Journal papers

[17] H. Cao, et. al. "Bring AI to Life," APAC CIO Advisor, Special Issue on Data Analytics, 2019 (Web)

[16] H. Li, W. Li, H. Cao, S. Wang, F. Huang, A.C. Kot, "Unsupervised Domain Adaptation for Face Anti-Spoofing," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 13(7), pp. 1794-1809, 2018

[15] H. Cao, et. al. "Managing Uncertainty with an Analytics-Driven Supply Chain," APAC CIO Outlook, 2018 (Web)

[14] H. Cao, K.C.C. Chang, "Nonintrusive Smartphone User Verification Using Anonymized Multimodal Data," IEEE Trans. on Knowledge and Data Engineering (TKDE), Vol. 31(3), pp. 479-492, 2019 (Draft PDF)

[13] H. Cao, M. Bhandari, "Powering Data-Driven Innovation," APAC CIO Outlook, Special Issue on Bid Data, August 2017 (PDF, Web)

[12] H. Cao, M. Lin, "Mining Smartphone Data for App Usage Prediction and Recommendations: A Survey," Pervasive and Mobile Computing (PMC), vol. 37, pp. 1-22, June 2017 (Draft PDF)

[11] G.I. Webb, R. Hyde, H. Cao, H.L. Nguyen, F. Petitjean, "Characterizing Concept Drift," Data Mining and Knowledge Discovery (DMKD), vol. 30(4), pp. 964-994, Apr 2016 (Generator Code, PDF)

[10] M. Wu, H. Cao, J. Cao, H.L. Nguyen, J. B. Gomez, S.P. Krishnaswamy, "An Overview of State-of-the-Art Partial Discharge Analysis Techniques for Condition Monitoring," IEEE Electrical Insulation Magazine (EIM), vol. 31(6), pp. 22-35, 2015

[9] H. Cao, V. Y. F. Tan and J. Z. F. Pang, “A Parsimonious Mixture of Gaussian Trees Model for Oversampling in Imbalanced and Multi-Modal Time-Series Classification,” IEEE Trans. on Neural Network and Learning System (TNNLS), vol. 25(12), pp. 2226-2239, 2014 (Details, PDF)

[8] H. Cao and A.C. Kot, “On Establishing Edge Adaptive Grid for Bi-Level Image Data Hiding,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 8(9), pp. 1508-1518, 2013 (Details, Software (32-bit Windows), PDF)

[7] J. Fan, H. Cao and A.C. Kot, “Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 8(4), pp. 608-618, 2013.

[6] H. Cao, X.-L. Li, Y.-K. Woon and S.-K. Ng. “Integrated Oversampling for Imbalanced Time Series Classification,” IEEE Trans. on Knowledge and Data Engineering (TKDE), vol. 25(12), pp. 2809-2822, 2013. (PDF, Code, DemoScript)

[5] H. Cao and A.C. Kot, “Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection,” LNCS Trans. on Data Hiding and Multimedia Security (DHMMS), vol. 7110/2012, pp. 63-81, 2012 (PDF)

[4] H. Cao and A.C. Kot, “Manipulation Detection on Image Patches using FusionBoost,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 7(3), pp. 992-1002, 2012 (PDF, Demosaicing Feature Tool)

[3] H. Cao and A.C. Kot, “Detection of Tampering Inconsistencies on Mobile Photos,” in Proc. Int. Workshop on Digital Watermarking (IWDW), Lecture Notes in Computer Science, pp. 105-119, Seoul, Oct. 2010 (Best Paper Award) (PDF, PPT)

[2] H. Cao and A.C. Kot, “Lossless Data Embedding in Electronic Inks,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 5(2), pp. 314-323, June 2010 (PDF)

[1] H. Cao and A.C. Kot, “Accurate Detection of Demosaicing Regularity for Digital Image Forensics,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 4(4-2), pp. 899-910, Dec. 2009 (PDF, Demosaicing Feature Tool)