|When to Reset Your Keys: Optimal Timing of Security Updates via Learning|
Z. Zheng, N. B. Shroff, P. Mohapatra
|FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping|
H. Fu, Z. Zheng, A. Das, P. H. Pathak, P. Hu, P. Mohapatra
IEEE SECON, 2016.
|VSync: Cloud Based Video Streaming Service for Mobile Devices|
E. Baik, A. Pande, Z. Zheng, P. Mohapatra
IEEE INFOCOM, 2016.
|Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback|
X. Feng, Z. Zheng, D. Cansever, A. Swami, P. Mohapatra
|Trust Exploitation and Attention Competition: A Game Theoretical Model|
H. Fu, H. Li, Z. Zheng, P. Hu, P. Mohapatra
| Stealthy Attacks Meets Insider Threats: A Three-Player Game Model|
X. Feng, Z. Zheng, P. Hu, D. Cansever, P. Mohapatra
Disclaimer: All materials listed are subject to copyright by their respective owners or conference organizers.