Hao Fu
Hao Fu
Dirección de correo verificada de
Citado por
Citado por
Dynamic defense strategy against advanced persistent threat with insiders
P Hu, H Li, H Fu, D Cansever, P Mohapatra
2015 IEEE Conference on Computer Communications (INFOCOM), 747-755, 2015
Colorbars: Increasing data rate of led-to-camera communication using color shift keying
P Hu, PH Pathak, X Feng, H Fu, P Mohapatra
CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015
IoTGaze: IoT security enforcement via wireless context analysis
T Gu, Z Fang, A Abhishek, H Fu, P Hu, P Mohapatra
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 884-893, 2020
Towards learning-automation IoT attack detection through reinforcement learning
T Gu, A Abhishek, H Fu, H Zhang, D Basu, P Mohapatra
2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and …, 2020
A Model Checking-Based Security Analysis Framework for IoT Systems
Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Hu, P Mohapatra
High-Confidence Computing, 2021
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications
H Fu, Z Zheng, S Bose, M Bishop, P Mohapatra
Computer Communications (INFOCOM), 2017 Proceedings IEEE, 2017
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection
H Fu, Z Zheng, S Zhu, P Mohapatra
Computer Communications (INFOCOM), 2019 Proceedings IEEE, 2019
Foresee: A cross-layer vulnerability detection framework for the internet of things
Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Mohapatra
2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications
H Fu, P Hu, Z Zheng, AK Das, PH Pathak, T Gu, S Zhu, P Mohapatra
IEEE Transactions on Mobile Computing, 2020
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping
H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra
Sensing, Communication, and Networking (SECON), 2016 13th Annual IEEE …, 2016
Provenance logic: Enabling multi-event based trust in mobile sensing
X Wang, H Fu, C Xu, P Mohapatra
2014 IEEE 33rd International Performance Computing and Communications …, 2014
Integrity and junkiness failure handling for embedding-based retrieval: A case study in social network search
W Wang, Y Guo, C Shen, S Ding, G Liao, H Fu, PK Prabhakar
Proceedings of the 46th International ACM SIGIR Conference on Research and …, 2023
Towards System-Level Security Analysis of IoT Using Attack Graphs
Z Fang, H Fu, T Gu, P Hu, J Song, T Jaeger, P Mohapatra
IEEE Transactions on Mobile Computing 23 (2), 1142-1155, 2022
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage
Y Wu, H Fu, G Zhang, B Zhao, M Xu, Y Zou, X Feng, P Hu
International Conference on Wireless Algorithms, Systems, and Applications …, 2022
Trust Exploitation and Attention Competition: A Game Theoretical Model
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
Military Communications Conference, MILCOM 2016, 2016
符昊, 葛洪伟, 邵长鲁, 朱亮
计算机工程与应用 50 (21), 238-242, 2014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–16