default search action
Peng Liu 0005
Person information
- affiliation: Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- affiliation (former): University of Maryland, Department of Information Systems, Baltimore, MD, USA
- affiliation (PhD 1999): George Mason University, Fairfax, VA, USA
Other persons with the same name
- Peng Liu — disambiguation page
- Peng Liu 0001 — Microsoft Research Asia, Beijing, China
- Peng Liu 0002 — FZI Forschungszentrum Informatik an der Universität Karlsruhe, Germany
- Peng Liu 0003 — Southern University of Science and Technology, Shenzhen, China (and 2 more)
- Peng Liu 0004 — Shenyang University of Technology, School of Management, China
- Peng Liu 0006 — PLA University of Science and Technology, Institute of Command Automation, Nanjing, China
- Peng Liu 0007 — Iowa State University, Department of Statistics, Ames, IA, USA (and 1 more)
- Peng Liu 0008 — Harbin Institute of Technology, Pattern Recognition and Intelligent System Research Center, China
- Peng Liu 0009 — Beijing Institute of Technology, School of Mechanical Engineering, China
- Peng Liu 0010 — Purdue University, USA (and 3 more)
- Peng Liu 0011 — Trinity College Dublin, Ireland
- Peng Liu 0012 — California State University, Fullerton, CA, USA (and 1 more)
- Peng Liu 0013 — China University of Mining and Technology, CUMT-IoT Perception Mine Research Center, Xuzhou, China
- Peng Liu 0014 — Lanzhou University, School of Management, Lanzhou, China
- Peng Liu 0015 — Queen's University, Department of Electr. & Comput. Engineering, Kingston, ON, Canada
- Peng Liu 0016 — Zhejiang University, Department of Information Science and Electronic Engineering, Hangzhou, China
- Peng Liu 0017 — Xidian University, Key Laboratory of Ministry of Education for Electronic Equipment Structure Design, Xian, China
- Peng Liu 0018 — NXP Semiconductors Austria GmbH, Gratkorn, Austria (and 2 more)
- Peng Liu 0019 — Fudan University, Key Laboratory of Wave Scattering and Remote Sensing Information, Shanghai, China (and 1 more)
- Peng Liu 0020 — PLA University of Science and Technology, Department of Network Engineering, Nanjing, China
- Peng Liu 0021 — Huazhong University of Science and Technology, School of Electric and Electronic Engineering, Wuhan, China
- Peng Liu 0022 — Southeast University, School of Automation, Nanjing, China
- Peng Liu 0023 — Jilin University, School of Computer Science and Technology, Changchun, China
- Peng Liu 0024 — Chinese Academic of Science, Institute of Remote Sensing and Digital Earth, Beijing, China
- Peng Liu 0025 — Norwegian University of Science and Technology, Department of Computer Science, Trondheim, Norway
- Peng Liu 0026 — Ohio State University, Department of Electrical and Computer Engineering, Columbus, OH, USA
- Peng Liu 0027 — Hangzhou Dianzi University, School of Computer Science and Technology, National Demonstration Center for Experimental Computer Education, China (and 1 more)
- Peng Liu 0028 — Beijing University of Technology, College of Metropolitan Transportation, China
- Peng Liu 0029 — Jiangnan Institute of Computing Technology, Wuxi, China
- Peng Liu 0030 — Tianjin University, Department of Industrial Engineering, College of Management and Economics, China (and 1 more)
- Peng Liu 0031 — Pennsylvania State University, Department of Electrical Engineering, University Park, PA, USA
- Peng Liu 0032 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Peng Liu 0033 — Chinese Academy of Science, Institute of Acoustics, Key Laboratory of Information Technology for Autonomous Underwater Vehicles, Beijing, China
- Peng Liu 0034 — University of Newcastle Upon Tyne, UK
- Peng Liu 0035 — Harbin Engineering University, College of Computer Science and Technology, Harbin, China
- Peng Liu 0036 — Ocean University of China, Computing Center, Qingdao, China
- Peng Liu 0037 — University of Florida, J. Crayton Pruitt Family Department of Biomedical Engineering, Gainesvill, FL, USA
- Peng Liu 0038 — Zhengzhou University of Light Industry, College of Electronic and Information Engineering, Zhengzhou, China (and 1 more)
- Peng Liu 0039 — State University of New York at Binghamton, Department of Computer Science, Binghamton, NY, USA
- Peng Liu 0040 — North China Electric Power University, School of Electrical and Electronic Engineering, Beijing, China
- Peng Liu 0041 — University of Wisconsin-Madison, Department of Computer Sciences, Madison, WI, USA
- Peng Liu 0042 — China University of Petroleum, College of Mechanical and Electronic Engineering, Qingdao, China
- Peng Liu 0043 — University of Lausanne, Department of Actuarial Science, Lausanne, Switzerland
- Peng Liu 0044 — Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China (and 1 more)
