The University of New South Wales
School Of Engineering And Information Technology
Large scale constrained problems 19 optimization 20 Decomposition approach 21 Variable interaction identification 22 2 3 a b s t r a c t 24 Cooperative Coevolutionary algorithms (CC) have been successful in solving large scale 25... more
Large scale optimization problems are very challenging problems. Most of the recently developed optimization algorithms lose their efficiency when the dimensionality of the problems increases. Decomposing a large scale problem into... more
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scroll chaotic attractors. Initial values of the chaotic... more
Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call... more
Biometric authentication systems can address the problems of genuine user verification and usability suffered by the conventional cryptosystems based on the password and token. However, as biometrics is not replaceable, its privacy has... more
The wide-spread use of mobile devices has made it possible to develop mobile voting system as a complement to the existing electronic voting system. However, due to limited onboard resource, it is challenging to achieve both efficiency... more
In response to the call for papers 127 papers were submitted to the conference. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the... more
- by Jiankun Hu
In this paper, we propose a method to directly estimate a camera's motion parameters by using normal flow vectors. In contrast to traditional methods, which tackle the problem by calculating optical flows or establishing motion... more
Identifying incomplete or partial fingerprints from a large fingerprint database remains a difficult challenge today. Existing studies on partial fingerprints focus on one-to-one matching using local ridge details. In this paper, we... more
An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communication applications related to biometric security. Since... more
Act (HIPAA) has set privacy and security regulations for the US healthcare industry. HIPAA has also established principles for security standards that global e-health industry tends to follow. In this paper, a hybrid public key... more
Current computer networks and systems are facing serious threats from cyber terrorism and crime, which cause huge financial loss and potential life hazard. Although these attack systems have become more easy-to-use, sophisticated, and... more
h i g h l i g h t s • We have proposed a KP-ABE scheme with ''attribute privacy'' features. • We have introduced a general transformation from the KP-ABE scheme to the ABEKS scheme. • We have designed a secure ABEKS scheme by the... more
Being the most important critical infrastructure in Cyber-Physical Systems (CPSs), a smart grid exhibits the complicated nature of large scale, distributed and dynamic environment. Taxonomy of attacks is an effective tool in... more
In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior knowledge of singular points (SPs). It is able to describe the overall ridge... more
Key management has become a challenging issue in the design and deployment of secure wireless sensor networks. A common assumption in most existing distributed key management schemes is that all sensor nodes have the same capability.... more