default search action
Pengfei Hu 0001
Person information
- affiliation: Shandong University, Jinan, China
Other persons with the same name
- Pengfei Hu — disambiguation page
- Pengfei Hu 0002 — Zhejiang University, Hangzhou, China
- Pengfei Hu 0003 — Beijing Engineering Research Center for Cyberspace Data Analysis and Applications, Beijing, China
- Pengfei Hu 0004 — Tencent Inc, TEG AI, Beijing, China
- Pengfei Hu 0005 — Anhui Polytechnic University, Wuhu, China (and 1 more)
- Pengfei Hu 0006 — University of Science and Technology of China, Hefei, China
- Pengfei Hu 0007 — Chinese Academy of Sciences, National Laboratory of Pattern Recognition, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Guoming Zhang, Heqiang Fu, Zhijie Xiang, Xinyan Zhou, Pengfei Hu, Xiuzhen Cheng, Yanni Yang:
Ambient Light Reflection-Based Eavesdropping Enhanced With cGAN. IEEE Trans. Mob. Comput. 24(1): 72-85 (2025) - [j24]Pengfei Hu, Yuhang Qian, Tianyue Zheng, Ang Li, Zhe Chen, Yue Gao, Xiuzhen Cheng, Jun Luo:
t-READi: Transformer-Powered Robust and Efficient Multimodal Inference for Autonomous Driving. IEEE Trans. Mob. Comput. 24(1): 135-149 (2025) - [j23]Yanni Yang, Pengfei Hu, Jun Luo, Zhenlin An, Jiannong Cao, Dongxiao Yu, Xiuzhen Cheng:
Romeo: Fault Detection of Rotating Machinery via Fine-Grained mmWave Velocity Signature. IEEE Trans. Mob. Comput. 24(1): 227-242 (2025) - 2024
- [j22]Zhaopeng Xu, Tong Liu, Ruobing Jiang, Pengfei Hu, Zhongwen Guo, Chao Liu:
AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 26:1-26:33 (2024) - [j21]Yong Wang, Tianyu Yang, Chunxiao Wang, Feng Li, Pengfei Hu, Yiran Shen:
BudsAuth: Toward Gesture-Wise Continuous User Authentication Through Earbuds Vibration Sensing. IEEE Internet Things J. 11(12): 22007-22020 (2024) - [j20]Zewei Liu, Chunqiang Hu, Conghao Ruan, Pengfei Hu, Meng Han, Jiguo Yu:
An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication. IEEE Internet Things J. 11(12): 22413-22428 (2024) - [j19]Zewei Liu, Chunqiang Hu, Conghao Ruan, Linghao Zhang, Pengfei Hu, Tao Xiang:
A Privacy-Preserving Matching Service Scheme for Power Data Trading. IEEE Internet Things J. 11(19): 32296-32309 (2024) - [j18]Chunqiang Hu, Huijun Zhuang, Jiajun Chen, Pengfei Hu, Tao Xiang, Jiguo Yu:
Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid. IEEE Trans. Cloud Comput. 12(2): 777-788 (2024) - [j17]Chunqiang Hu, Zewei Liu, Ruinian Li, Pengfei Hu, Tao Xiang, Meng Han:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(4): 2145-2161 (2024) - [j16]Pengfei Hu, Wenhao Li, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Hong Li, Huanle Zhang, Guoming Zhang, Xiuzhen Cheng, Prasant Mohapatra:
Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN. IEEE Trans. Mob. Comput. 23(1): 941-954 (2024) - [j15]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
Towards System-Level Security Analysis of IoT Using Attack Graphs. IEEE Trans. Mob. Comput. 23(2): 1142-1155 (2024) - [j14]Guangrong Zhao, Yiran Shen, Ning Chen, Pengfei Hu, Lei Liu, Hongkai Wen:
EV-Tach: A Handheld Rotational Speed Estimation System With Event Camera. IEEE Trans. Mob. Comput. 23(6): 7483-7498 (2024) - [j13]Yanni Yang, Zhenlin An, Jiannong Cao, Yanwen Wang, Pengfei Hu, Guoming Zhang, Xiuzhen Cheng:
Jump Out of Resonance: A Practical NFC Tag Fingerprinting Scheme. IEEE Trans. Mob. Comput. 23(9): 8694-8709 (2024) - [j12]Mingda Han, Huanqi Yang, Mingda Jia, Weitao Xu, Yanni Yang, Zhijian Huang, Jun Luo, Xiuzhen Cheng, Pengfei Hu:
Seeing the Invisible: Recovering Surveillance Video With COTS mmWave Radar. IEEE Trans. Mob. Comput. 23(12): 14592-14606 (2024) - [j11]Feng Li, Yuqi Chai, Huan Yang, Pengfei Hu, Lingjie Duan:
Incentivizing Massive Unknown Workers for Budget-Limited Crowdsensing: From Off-Line and On-Line Perspectives. IEEE/ACM Trans. Netw. 32(3): 2406-2421 (2024) - [j10]Pengfei Hu, Zhe Chen, Chris Xiaoxuan Lu, Xuyu Wang, Jun Luo, Prasant Mohapatra:
Introduction to the Special Section on Contact-free Smart Sensing in AIoT. ACM Trans. Sens. Networks 20(4): 76:1-76:4 (2024) - [c32]Guoming Zhang, Zhijie Xiang, Heqiang Fu, Yanni Yang, Pengfei Hu:
EchoLight: Sound Eavesdropping based on Ambient Light Reflection. INFOCOM 2024: 341-350 - [c31]Yanni Yang, Genglin Wang, Zhenlin An, Guoming Zhang, Xiuzhen Cheng, Pengfei Hu:
RF-Parrot: Wireless Eavesdropping on Wired Audio. INFOCOM 2024: 701-710 - [c30]Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu:
LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems. USENIX Security Symposium 2024 - [i12]Jiahao Wang, Sikun Yang, Heinz Koeppl, Xiuzhen Cheng, Pengfei Hu, Guoming Zhang:
Poisson-Gamma Dynamical Systems with Non-Stationary Transition Dynamics. CoRR abs/2402.16297 (2024) - [i11]Jiahao Wang, Xianglong Zhang, Xiuzhen Cheng, Pengfei Hu, Guoming Zhang:
A Practical Trigger-Free Backdoor Attack on Neural Networks. CoRR abs/2408.11444 (2024) - [i10]Pengfei Hu, Yuhang Qian, Tianyue Zheng, Ang Li, Zhe Chen, Yue Gao, Xiuzhen Cheng, Jun Luo:
t-READi: Transformer-Powered Robust and Efficient Multimodal Inference for Autonomous Driving. CoRR abs/2410.09747 (2024) - 2023
- [j9]Huanle Zhang, Lei Fu, Mi Zhang, Pengfei Hu, Xiuzhen Cheng, Prasant Mohapatra, Xin Liu:
Federated Learning Hyperparameter Tuning From a System Perspective. IEEE Internet Things J. 10(16): 14102-14113 (2023) - [j8]Xianglong Zhang, Huanle Zhang, Guoming Zhang, Hong Li, Dongxiao Yu, Xiuzhen Cheng, Pengfei Hu:
Model Poisoning Attack on Neural Network Without Reference Data. IEEE Trans. Computers 72(10): 2978-2989 (2023) - [j7]Yifei Zou, Dongxiao Yu, Pengfei Hu, Jiguo Yu, Xiuzhen Cheng, Prasant Mohapatra:
Jamming-Resilient Message Dissemination in Wireless Networks. IEEE Trans. Mob. Comput. 22(3): 1536-1550 (2023) - [j6]Xiangli Xiao, Yushu Zhang, Youwen Zhu, Pengfei Hu, Xiaochun Cao:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. IEEE Trans. Netw. Serv. Manag. 20(3): 2869-2885 (2023) - [c29]Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. ACM TUR-C 2023: 138-140 - [c28]Zhe Chen, Tianyue Zheng, Chao Cai, Yue Gao, Pengfei Hu, Jun Luo:
Wider is Better? Contact-free Vibration Sensing via Different COTS-RF Technologies. INFOCOM 2023: 1-10 - [c27]Yanni Yang, Jiannong Cao, Zhenlin An, Yanwen Wang, Pengfei Hu, Guoming Zhang:
NFChain: A Practical Fingerprinting Scheme for NFC Tag Authentication. INFOCOM 2023: 1-10 - [c26]Huanqi Yang, Mingda Han, Mingda Jia, Zehua Sun, Pengfei Hu, Yu Zhang, Tao Gu, Weitao Xu:
