Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
Contact Expert
View Scopus Profile
Hong Hu
Assistant Professor in Cybersecurity Analytics and Operations
,
College of Information Sciences and Technology
h-index
1287
Citations
16
h-index
Calculated based on number of publications stored in Pure and citations from Scopus
2013
2024
Research activity per year
Overview
Fingerprint
Network
Grants & Projects
(2)
Research output
(31)
Similar Profiles
(6)
Fingerprint
Dive into the research topics where Hong Hu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Fuzzing
100%
Vulnerability
55%
Attacker
48%
Data Injection Attack
45%
Use-after-free
45%
Type Analysis
45%
Fuzzer
44%
Popular
39%
Memory Errors
35%
Privilege Separation
34%
Non-control Data
32%
Crash
30%
Dispatcher
28%
Data-oriented
28%
Browser
25%
Embedded Systems
24%
Unique Code
22%
Vault
22%
Scripting Languages
22%
Web Browser
22%
State Synchronization
22%
Control-flow Hijacking
22%
Malware Analysis
22%
Performance Regression
22%
Practical Analysis
22%
Windows Application
22%
Automatic Diagnosis
22%
Memory Access
22%
Android Devices
22%
Quantitative Evaluation
22%
Shared Inputs
22%
Fast-forwarding
22%
Squirrel
22%
Coverage-based
22%
Real-time Operating System
22%
Expressiveness
22%
Privacy Awareness
22%
Fuzzification
22%
Data-Oriented Programming
22%
Droid
22%
Non-control Data Attacks
22%
Software Attestation
22%
Syscalls
22%
Privacy Attack
22%
Microservice Architecture
22%
Guard
22%
Message Reordering
22%
Semantic Validation
22%
Microprocessor Test
22%
Language Processor
22%
Computer Science
Attackers
98%
Control Flow
79%
Fuzzing
72%
Database Management System
45%
Fuzzers
35%
Security Implication
34%
Web Browser
34%
World Application
30%
Function Pointer
30%
Vulnerability Detection
28%
Evaluation Result
28%
Malicious Behavior
26%
System Calls
26%
Malware
25%
Mobile Device
22%
Needed Information
22%
Malware Analysis
22%
Confidential Data
22%
Embedded System
22%
Malware Detection
22%
Memory Access
22%
Protection Mechanism
22%
Execution Environments
22%
Dangling Reference
22%
Null Pointer
22%
Program Execution
22%
Analysis Framework
22%
Security Architecture
22%
Automatic Detection
22%
Scripting Languages
22%
Denial-of-Service Attack
22%
Debugging Information
22%
Microservice Architecture
22%
Android
22%
Fuzzification
22%
Software Deployment
22%
Window Application
22%
Program Analysis
22%
User Privacy
22%
Communication Process
22%
Memory Location
22%
Stepping Stone
22%
Database Systems
22%
Programming Language
22%
Functional Program
22%
Quantitative Evaluation
22%
Protection Program
22%
Type Hierarchy
22%
Upgrade Approach
22%
Application Scenario
22%