Pengfei Hu
Pengfei Hu
Verified email at - Homepage
Cited by
Cited by
Visible light communication, networking, and sensing: A survey, potential and challenges
PH Pathak, X Feng, P Hu, P Mohapatra
IEEE communications surveys & tutorials 17 (4), 2047-2077, 2015
Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
P Hu, H Li, H Fu, D Cansever, P Mohapatra
INFOCOM, 2015 Proceedings IEEE, 747 - 755, 2015
ColorBars: Increasing Data Rate of LED-to-Camera Communication using Color Shift Keying
P Hu, PH Pathak, X Feng, H Fu, P Mohapatra
CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015
Mutual privacy-preserving regression modeling in participatory sensing
K Xing, Z Wan, P Hu, H Zhu, Y Wang, X Chen, Y Wang, L Huang
2013 Proceedings IEEE INFOCOM, 3039-3047, 2013
Stealthy attacks meets insider threats: a three-player game model
X Feng, Z Zheng, P Hu, D Cansever, P Mohapatra
MILCOM 2015-2015 IEEE Military Communications Conference, 25-30, 2015
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
P Hu, K Xing, X Cheng, H Wei, H Zhu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1258-1266, 2014
PLiFi: Hybrid WiFi-VLC networking using power lines
P Hu, PH Pathak, AK Das, Z Yang, P Mohapatra
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 31-36, 2016
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
L Zhao, S Hu, Q Wang, J Jiang, S Chao, X Luo, P Hu
IEEE Transactions on Dependable and Secure Computing, 2020
High speed led-to-camera communication using color shift keying with flicker mitigation
P Hu, PH Pathak, H Zhang, Z Yang, P Mohapatra
IEEE Transactions on Mobile Computing 19 (7), 1603-1617, 2019
Flowintent: Detecting privacy leakage from user intention to network traffic mapping
H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra
2016 13th Annual IEEE International Conference on Sensing, Communication …, 2016
Iotgaze: Iot security enforcement via wireless context analysis
T Gu, Z Fang, A Abhishek, H Fu, P Hu, P Mohapatra
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 884-893, 2020
On the feasibility of estimating soluble sugar content using millimeter-wave
Z Yang, PH Pathak, M Sha, T Zhu, J Gan, P Hu, P Mohapatra
Proceedings of the International Conference on Internet of Things Design and …, 2019
Mmsense: Multi-person detection and identification via mmwave sensing
T Gu, Z Fang, Z Yang, P Hu, P Mohapatra
Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing …, 2019
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications
K Xing, T Gu, Z Zhao, L Shi, Y Liu, P Hu, Y Wang, Y Liang, S Zhang, ...
2013 Proceedings IEEE INFOCOM, 115-119, 2013
On the performance of TDD and LDD based clone attack detection in mobile Ad hoc networks
D Wang, P Li, P Hu, K Xing, Y Wang, L Huang, Y Rong
International Conference on Wireless Algorithms, Systems, and Applications …, 2012
PCASA: Proximity based Continuous and Secure Authentication of Personal Devices
P Hu, PH Pathak, Y Shen, H Jin, P Mohapatra
Sensing, Communication, and Networking (SECON), 2017 14th Annual IEEE …, 2017
Optimal system maneuver for trust management in social networks
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
arXiv preprint arXiv:1604.07139, 1-10, 2016
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications
H Fu, P Hu, Z Zheng, A Das, P Pathak, T Gu, S Zhu, P Mohapatra
IEEE Transactions on Mobile Computing, 2020
Performance and Security Enhancements of Wireless Networks Through Visible Light and Inaudible Sound
P Hu
University of California, Davis, 2018
Trust exploitation and attention competition: A game theoretical model
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
MILCOM 2016-2016 IEEE Military Communications Conference, 1255-1260, 2016
The system can't perform the operation now. Try again later.
Articles 1–20