- Peng Liu 0045 — Guangdong University of Technology, School of Computers, Guangzhou, China (and 1 more)
- Peng Liu 0046 — Chinese Academy of Sciences, Institute of Acoustics, Haikou Laboratory, Haikou, China
- Peng Liu 0047 — Huawei Technologies, Wireless Technology Lab, Shenzhen, China (and 1 more)
- Peng Liu 0048 — University of Kent, UK
- Peng Liu 0049 — University of Electronic Science and Technology of China, Chengdu, China
Other persons with a similar name
- Chun-Peng Liu (aka: Chunpeng Liu)
- Jin-Peng Liu
- Peng-Jyun Liu
- Pengfei Liu (aka: PengFei Liu, Pengfeï Liu, Peng-Fei Liu) — disambiguation page
- Pengyuan Liu (aka: Peng-yuan Liu, Peng-Yuan Liu) — disambiguation page
- Rong-Peng Liu
- Wei-Peng Liu
- Yunpeng Liu (aka: Yun-Peng Liu) — disambiguation page
- Yipeng Liu 0002 (aka: Yi-Peng Liu 0001) — Zhejiang University of Technology, Hangzhou, China
- Liu Peng
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j111]Qingtian Zou, Lan Zhang, Xiaoyan Sun, Anoop Singhal, Peng Liu:
Using Explainable AI for Neural Network-Based Network Attack Detection. Computer 57(5): 78-85 (2024) - [j110]Yiyu Yang, Jice Wang, Peng Liu, Anmin Fu, Yuqing Zhang:
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms. IEEE Internet Things J. 11(22): 36841-36857 (2024) - [j109]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Analysis of neural network detectors for network attacks. J. Comput. Secur. 32(3): 193-220 (2024) - [j108]Hui Liu, Bo Zhao, Jiabao Guo, Kehuan Zhang, Peng Liu:
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest. Pattern Recognit. 147: 110127 (2024) - [j107]Wei Song, Zihan Xue, Jinchi Han, Zhenzhen Li, Peng Liu:
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks. IEEE Trans. Computers 73(4): 1019-1033 (2024) - [c243]Lan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code. IWSPA@CODASPY 2024: 49-58 - [c242]Peng Liu, He Wang, Chen Zheng, Yuqing Zhang:
Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering. ICNC 2024: 116-120 - [c241]Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. NDSS 2024 - [i40]Fan Zhang, Peng Liu:
Protecting the 'Stop Using My Data' Right through Blockchain-assisted Evidence Generation. CoRR abs/2406.17694 (2024) - 2023
- [j106]Lingyun Situ, Chi Zhang, Le Guan, Zhiqiang Zuo, Linzhang Wang, Xuandong Li, Peng Liu, Jin Shi:
Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware. IEEE Internet Things J. 10(23): 20718-20734 (2023) - [j105]Muskan Sharma Kuinkel, Chengyi Zhang, Peng Liu, Sevilay Demirkesen, Khaled Ksaibati:
Suitability Study of Using UAVs to Estimate Landfilled Fly Ash Stockpile. Sensors 23(3): 1242 (2023) - [j104]Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - [c240]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - [i39]Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. CoRR abs/2309.01281 (2023) - 2022
- [j103]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples. IEEE Access 10: 33602-33615 (2022) - [j102]Hui Liu, Bo Zhao, Minzhi Ji, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-filter: Detecting adversarial examples by filtering out recessive features. Appl. Soft Comput. 124: 109027 (2022) - [j101]Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu, Amir Javadpour:
Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 102: 108212 (2022) - [j100]Xixun He, Yiyu Yang, Wei Zhou, Wenjie Wang, Peng Liu, Yuqing Zhang:
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet Things J. 9(3): 2083-2093 (2022) - [j99]Hui Liu, Bo Zhao, Minzhi Ji, Mengchen Li, Peng Liu:
GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack. Inf. Sci. 613: 717-730 (2022) - [j98]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [j97]Yanghua Zhang, Jice Wang, Hexiang Huang, Yuqing Zhang, Peng Liu:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. IEEE Trans. Big Data 8(6): 1511-1523 (2022) - [j96]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [j95]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j94]Shijie Jia, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [j93]Junwei Zhou, Yijia Qian, Qingtian Zou, Peng Liu, Jianwen Xiang:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Trans. Inf. Forensics Secur. 17: 3051-3061 (2022) - [c239]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis. ASPLOS 2022: 726-739 - [c238]Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c237]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CCS 2022: 3269-3283 - [c236]Gaurav Goyal, Peng Liu, Shamik Sural:
