|FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping|
H. Fu, Z. Zheng, A. Das, P. H. Pathak, P. Hu, P. Mohapatra
IEEE SECON, 2016.
|Trust Exploitation and Attention Competition: A Game Theoretical Model|
H. Fu, H. Li, Z. Zheng, P. Hu, P. Mohapatra
|Dynamic Defense Strategy against Advanced Persistent Threat with Insiders|
P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra
IEEE INFOCOM, 2015.
|Visible Light Communication, Networking and Sensing: A Survey, Potential and Challenges|
P. H. Pathak, X. Feng, P. Hu, P. Mohapatra
IEEE Communications Surveys and Tutorials, Vol. 17, 2015.
|ColorBars: Increasing Data Rate of LED-to-Camera Communication using Color Shift Keying|
P. Hu, P. H. Pathak, X. Feng, H. Fu, P. Mohapatra
ACM CONEXT, 2015.
| Stealthy Attacks Meets Insider Threats: A Three-Player Game Model|
X. Feng, Z. Zheng, P. Hu, D. Cansever, P. Mohapatra
Disclaimer: All materials listed are subject to copyright by their respective owners or conference organizers.