scispace - formally typeset
P

Pengfei Hu

Researcher at University of California, Davis

Publications -  42
Citations -  1788

Pengfei Hu is an academic researcher from University of California, Davis. The author has contributed to research in topics: Computer science & Wireless sensor network. The author has an hindex of 9, co-authored 27 publications receiving 1298 citations. Previous affiliations of Pengfei Hu include Shandong University & VMware.

Papers
More filters
Journal ArticleDOI

Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges

TL;DR: This survey provides a technology overview and review of existing literature of visible light communication and sensing and outlines important challenges that need to be addressed in order to design high-speed mobile networks using visible light Communication-VLC.
Proceedings ArticleDOI

Dynamic defense strategy against advanced persistent threat with insiders

TL;DR: Through rigorous analysis, this work identifies the best response strategies for each player and proves the existence of Nash Equilibrium for both games, i.e., a defense/attack game between defender and APT attacker and an information-trading game among insiders.
Proceedings ArticleDOI

ColorBars: increasing data rate of LED-to-camera communication using color shift keying

TL;DR: ColorBars is presented, an LED-to-camera communication system that utilizes Color Shift Keying (CSK) to modulate data using different colors transmitted by the LED, which exploits the increasing popularity of Tri-LEDs (RGB) that can emit a wide range of colors.
Journal ArticleDOI

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection

TL;DR: This paper presents a novel defense scheme to detect anomalous updates in both IID and non-IID settings, and protects the client-level privacy to prevent malicious clients from stealing the training data of other clients, by integrating differential privacy with the design without degrading the detection performance.
Proceedings ArticleDOI

Stealthy attacks meets insider threats: A three-player game model

TL;DR: This paper proposes the first three-player attacker-defender-insider game to model the strategic interactions among the three parties and describes the subgame perfect equilibria of the game with the defender as the leader and the attacker and the insider as the followers, under two different information trading processes.