Securing Smart Home IoT Systems with Attribute-Based Access Control. SAT-CPS@CODASPY 2022: 37-46 - [c235]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - [c234]Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. INFOCOM Workshops 2022: 1-6 - [c233]Devansh Rajgarhia, Peng Liu, Shamik Sural:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 113-118 - [c232]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c231]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [i38]Hui Liu, Bo Zhao, Yuefeng Peng, Weidong Li, Peng Liu:
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection. CoRR abs/2201.01080 (2022) - [i37]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis. CoRR abs/2206.05821 (2022) - [i36]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CoRR abs/2208.07833 (2022) - [i35]Hui Liu, Bo Zhao, Kehuan Zhang, Peng Liu:
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples. CoRR abs/2210.08579 (2022) - [i34]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - 2021
- [j92]Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Cybersecur. 4(1): 33 (2021) - [j91]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j90]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [j89]Lingyun Situ, Zhiqiang Zuo, Le Guan, Linzhang Wang, Xuandong Li, Jin Shi, Peng Liu:
Vulnerable Region-Aware Greybox Fuzzing. J. Comput. Sci. Technol. 36(5): 1212-1228 (2021) - [j88]Dongdong Huo, Chen Cao, Peng Liu, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j87]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j86]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Peng Liu, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j85]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. IEEE Trans. Inf. Forensics Secur. 16: 4691-4704 (2021) - [j84]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. IEEE Trans. Netw. Sci. Eng. 8(2): 908-920 (2021) - [j83]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c230]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860 - [c229]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c228]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c227]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - [c226]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. SP 2021: 955-969 - [c225]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. USENIX Security Symposium 2021: 2007-2024 - [i33]Wenhui Zhang, Trent Jaeger, Peng Liu:
Analyzing the Overhead of Filesystem Protection Using Linux Security Modules. CoRR abs/2101.11611 (2021) - [i32]Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios V. Vasilakos:
Security and Privacy for Artificial Intelligence: Opportunities and Challenges. CoRR abs/2102.04661 (2021) - [i31]Haizhou Wang, Peng Liu:
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection. CoRR abs/2105.02996 (2021) - [i30]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). CoRR abs/2107.07759 (2021) - [i29]Hui Liu, Bo Zhao, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features. CoRR abs/2107.09502 (2021) - [i28]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - [i27]Wei Song, Jiameng Ying, Sihao Shen, Boya Li, Hao Ma, Peng Liu:
A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions. CoRR abs/2111.14072 (2021) - 2020
- [j82]DongHyun Ko, SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Structural Image De-Identification for Privacy-Preserving Deep Learning. IEEE Access 8: 119848-119862 (2020) - [j81]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs. Autom. 111 (2020) - [j80]Qingtian Zou, Xiaoyan Sun, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [j79]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j78]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020) - [j77]Fu Chen, Peng Liu, Jianming Zhu, Sheng Gao, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. Secur. Commun. Networks 2020: 8884924:1-8884924:14 (2020) - [j76]Zhisheng Hu, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. ACM Trans. Priv. Secur. 24(1): 6:1-6:25 (2020) - [j75]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [j74]Weizhe Zhang, Huanran Wang, Hui He, Peng Liu:
DAMBA: Detecting Android Malware by ORGB Analysis. IEEE Trans. Reliab. 69(1): 55-69 (2020) - [c224]Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. ACSAC 2020: 746-759 - [c223]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
On Data-driven Attack-resilient Gaussian Process Regression for Dynamic Systems. ACC 2020: 2981-2986 - [c222]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c221]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c220]Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, Shengwu Xiong:
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern. ICPR 2020: 4221-4228 - [c219]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208 - [c218]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [c217]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [p16]Chen Zhong, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88 - [e11]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i26]Eunjung Yoon, Peng Liu:
