Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
Contact Expert
View Scopus Profile
Hong Hu
Assistant Professor in Cybersecurity Analytics and Operations
,
College of Information Sciences and Technology
h-index
1303
Citations
16
h-index
Calculated based on number of publications stored in Pure and citations from Scopus
2013
2024
Research activity per year
Overview
Fingerprint
Network
Grants & Projects
(2)
Research output
(32)
Similar Profiles
(1)
Fingerprint
Dive into the research topics where Hong Hu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Android Devices
22%
Attacker
48%
Automatic Diagnosis
22%
Browser
25%
Control-flow Hijacking
22%
Coverage-based
22%
Crash
30%
Data Injection Attack
45%
Data-oriented
28%
Data-Oriented Programming
22%
Dispatcher
28%
Droid
22%
Embedded Systems
24%
Expressiveness
22%
Fast-forwarding
22%
Fuzzer
51%
Fuzzification
22%
Fuzzing
100%
Guard
22%
Linux Kernel
31%
Malware Analysis
22%
Memory Access
22%
Memory Errors
57%
Message Reordering
22%
Microservice Architecture
22%
Non-control Data
32%
Non-control Data Attacks
22%
Performance Regression
22%
Popular
42%
Practical Analysis
22%
Privacy Attack
22%
Privacy Awareness
22%
Privilege Separation
34%
Quantitative Evaluation
22%
Real-time Operating System
22%
Scripting Languages
22%
Semantic Validation
22%
Shared Inputs
22%
Software Attestation
22%
Squirrel
22%
State Synchronization
22%
Syscalls
34%
Temporal Memory
25%
Type Analysis
45%
Unique Code
22%
Use-after-free
68%
Vault
22%
Vulnerability
59%
Web Browser
22%
Windows Application
22%
Computer Science
Analysis Framework
22%
Android
22%
Application Scenario
22%
Attackers
98%
Automatic Detection
22%
Communication Process
22%
Confidential Data
22%
Control Flow
79%
Dangling Reference
22%
Database Management System
45%
Database Systems
22%
Debugging Information
22%
Denial-of-Service Attack
22%
Embedded System
22%
Evaluation Result
28%
Execution Environments
22%
Function Pointer
30%
Functional Program
22%
Fuzzers
35%
Fuzzification
22%
Fuzzing
72%
Malicious Behavior
26%
Malware
25%
Malware Analysis
22%
Malware Detection
22%
Memory Access
22%
Memory Location
22%
Microservice Architecture
22%
Mobile Device
22%
Needed Information
22%
Null Pointer
22%
Program Analysis
22%
Program Execution
22%
Programming Language
22%
Protection Mechanism
22%
Protection Program
22%
Quantitative Evaluation
22%
Scripting Languages
22%
Security Architecture
22%
Security Implication
34%
Software Deployment
22%
Stepping Stone
22%
System Calls
26%
Type Hierarchy
22%
Upgrade Approach
22%
User Privacy
22%
Vulnerability Detection
28%
Web Browser
34%
Window Application
22%
World Application
30%