Publications

2017

When to Reset Your Keys: Optimal Timing of Security Updates via Learning
Z. Zheng, N. B. Shroff, P. Mohapatra
AAAI, 2017.

2016

FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping
H. Fu, Z. Zheng, A. Das, P. H. Pathak, P. Hu, P. Mohapatra
IEEE SECON, 2016.
VSync: Cloud Based Video Streaming Service for Mobile Devices
E. Baik, A. Pande, Z. Zheng, P. Mohapatra
IEEE INFOCOM, 2016.
Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback
X. Feng, Z. Zheng, D. Cansever, A. Swami, P. Mohapatra
MILCOM, 2016.
Trust Exploitation and Attention Competition: A Game Theoretical Model
H. Fu, H. Li, Z. Zheng, P. Hu, P. Mohapatra
MILCOM, 2016.

2015

Stealthy Attacks Meets Insider Threats: A Three-Player Game Model
X. Feng, Z. Zheng, P. Hu, D. Cansever, P. Mohapatra
MILCOM, 2015.

  Disclaimer: All materials listed are subject to copyright by their respective owners or conference organizers.



© Copyright 2017.
2106 Watershed Building, One Shields Avenue, Davis CA 95616     Phone 530-752-3128
Design: Daniel Wu; Webmaster: Yunze Zeng.