Practical Verification of MapReduce Computation Integrity via Partial Re-execution. CoRR abs/2002.09560 (2020) - [i25]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. CoRR abs/2008.01957 (2020) - [i24]Lan Zhang, Peng Liu, Yoon-Ho Choi:
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. CoRR abs/2009.05602 (2020) - [i23]Hui Liu, Bo Zhao, Jiabao Guo, Yang An, Peng Liu:
GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks. CoRR abs/2010.06855 (2020) - [i22]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020) - [i21]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder. CoRR abs/2012.13972 (2020)
2010 – 2019
- 2019
- [j73]Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu:
On convergence rates of game theoretic reinforcement learning algorithms. Autom. 104: 90-101 (2019) - [j72]Jin-Myeong Shin, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Gener. Comput. Syst. 100: 811-825 (2019) - [j71]Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [j70]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [j69]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c216]Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. CCS 2019: 2713-2714 - [c215]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. CNS 2019: 1-6 - [c214]Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. CODASPY 2019: 327-338 - [c213]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c212]Lingyun Situ, Linzhang Wang, Xuandong Li, Le Guan, Wenhui Zhang, Peng Liu:
Energy distribution matters in greybox fuzzing. ICSE (Companion Volume) 2019: 270-271 - [c211]Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. RAID 2019: 427-442 - [c210]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c209]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - [c208]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [p15]George Cybenko, Michael P. Wellman, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p14]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 54-93 - [p13]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p12]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e10]Peng Liu, Yuqing Zhang:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, IoT S&P@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6838-4 [contents] - [e9]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - [i20]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i19]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems. CoRR abs/1908.03638 (2019) - [i18]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - [i17]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j68]Chen Zhong, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018) - [j67]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j66]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Cybersecur. 1(1): 3 (2018) - [j65]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang:
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. Cybersecur. 1(1): 5 (2018) - [j64]Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. IEEE Secur. Priv. 16(6): 71-75 (2018) - [j63]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Trans. Security Safety 4(13): e3 (2018) - [j62]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. EAI Endorsed Trans. Security Safety 4(14): e4 (2018) - [j61]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
A policy-centric approach to protecting OS kernel from vulnerable LKMs. Softw. Pract. Exp. 48(6): 1269-1284 (2018) - [j60]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. IEEE Trans. Inf. Forensics Secur. 13(10): 2506-2521 (2018) - [j59]Kai Chen, Yingjun Zhang, Peng Liu:
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. Mob. Comput. 17(8): 1879-1893 (2018) - [c207]Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. ACSAC 2018: 490-504 - [c206]Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu:
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine. APSEC 2018: 219-228 - [c205]Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. From Database to Cyber Security 2018: 227-243 - [c204]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c203]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. DSN 2018: 574-585 - [c202]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c201]Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. SACMAT 2018: 93-104 - [c200]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. WISEC 2018: 248-259 - [i16]Wei Zhou, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. CoRR abs/1802.03110 (2018) - [i15]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots. CoRR abs/1804.02814 (2018) - [i14]Xusheng Li, Zhisheng Hu, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
