Pengfei Hu

Orcid: 0000-0002-7935-886X

Affiliations:
  • Shandong University, Jinan, China


According to our database1, Pengfei Hu authored at least 43 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

Towards System-Level Security Analysis of IoT Using Attack Graphs.
IEEE Trans. Mob. Comput., February, 2024

Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN.
IEEE Trans. Mob. Comput., January, 2024

Poisson-Gamma Dynamical Systems with Non-Stationary Transition Dynamics.
CoRR, 2024

2023
Model Poisoning Attack on Neural Network Without Reference Data.
IEEE Trans. Computers, October, 2023

FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023

Federated Learning Hyperparameter Tuning From a System Perspective.
IEEE Internet Things J., August, 2023

Jamming-Resilient Message Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., March, 2023

Ginver: Generative Model Inversion Attacks Against Collaborative Inference.
Proceedings of the ACM Web Conference 2023, 2023

NFChain: A Practical Fingerprinting Scheme for NFC Tag Authentication.
Proceedings of the IEEE INFOCOM 2023, 2023

Wider is Better? Contact-free Vibration Sensing via Different COTS-RF Technologies.
Proceedings of the IEEE INFOCOM 2023, 2023

mmEcho: A mmWave-based Acoustic Eavesdropping Method.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Federated Learning Hyper-Parameter Tuning from a System Perspective.
CoRR, 2022

Reinforcement learning based adversarial malware example generation against black-box detectors.
Comput. Secur., 2022

TraceDroid: Detecting Android Malware by Trace of Privacy Leakage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Accurate Contact-Free Material Recognition with Millimeter Wave and Machine Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

IOTA: A Framework for Analyzing System-Level Security of IoTs.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Membership Inference Attacks Against Recommender Systems.
CoRR, 2021

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Membership Inference Attacks Against Recommender Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation.
IEEE Trans. Mob. Comput., 2020

IoTGaze: IoT Security Enforcement via Wireless Context Analysis.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
mmSense: Multi-Person Detection and Identification via mmWave Sensing.
Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing Systems, 2019

On the feasibility of estimating soluble sugar content using millimeter-wave.
Proceedings of the International Conference on Internet of Things Design and Implementation, 2019

2017
PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

2016
Optimal System Maneuver for Trust Management in Social Networks.
CoRR, 2016

FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

PLiFi: hybrid wifi-VLC networking using power lines.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016

Trust exploitation and attention competition: A game theoretical model.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges.
IEEE Commun. Surv. Tutorials, 2015

Stealthy attacks meets insider threats: A three-player game model.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Dynamic defense strategy against advanced persistent threat with insiders.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ColorBars: increasing data rate of LED-to-camera communication using color shift keying.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Beamforming based signal strengthening via underground acoustics sensor networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011


  Loading...