Pengfei Hu
Pengfei Hu
Professor of Computer Science, Shandong University
Verified email at - Homepage
Cited by
Cited by
Visible light communication, networking, and sensing: A survey, potential and challenges
PH Pathak, X Feng, P Hu, P Mohapatra
IEEE communications surveys & tutorials 17 (4), 2047-2077, 2015
Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
P Hu, H Li, H Fu, D Cansever, P Mohapatra
INFOCOM, 2015 Proceedings IEEE, 747 - 755, 2015
ColorBars: Increasing Data Rate of LED-to-Camera Communication using Color Shift Keying
P Hu, PH Pathak, X Feng, H Fu, P Mohapatra
CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020
Membership inference attacks against recommender systems
M Zhang, Z Ren, Z Wang, P Ren, Z Chen, P Hu, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Mmsense: Multi-person detection and identification via mmwave sensing
T Gu, Z Fang, Z Yang, P Hu, P Mohapatra
Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing …, 2019
Stealthy attacks meets insider threats: A three-player game model
X Feng, Z Zheng, P Hu, D Cansever, P Mohapatra
MILCOM 2015-2015 IEEE Military Communications Conference, 25-30, 2015
Iotgaze: Iot security enforcement via wireless context analysis
T Gu, Z Fang, A Abhishek, H Fu, P Hu, P Mohapatra
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 884-893, 2020
Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System
J Song, T Gu, Z Fang, X Feng, Y Ge, H Fu, P Hu, P Mohapatra
2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems …, 2021
Mutual privacy-preserving regression modeling in participatory sensing
K Xing, Z Wan, P Hu, H Zhu, Y Wang, X Chen, Y Wang, L Huang
2013 Proceedings IEEE INFOCOM, 3039-3047, 2013
Milliear: Millimeter-wave acoustic eavesdropping with unconstrained vocabulary
P Hu, Y Ma, PS Santhalingam, PH Pathak, X Cheng
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 11-20, 2022
PLiFi: Hybrid WiFi-VLC networking using power lines
P Hu, PH Pathak, AK Das, Z Yang, P Mohapatra
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 31-36, 2016
High speed led-to-camera communication using color shift keying with flicker mitigation
P Hu, PH Pathak, H Zhang, Z Yang, P Mohapatra
IEEE Transactions on Mobile Computing 19 (7), 1603-1617, 2019
Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary
P Hu, H Zhuang, PS Santhalingam, R Spolaor, P Pathak, G Zhang, ...
2022 IEEE Symposium on Security and Privacy (SP), 1757-1773, 2022
A model checking-based security analysis framework for IoT systems
Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Hu, P Mohapatra
High-Confidence Computing 1 (1), 100004, 2021
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
P Hu, K Xing, X Cheng, H Wei, H Zhu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1258-1266, 2014
mmEcho: A mmWave-based Acoustic Eavesdropping Method
P Hu, W Li, R Spolaor, X Cheng
2023 IEEE Symposium on Security and Privacy (S&P), 1840-1856, 2023
On the feasibility of estimating soluble sugar content using millimeter-wave
Z Yang, PH Pathak, M Sha, T Zhu, J Gan, P Hu, P Mohapatra
Proceedings of the International Conference on Internet of Things Design and …, 2019
Towards automatic detection of nonfunctional sensitive transmissions in mobile applications
H Fu, P Hu, Z Zheng, AK Das, PH Pathak, T Gu, S Zhu, P Mohapatra
IEEE Transactions on Mobile Computing 20 (10), 3066-3080, 2020
Flowintent: Detecting privacy leakage from user intention to network traffic mapping
H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra
2016 13th Annual IEEE International Conference on Sensing, Communication …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20