ROPNN: Detection of ROP Payloads Using Deep Neural Networks. CoRR abs/1807.11110 (2018) - [i13]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps. CoRR abs/1811.03241 (2018) - 2017
- [j58]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [j57]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Comput. Virol. Hacking Tech. 13(3): 193-207 (2017) - [c199]Tanveer A. Zia, Peng Liu, Weili Han:
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). ARES 2017: 55:1-55:7 - [c198]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c197]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
Attack-resilient estimation of switched nonlinear cyber-physical systems. ACC 2017: 4328-4333 - [c196]Zhisheng Hu, Minghui Zhu, Peng Liu:
Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs. MTD@CCS 2017: 99-109 - [c195]Shijie Jia, Luning Xia, Bo Chen, Peng Liu:
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. CCS 2017: 2217-2229 - [c194]Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi:
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. CCS 2017: 2231-2244 - [c193]Theophilus Benson, Peng Liu, Srikanth Sundaresan, Yuqing Zhang:
IoT S&P 2017: First Workshop on Internet of Things Security and Privacy. CCS 2017: 2647-2648 - [c192]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing. DBSec 2017: 259-274 - [c191]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu:
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. DSN 2017: 145-156 - [c190]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c189]Chengyi Zhang, Yazhe Wang, Peng Liu, Tao Lin, Lvgen Luo, Ziqi Yu, Xinwang Zhuo:
PMViewer: A Crowdsourcing Approach to Fine-Grained Urban PM2.5 Monitoring in China. MASS 2017: 323-327 - [c188]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MobiSys 2017: 225-238 - [c187]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c186]Chuangang Ren, Peng Liu, Sencun Zhu:
WindowGuard: Systematic Protection of GUI Security in Android. NDSS 2017 - [c185]Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu:
VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. SecureComm 2017: 377-396 - [c184]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers Through Auto-Correction. SecureComm 2017: 673-686 - [c183]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - [c182]Liang Deng, Peng Liu, Jun Xu, Ping Chen, Qingkai Zeng:
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring. VEE 2017: 83-96 - [p11]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p10]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Enterprise-Level Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 66-109 - [p9]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher, Christopher Garneau, Bo Chen:
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Theory and Models for Cyber Situation Awareness 2017: 128-169 - [e8]Peng Liu, Yuqing Zhang, Theophilus Benson, Srikanth Sundaresan:
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, IoT S&P@CCS, Dallas, TX, USA, November 03, 2017. ACM 2017, ISBN 978-1-4503-5396-0 [contents] - [e7]Peng Liu, Sushil Jajodia, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - [i12]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - [i11]Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang:
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. CoRR abs/1706.05779 (2017) - [i10]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots. CoRR abs/1708.01834 (2017) - [i9]Dingfeng Ye, Peng Liu, Jun Xu:
Towards Practical Obfuscation of General Circuits. IACR Cryptol. ePrint Arch. 2017: 321 (2017) - 2016
- [j56]Shengzhi Zhang, Xiaoqi Jia, Peng Liu:
Towards service continuity for transactional applications via diverse device drivers. Int. J. Inf. Comput. Secur. 8(4): 382-400 (2016) - [j55]Kai Chen, Yingjun Zhang, Peng Liu:
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing. IEEE Trans. Reliab. 65(3): 1180-1194 (2016) - [j54]Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c181]Bo Chen, Shijie Jia, Luning Xia, Peng Liu:
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. ACSAC 2016: 496-507 - [c180]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Suresh Chari, Ce Zhang:
Android malware development on public malware scanning platforms: A large-scale data-driven study. IEEE BigData 2016: 1090-1099 - [c179]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. BigDataSecurity/HPSC/IDS 2016: 357-363 - [c178]Jun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu:
Demo: A Symbolic N-Variant System. MTD@CCS 2016: 65-68 - [c177]Kai Wang, Yuqing Zhang, Peng Liu:
