Hao Fu
TitleCited byYear
Dynamic defense strategy against advanced persistent threat with insiders
P Hu, H Li, H Fu, D Cansever, P Mohapatra
2015 IEEE Conference on Computer Communications (INFOCOM), 747-755, 2015
Colorbars: Increasing data rate of led-to-camera communication using color shift keying
P Hu, PH Pathak, X Feng, H Fu, P Mohapatra
CoNEXT '15, Proceedings of the 11th ACM Conference on Emerging Networking …, 2015
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications
H Fu, Z Zheng, S Bose, M Bishop, P Mohapatra
Computer Communications (INFOCOM), 2017 Proceedings IEEE, 2017
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping
H Fu, Z Zheng, AK Das, PH Pathak, P Hu, P Mohapatra
Sensing, Communication, and Networking (SECON), 2016 13th Annual IEEE …, 2016
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection
H Fu, Z Zheng, S Zhu, P Mohapatra
Computer Communications (INFOCOM), 2019 Proceedings IEEE, 2019
Provenance logic: Enabling multi-event based trust in mobile sensing
X Wang, H Fu, C Xu, P Mohapatra
2014 IEEE 33rd International Performance Computing and Communications …, 2014
Trust Exploitation and Attention Competition: A Game Theoretical Model
H Fu, H Li, Z Zheng, P Hu, P Mohapatra
Military Communications Conference, MILCOM 2016, 2016
符昊, 葛洪伟, 邵长鲁, 朱亮
计算机工程与应用, 238-242, 2014
The system can't perform the operation now. Try again later.
Articles 1–8