Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Link opens in a new tab
Search content at Penn State
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Contact Expert
View Scopus Profile
Hong Hu
Assistant Professor
,
College of Information Sciences and Technology
h-index
1619
Citations
18
h-index
Calculated based on number of publications stored in Pure and citations from Scopus
2013
2025
Research activity per year
Overview
Fingerprint
Network
Grants & Projects
(4)
Research output
(33)
Similar Profiles
(2)
Fingerprint
Dive into the research topics where Hong Hu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Android Devices
20%
Attacker
50%
Automatic Diagnosis
20%
Browser
23%
Control-flow Hijacking
27%
Coverage-based
20%
Crash
27%
Critical Security
24%
Data Injection Attack
62%
Data-oriented
25%
Data-Oriented Programming
20%
Dispatcher
25%
Droid
20%
Embedded Systems
22%
Expressiveness
20%
Fast-forwarding
20%
Fuzzer
47%
Fuzzification
20%
Fuzzing
91%
Guard
20%
Linux Kernel
28%
Malware Analysis
20%
Memory Access
20%
Memory Errors
52%
Message Reordering
20%
Microservice Architecture
20%
Non-control Data
36%
Non-control Data Attacks
20%
Performance Regression
20%
Popular
39%
Practical Analysis
20%
Privacy Attack
20%
Privacy Awareness
20%
Privilege Separation
31%
Quantitative Evaluation
20%
Real-time Operating System
20%
Scripting Languages
20%
Shared Inputs
20%
Software Attestation
20%
Squirrel
20%
State Synchronization
20%
Syscalls
31%
Temporal Memory
23%
Type Analysis
41%
Unique Code
20%
Use-after-free
62%
Vault
20%
Vulnerability
54%
Web Browser
20%
Windows Application
20%
Computer Science
Analysis Framework
20%
Android
20%
Attackers
100%
Automatic Detection
20%
Communication Process
20%
Confidential Data
20%
Control Flow
93%
Dangling Reference
20%
Database Management System
41%
Database Systems
20%
Debugging Information
20%
Deep Learning Method
27%
Denial-of-Service Attack
20%
Embedded System
20%
Evaluation Result
25%
Execution Environments
20%
Function Pointer
27%
Functional Program
20%
Fuzzers
32%
Fuzzification
20%
Fuzzing
66%
Malicious Behavior
24%
Malware
23%
Malware Analysis
20%
Malware Detection
20%
Memory Access
20%
Memory Location
20%
Microservice Architecture
20%
Mobile Device
20%
Needed Information
20%
Null Pointer
20%
Program Analysis
31%
Program Execution
20%
Programming Language
20%
Protection Mechanism
20%
Protection Program
20%
Quantitative Evaluation
20%
Scripting Languages
20%
Security Architecture
20%
Security Implication
31%
Software Deployment
20%
Stepping Stone
20%
System Calls
24%
Type Hierarchy
20%
Upgrade Approach
20%
User Privacy
20%
Vulnerability Detection
25%
Web Browser
31%
Window Application
20%
World Application
27%