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback. CCS 2016: 92-103 - [c176]Shijie Jia, Luning Xia, Bo Chen, Peng Liu:
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. AsiaCCS 2016: 305-315 - [c175]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c174]Peng Liu, Cliff Wang:
MTD 2016: Third ACM Workshop on Moving Target Defense. CCS 2016: 1868-1869 - [c173]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Towards probabilistic identification of zero-day attack paths. CNS 2016: 64-72 - [c172]Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. CODASPY 2016: 277-284 - [c171]Zhisheng Hu, Ping Chen, Yang Lu, Minghui Zhu, Peng Liu:
Towards a Science for Adaptive Defense: Revisit Server Protection. CIC 2016: 112-121 - [c170]Yufei Jiang, Dinghao Wu, Peng Liu:
JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. COMPSAC 2016: 12-21 - [c169]Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. DSN 2016: 550-561 - [c168]Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:
A Machine Learning Approach for Detecting Third-Party Trackers on the Web. ESORICS (1) 2016: 238-258 - [c167]Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu, Wenjie Wang:
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. ESORICS (1) 2016: 458-476 - [c166]Mingyi Zhao, Peng Liu:
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. ESSoS 2016: 173-189 - [c165]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. HASE 2016: 122-131 - [c164]Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu:
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. ICICS 2016: 361-375 - [c163]Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:
StraightTaint: decoupled offline symbolic taint analysis. ASE 2016: 308-319 - [c162]Wang Li, Dinghao Wu, Peng Liu:
iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary. QRS Companion 2016: 31-38 - [c161]Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. SAC 2016: 482-500 - [c160]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [e6]Peng Liu, Cliff Wang:
Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4570-5 [contents] - [i8]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - [i7]Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong:
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks. CoRR abs/1610.01934 (2016) - [i6]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. CoRR abs/1611.00837 (2016) - [i5]Dingfeng Ye, Peng Liu:
Obfuscation without Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 95 (2016) - 2015
- [j53]Jian Liu, Peng Liu, Sifeng Liu, Xianzhong Zhou, Tao Zhang:
A study of decision process in MCDM problems with large number of criteria. Int. Trans. Oper. Res. 22(2): 237-264 (2015) - [j52]Peng Liu, Weiwei Sun, Jian Zhang, Baihua Zheng:
An automaton-based index scheme supporting twig queries for on-demand XML data broadcast. J. Parallel Distributed Comput. 86: 82-97 (2015) - [j51]Minghui Zhu, Peng Liu:
Reviewing the book "Principles of Cyber-physical Systems" from a security perspective. EAI Endorsed Trans. Security Safety 2(4): e6 (2015) - [j50]Weiwei Sun, Chunan Chen, Baihua Zheng, Chong Chen, Peng Liu:
An Air Index for Spatial Query Processing in Road Networks. IEEE Trans. Knowl. Data Eng. 27(2): 382-395 (2015) - [j49]Qiang Zeng, Mingyi Zhao, Peng Liu, Poonam Yadav, Seraphin B. Calo, Jorge Lobo:
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation. IEEE Trans. Knowl. Data Eng. 27(4): 979-992 (2015) - [j48]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c159]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c158]Chen Cao, Neng Gao, Peng Liu, Ji Xiang:
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. ACSAC 2015: 361-370 - [c157]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c156]Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang:
Discover and Tame Long-running Idling Processes in Enterprise Systems. AsiaCCS 2015: 543-554 - [c155]Mingyi Zhao, Jens Grossklags, Peng Liu:
An Empirical Study of Web Vulnerability Discovery Ecosystems. CCS 2015: 1105-1117 - [c154]Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu:
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. CCS 2015: 1236-1247 - [c153]Zhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei:
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. CODASPY 2015: 99-110 - [c152]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. CogSIMA 2015: 165-171 - [c151]Mingyi Zhao, Peng Liu, Jorge Lobo:
Towards Collaborative Query Planning in Multi-party Database Networks. DBSec 2015: 19-34 - [c150]Qiang Zeng, Mingyi Zhao, Peng Liu:
HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows. DSN 2015: 485-496 - [c149]Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu:
