|FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping|
H. Fu, Z. Zheng, A. Das, P. H. Pathak, P. Hu, P. Mohapatra
IEEE SECON, 2016.
|Trust Exploitation and Attention Competition: A Game Theoretical Model|
H. Fu, H. Li, Z. Zheng, P. Hu, P. Mohapatra
|Dynamic Defense Strategy against Advanced Persistent Threat with Insiders|
P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra
IEEE INFOCOM, 2015.
|ColorBars: Increasing Data Rate of LED-to-Camera Communication using Color Shift Keying|
P. Hu, P. H. Pathak, X. Feng, H. Fu, P. Mohapatra
ACM CONEXT, 2015.
|Provenance Logic: Enabling Multi-Event Based Trust in Mobile Sensing|
X. Wang, H. Fu, C. Xu, P. Mohapatra
IEEE IPCCC, 2014.
Disclaimer: All materials listed are subject to copyright by their respective owners or conference organizers.