|Trust Exploitation and Attention Competition: A Game Theoretical Model|
H. Fu, H. Li, Z. Zheng, P. Hu, P. Mohapatra
|Dynamic Defense Strategy against Advanced Persistent Threat with Insiders|
P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra
IEEE INFOCOM, 2015.
|Using Humans as Sensors: An Estimation-theoretic Perspective|
D. Wang, M. Amin, S. Li, T. Abdelzaher, L. Kaplan, S. Gu, C. Pan, H. Liu, C. Aggarwal, R. Ganti, X. Wang, P. Mohapatra, B. Szymanski, H. Le
IEEE/ACM IPSN, 2014.
|Heterogeneous Wireless Access in Large Mesh Networks|
H. Liu, X. Liu, C. N. Chuah, P. Mohapatra
IEEE MASS, 2008.
|Scheduling Multiple Partially Overlapped Channels in Wireless Mesh Networks|
H. Liu, H. Yu, X. Liu, C. N. Chuah, P. Mohapatra
Disclaimer: All materials listed are subject to copyright by their respective owners or conference organizers.