Dynamic defense strategy against advanced persistent threat with insiders P Hu, H Li, H Fu, D Cansever, P Mohapatra 2015 IEEE Conference on Computer Communications (INFOCOM), 747-755, 2015 | 182 | 2015 |
Colorbars: Increasing data rate of led-to-camera communication using color shift keying P Hu, PH Pathak, X Feng, H Fu, P Mohapatra CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015 | 115 | 2015 |
IoTGaze: IoT security enforcement via wireless context analysis T Gu, Z Fang, A Abhishek, H Fu, P Hu, P Mohapatra IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 884-893, 2020 | 51 | 2020 |
Towards learning-automation IoT attack detection through reinforcement learning T Gu, A Abhishek, H Fu, H Zhang, D Basu, P Mohapatra 2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and …, 2020 | 45 | 2020 |
A Model Checking-Based Security Analysis Framework for IoT Systems Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Hu, P Mohapatra High-Confidence Computing, 2021 | 25 | 2021 |
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications H Fu, Z Zheng, S Bose, M Bishop, P Mohapatra Computer Communications (INFOCOM), 2017 Proceedings IEEE, 2017 | 23 | 2017 |
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection H Fu, Z Zheng, S Zhu, P Mohapatra Computer Communications (INFOCOM), 2019 Proceedings IEEE, 2019 | 22* | 2019 |
Foresee: A cross-layer vulnerability detection framework for the internet of things Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Mohapatra 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019 | 16 | 2019 |
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications H Fu, P Hu, Z Zheng, AK Das, PH Pathak, T Gu, S Zhu, P Mohapatra IEEE Transactions on Mobile Computing, 2020 | 15 | 2020 |
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra Sensing, Communication, and Networking (SECON), 2016 13th Annual IEEE …, 2016 | 15 | 2016 |
Towards System-Level Security Analysis of IoT Using Attack Graphs Z Fang, H Fu, T Gu, P Hu, J Song, T Jaeger, P Mohapatra IEEE Transactions on Mobile Computing 23 (2), 1142-1155, 2022 | 5 | 2022 |
Provenance logic: Enabling multi-event based trust in mobile sensing X Wang, H Fu, C Xu, P Mohapatra 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 5 | 2014 |
Integrity and junkiness failure handling for embedding-based retrieval: A case study in social network search W Wang, Y Guo, C Shen, S Ding, G Liao, H Fu, PK Prabhakar Proceedings of the 46th International ACM SIGIR Conference on Research and …, 2023 | 4 | 2023 |
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage Y Wu, H Fu, G Zhang, B Zhao, M Xu, Y Zou, X Feng, P Hu International Conference on Wireless Algorithms, Systems, and Applications …, 2022 | 3 | 2022 |
Trust Exploitation and Attention Competition: A Game Theoretical Model H Fu, H Li, Z Zheng, P Hu, P Mohapatra Military Communications Conference, MILCOM 2016, 2016 | 3* | 2016 |
造船监理员调度模型和混合遗传算法求解 符昊, 葛洪伟, 邵长鲁, 朱亮 计算机工程与应用 50 (21), 238-242, 2014 | | 2014 |