 10.1109/JIOT.2021.3056649.Ìý
(20)ÌýM. Shen, Y. Liu, L. Zhu, X. Du and J. Hu, "Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2046-2059, 2021, doi: 10.1109/TIFS.2020.3046876.Ìý
(21)ÌýXuefei Yin, Yanming Zhu, and Jiankun Hu. 2021. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 54, 6, Article 131 (July 2021), 36 pages. https://doi.org/10.1145/3460427.Ìý.Ìý
(22)ÌýJ. Zhang, X. Jia, J. Zhou, J. Zhang and J. Hu, "Weakly Supervised Solar Panel Mapping via Uncertainty Adjusted Label Transition in Aerial Images," in IEEE Transactions on Image Processing, vol. 33, pp. 881-896, 2024, doi: 10.1109/TIP.2023.3336170.Ìýhttps://zenodo.org/search?q=%22Weakly%20Supervised%20Solar%20Panel%20Mapping%20via%22%20&l=list&p=1&s=10&sort=bestmatch.
Ìý
Ìý
Ìý