XGait: Cross-Modal Translation via Deep Generative Sensing for RF-based Gait Recognition. SenSys 2023: 43-55 - [c25]Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. SP 2023: 1840-1856 - [c24]Yupeng Yin, Xianglong Zhang, Huanle Zhang, Feng Li, Yue Yu, Xiuzhen Cheng, Pengfei Hu:
Ginver: Generative Model Inversion Attacks Against Collaborative Inference. WWW 2023: 2122-2131 - [i9]Feng Li, Yuqi Chai, Huan Yang, Pengfei Hu, Lingjie Duan:
Incentivizing Massive Unknown Workers for Budget-Limited Crowdsensing: From Off-Line and On-Line Perspectives. CoRR abs/2309.12113 (2023) - 2022
- [j5]Fangtian Zhong, Pengfei Hu, Guoming Zhang, Hong Li, Xiuzhen Cheng:
Reinforcement learning based adversarial malware example generation against black-box detectors. Comput. Secur. 121: 102869 (2022) - [c23]Pengfei Hu, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Xiuzhen Cheng:
MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary. INFOCOM 2022: 11-20 - [c22]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
IOTA: A Framework for Analyzing System-Level Security of IoTs. IoTDI 2022: 143-155 - [c21]Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. SP 2022: 1757-1773 - [c20]Yueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu, Yifei Zou, Xiaotao Feng, Pengfei Hu:
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage. WASA (1) 2022: 466-478 - [c19]Shuang He, Yuhang Qian, Huanle Zhang, Guoming Zhang, Minghui Xu, Lei Fu, Xiuzhen Cheng, Huan Wang, Pengfei Hu:
Accurate Contact-Free Material Recognition with Millimeter Wave and Machine Learning. WASA (2) 2022: 609-620 - [i8]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
Iota: A Framework for Analyzing System-Level Security of IoTs. CoRR abs/2202.02506 (2022) - [i7]Guangrong Zhao, Yiran Shen, Ning Chen, Pengfei Hu, Lei Liu, Hongkai Wen:
High Speed Rotation Estimation with Dynamic Vision Sensors. CoRR abs/2209.02205 (2022) - [i6]Huanle Zhang, Lei Fu, Mi Zhang, Pengfei Hu, Xiuzhen Cheng, Prasant Mohapatra, Xin Liu:
Federated Learning Hyper-Parameter Tuning from a System Perspective. CoRR abs/2211.13656 (2022) - [i5]Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. CoRR abs/2212.01042 (2022) - 2021
- [j4]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j3]Hao Fu, Pengfei Hu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Tianbo Gu, Sencun Zhu, Prasant Mohapatra:
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications. IEEE Trans. Mob. Comput. 20(10): 3066-3080 (2021) - [c18]Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang:
Membership Inference Attacks Against Recommender Systems. CCS 2021: 864-879 - [c17]Jinyue Song, Tianbo Gu, Zheng Fang, Xiaotao Feng, Yunjie Ge, Hao Fu, Pengfei Hu, Prasant Mohapatra:
Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System. MASS 2021: 269-277 - [i4]Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang:
Membership Inference Attacks Against Recommender Systems. CoRR abs/2109.08045 (2021) - 2020
- [j2]Pengfei Hu, Parth H. Pathak, Huanle Zhang, Zhicheng Yang, Prasant Mohapatra:
High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation. IEEE Trans. Mob. Comput. 19(7): 1603-1617 (2020) - [c16]Tianbo Gu, Zheng Fang, Allaukik Abhishek, Hao Fu, Pengfei Hu, Prasant Mohapatra:
IoTGaze: IoT Security Enforcement via Wireless Context Analysis. INFOCOM 2020: 884-893 - [i3]Tianbo Gu, Zheng Fang, Allaukik Abhishek, Hao Fu, Pengfei Hu, Prasant Mohapatra:
IoTGaze: IoT Security Enforcement via Wireless Context Analysis. CoRR abs/2006.15827 (2020)
2010 – 2019
- 2019
- [c15]Zhicheng Yang, Parth H. Pathak, Mo Sha, Tingting Zhu, Junai Gan, Pengfei Hu, Prasant Mohapatra:
On the feasibility of estimating soluble sugar content using millimeter-wave. IoTDI 2019: 13-24 - [c14]Tianbo Gu, Zheng Fang, Zhicheng Yang, Pengfei Hu, Prasant Mohapatra:
mmSense: Multi-Person Detection and Identification via mmWave Sensing. mmNets 2019: 45-50 - 2017
- [c13]Pengfei Hu, Parth H. Pathak, Yilin Shen, Hongxia Jin, Prasant Mohapatra:
PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices. SECON 2017: 1-9 - 2016
- [c12]Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra:
Trust exploitation and attention competition: A game theoretical model. MILCOM 2016: 1255-1260 - [c11]Pengfei Hu, Parth H. Pathak, Aveek K. Das, Zhicheng Yang, Prasant Mohapatra:
PLiFi: hybrid wifi-VLC networking using power lines. VLCS@MobiCom 2016: 31-36 - [c10]Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra:
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping. SECON 2016: 1-9 - [i2]Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra:
Optimal System Maneuver for Trust Management in Social Networks. CoRR abs/1604.07139 (2016) - [i1]Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra:
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping. CoRR abs/1605.04025 (2016) - 2015
- [j1]Parth H. Pathak, Xiaotao Feng, Pengfei Hu, Prasant Mohapatra:
Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges. IEEE Commun. Surv. Tutorials 17(4): 2047-2077 (2015) - [c9]Pengfei Hu, Parth H. Pathak, Xiaotao Feng, Hao Fu, Prasant Mohapatra:
ColorBars: increasing data rate of LED-to-camera communication using color shift keying. CoNEXT 2015: 12:1-12:13 - [c8]Pengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra:
Dynamic defense strategy against advanced persistent threat with insiders. INFOCOM 2015: 747-755 - [c7]Xiaotao Feng, Zizhan Zheng, Pengfei Hu, Derya Cansever, Prasant Mohapatra:
Stealthy attacks meets insider threats: A three-player game model. MILCOM 2015: 25-30 - 2014
- [c6]Pengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu:
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks. INFOCOM 2014: 1258-1266 - 2013
- [c5]Kai Xing, Tianbo Gu, Zhengang Zhao, Lei Shi, Yunhao Liu, Pengfei Hu, Yuepeng Wang, Yi Liang, Shuo Zhang, Yang Wang, Liusheng Huang:
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications. INFOCOM 2013: 115-119 - [c4]Kai Xing, Zhiguo Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, Xi Chen, Yang Wang, Liusheng Huang:
Mutual privacy-preserving regression modeling in participatory sensing. INFOCOM 2013: 3039-3047 - 2012
- [c3]Xiaokun Yan, Pengfei Hu, Tianbo Gu, Kai Xing:
Beamforming based signal strengthening via underground acoustics sensor networks. ICCC 2012: 36-40 - [c2]Dapeng Wang, Pei Li, Pengfei Hu, Kai Xing, Yang Wang, Liusheng Huang, Yanxia Rong:
On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks. WASA 2012: 532-539 - 2011
- [c1]Pengfei Hu, Kai Xing, Liusheng Huang, Yang Wang, Dapeng Wang, Pei Li:
A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs. WASA 2011: 223-231
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint