Hao Fu

Orcid: 0000-0002-8003-0212

Affiliations:
  • Meta Platforms, Inc., Menlo Park, CA, USA
  • University of California, Davis, CA, USA (PhD 2019)


According to our database1, Hao Fu authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards System-Level Security Analysis of IoT Using Attack Graphs.
IEEE Trans. Mob. Comput., February, 2024

2023
Integrity and Junkiness Failure Handling for Embedding-based Retrieval: A Case Study in Social Network Search.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

2022
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

IOTA: A Framework for Analyzing System-Level Security of IoTs.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

2020
Towards Learning-automation IoT Attack Detection through Reinforcement Learning.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

IoTGaze: IoT Security Enforcement via Wireless Context Analysis.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2017
INSPIRED: Intention-based Privacy-preserving Permission Model.
CoRR, 2017

LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Optimal System Maneuver for Trust Management in Social Networks.
CoRR, 2016

FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Trust exploitation and attention competition: A game theoretical model.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Dynamic defense strategy against advanced persistent threat with insiders.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ColorBars: increasing data rate of LED-to-camera communication using color shift keying.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
Provenance logic: Enabling multi-event based trust in mobile sensing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014


  Loading...