Pengfei Hu
Pengfei Hu
Verified email at vmware.com - Homepage
TitleCited byYear
Visible light communication, networking, and sensing: A survey, potential and challenges
PH Pathak, X Feng, P Hu, P Mohapatra
IEEE communications surveys & tutorials 17 (4), 2047-2077, 2015
5602015
Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
P Hu, H Li, H Fu, D Cansever, P Mohapatra
INFOCOM, 2015 Proceedings IEEE, 747 - 755, 2015
792015
ColorBars: Increasing Data Rate of LED-to-Camera Communication using Color Shift Keying
P Hu, PH Pathak, X Feng, H Fu, P Mohapatra
CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015
552015
Mutual privacy-preserving regression modeling in participatory sensing
K Xing, Z Wan, P Hu, H Zhu, Y Wang, X Chen, Y Wang, L Huang
2013 Proceedings IEEE INFOCOM, 3039-3047, 2013
342013
Stealthy attacks meets insider threats: a three-player game model
X Feng, Z Zheng, P Hu, D Cansever, P Mohapatra
MILCOM 2015-2015 IEEE Military Communications Conference, 25-30, 2015
252015
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
P Hu, K Xing, X Cheng, H Wei, H Zhu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1258-1266, 2014
182014
PLiFi: Hybrid WiFi-VLC networking using power lines
P Hu, PH Pathak, AK Das, Z Yang, P Mohapatra
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 31-36, 2016
122016
Flowintent: Detecting privacy leakage from user intention to network traffic mapping
H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra
2016 13th Annual IEEE International Conference on Sensing, Communication …, 2016
52016
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications
K Xing, T Gu, Z Zhao, L Shi, Y Liu, P Hu, Y Wang, Y Liang, S Zhang, ...
2013 Proceedings IEEE INFOCOM, 115-119, 2013
42013
On the performance of TDD and LDD based clone attack detection in mobile ad hoc networks
D Wang, P Li, P Hu, K Xing, Y Wang, L Huang, Y Rong
International Conference on Wireless Algorithms, Systems, and Applications …, 2012
42012
Optimal system maneuver for trust management in social networks
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
arXiv preprint arXiv:1604.07139, 1-10, 2016
22016
On the feasibility of estimating soluble sugar content using millimeter-wave.
Z Yang, PH Pathak, M Sha, T Zhu, J Gan, P Hu, P Mohapatra
IoTDI, 13-24, 2019
12019
mmSense: Multi-Person Detection and Identification via mmWave Sensing
T Gu, Z Fang, Z Yang, P Hu, P Mohapatra
Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing …, 2019
2019
High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation
P Hu, P Pathak, H Zhang, Z Yang, P Mohapatra
IEEE Transactions on Mobile Computing, 2019
2019
Performance and Security Enhancements of Wireless Networks Through Visible Light and Inaudible Sound
P Hu
University of California, Davis, 2018
2018
PCASA: Proximity based Continuous and Secure Authentication of Personal Devices
P Hu, PH Pathak, Y Shen, H Jin, P Mohapatra
Sensing, Communication, and Networking (SECON), 2017 14th Annual IEEE …, 2017
2017
Trust exploitation and attention competition: A game theoretical model
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
MILCOM 2016-2016 IEEE Military Communications Conference, 1255-1260, 2016
2016
Beamforming based Signal Strengthening via Underground Acoustics Sensor Networks
X Yan, P Hu, T Gu, K Xing
2012 1st IEEE International Conference on Communications in China (ICCC …, 2012
2012
Multi-axis projection based giant component formation in random unit-disk graphs
P Hu, K Xing, L Huang, Y Wang, D Wang, P Li
Tsinghua Science and Technology 16 (5), 553-558, 2011
2011
A maximal independent set based giant component formation in random unit-disk graphs
P Hu, K Xing, L Huang, Y Wang, D Wang, P Li
International Conference on Wireless Algorithms, Systems, and Applications …, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20