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. DSN 2015: 555-562 - [c148]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c147]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. HotSoS 2015: 9:1-9:11 - [c146]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract). QRS Companion 2015: 184-185 - [c145]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment. SafeConfig@CCS 2015: 21-26 - [c144]Jun Wang, Xi Xiong, Peng Liu:
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. USENIX ATC 2015: 361-373 - [c143]Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:
TaintPipe: Pipelined Symbolic Taint Analysis. USENIX Security Symposium 2015: 65-80 - [c142]Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu:
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. USENIX Security Symposium 2015: 659-674 - [c141]Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, Peng Liu:
Towards Discovering and Understanding Task Hijacking in Android. USENIX Security Symposium 2015: 945-959 - [p8]Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu:
Cyber Insider Mission Detection for Situation Awareness. Intelligent Methods for Cyber Warfare 2015: 201-217 - [i4]Ping Chen, Jun Xu, Jun Wang, Peng Liu:
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack. CoRR abs/1507.02786 (2015) - 2014
- [j47]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Defeating buffer overflow attacks via virtualization. Comput. Electr. Eng. 40(6): 1940-1950 (2014) - [j46]Weiwei Sun, Yongrui Qin, Jingjing Wu, Baihua Zheng, Zhuoyao Zhang, Ping Yu, Peng Liu, Jian Zhang:
Air Indexing for On-Demand XML Data Broadcast. IEEE Trans. Parallel Distributed Syst. 25(6): 1371-1381 (2014) - [c140]Minghui Zhu, Zhisheng Hu, Peng Liu:
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed. MTD@CCS 2014: 51-58 - [c139]Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu:
Comparing Different Moving Target Defense Techniques. MTD@CCS 2014: 97-107 - [c138]Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Peng Liu:
DeltaPath: Precise and Scalable Calling Context Encoding. CGO 2014: 109 - [c137]Chen Zhong, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [c136]Rui Wu, Ping Chen, Peng Liu, Bing Mao:
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. DSN 2014: 574-585 - [c135]Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai:
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. ESORICS (1) 2014: 310-325 - [c134]Lingchen Zhang, Sachin Shetty, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ESORICS (2) 2014: 475-493 - [c133]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - [c132]Kai Chen, Peng Liu, Yingjun Zhang:
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. ICSE 2014: 175-186 - [c131]Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Program Logic Based Software Plagiarism Detection. ISSRE 2014: 66-77 - [c130]Chuangang Ren, Kai Chen, Peng Liu:
Droidmarking: resilient software watermarking for impeding android application repackaging. ASE 2014: 635-646 - [c129]Lu Su, Yunlong Gao, Fan Ye, Peng Liu, Oktay Günlük, Tom Bcrman, Seraphin B. Calo, Tarek F. Abdelzaher:
Robust confidentiality preserving data delivery in federated coalition networks. Networking 2014: 1-9 - [c128]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks. SecureComm (1) 2014: 3-23 - [c127]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c126]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - [c125]Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - [c124]Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. WISEC 2014: 141-152 - [p7]Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian:
Software Cruising: A New Technology for Building Concurrent Software Monitor. Secure Cloud Computing 2014: 303-324 - [p6]John Yen, Robert F. Erbacher, Chen Zhong, Peng Liu:
Cognitive Process. Cyber Defense and Situational Awareness 2014: 119-144 - 2013
- [j45]Shengzhi Zhang, Wenjie Wang, Haishan Wu, Athanasios V. Vasilakos, Peng Liu:
Towards transparent and distributed workload management for large scale web servers. Future Gener. Comput. Syst. 29(4): 913-925 (2013) - [j44]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia:
Quantitative survivability evaluation of three virtual machine-based server architectures. J. Netw. Comput. Appl. 36(2): 781-790 (2013) - [j43]Jian Liu, Sifeng Liu, Peng Liu, Xianzhong Zhou, Bin Zhao:
A new decision support model in multi-criteria decision making with intuitionistic fuzzy sets based on risk preferences and criteria reduction. J. Oper. Res. Soc. 64(8): 1205-1220 (2013) - [j42]Jian Liu, Peng Liu, Sifeng Liu, Yizhong Ma, Wensheng Yang:
Handover optimization in business processes via prediction. Kybernetes 42(7): 1101-1127 (2013) - [j41]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Secur. Commun. Networks 6(5): 612-630 (2013) - [j40]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. Secur. Commun. Networks 6(7): 818-832 (2013) - [j39]Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang, Peng Liu:
Defending return-oriented programming based on virtualization techniques. Secur. Commun. Networks 6(10): 1236-1249 (2013) - [j38]Peng Liu, Refik Molva, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". Secur. Commun. Networks 6(12): 1522-1523 (2013) - [j37]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Trans. Inf. Forensics Secur. 8(6): 888-900 (2013) - [c123]Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. ACSAC 2013: 59-68 - [c122]Xiaoyan Sun, Jun Dai, Peng Liu:
SKRM: Where security techniques talk to each other. CogSIMA 2013: 163-166 - [c121]Jun Dai, Xiaoyan Sun, Peng Liu:
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. ESORICS 2013: 536-555 - [c120]Eunjung Yoon, Peng Liu:
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation. ICICS 2013: 194-212 - [c119]Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing:
Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. ICICS 2013: 229-244 - [c118]Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265 - [c117]Xi Xiong, Peng Liu:
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. RAID 2013: 103-122 - [c116]Bin Zhao, Peng Liu:
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. RAID 2013: 244-264 - [c115]Pingjian Wang, Lei Wang, Ji Xiang, Peng Liu, Neng Gao, Jiwu Jing:
MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker. SERE 2013: 119-128 - [c114]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186 - [i3]Jun Wang, Xi Xiong, Peng Liu:
Practical Fine-grained Privilege Separation in Multithreaded Applications. CoRR abs/1305.2553 (2013) - [i2]Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu:
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware. IACR Cryptol. ePrint Arch. 2013: 461 (2013) - 2012
- [j36]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [j35]Jun Shao, Peng Liu, Yuan Zhou:
Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Softw. 85(3): 655-665 (2012) - [j34]Jingqiang Lin, Jiwu Jing, Peng Liu:
Evaluating Intrusion-Tolerant Certification Authority Systems. Qual. Reliab. Eng. Int. 28(8): 825-841 (2012) - [j33]Jun Shao, Peng Liu, Guiyi Wei, Yun Ling:
Anonymous proxy re-encryption. Secur. Commun. Networks 5(5): 439-449 (2012) - [c113]Shengzhi Zhang, Peng Liu:
Letting applications operate through attacks launched from compromised drivers. AsiaCCS 2012: 91-92 - [c112]Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu:
Stalking online: on user privacy in social networks. CODASPY 2012: 37-48 - [c111]Po-Chun Chen, Peng Liu, John Yen, Tracy Mullen:
Experience-based cyber situation recognition using relaxable logic patterns. CogSIMA 2012: 243-250 - [c110]Jun Dai, Xiaoyan Sun, Peng Liu, Nicklaus A. Giacobe:
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. CyberSecurity 2012: 83-92 - [c109]Weiwei Sun, Peng Liu, Jingjing Wu, Yongrui Qin, Baihua Zheng:
An Automaton-Based Index Scheme for On-Demand XML Data Broadcast. DASFAA (2) 2012: 96-110 - [c108]Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu:
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. ESORICS 2012: 289-306 - [c107]Jingqiang Lin, Peng Liu, Jiwu Jing:
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. GameSec 2012: 118-137 - [c106]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu:
A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121 - [c105]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012 - [c104]Shengzhi Zhang, Peng Liu:
Assessing the Trustworthiness of Drivers. RAID 2012: 42-63 - [c103]Mingyi Zhao, Peng Liu:
Modeling and Checking the Security of DIFC System Configurations. SafeConfig 2012: 21-38 - [c102]Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. TrustCom 2012: 793-800 - 2011
- [j32]Fengjun Li, Xukai Zou, Peng Liu, Jake Y. Chen:
New threats to health data privacy. BMC Bioinform. 12(S-12): S7 (2011) - [j31]Peng Liu, Meng Yu:
Damage assessment and repair in attack resilient distributed database systems. Comput. Stand. Interfaces 33(1): 96-107 (2011) - [j30]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: semantics aware signature generation for polymorphic worm detection. Int. J. Inf. Sec. 10(5): 269-283 (2011) - [j29]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu, Frank E. Ritter:
Event-driven modelling of evolving social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(1): 13-32 (2011) - [j28]Fengjun Li, Bo Luo, Peng Liu:
Secure and privacy-preserving information aggregation for smart grids. Int. J. Secur. Networks 6(1): 28-39 (2011) - [j27]Jun Shao, Zhenfu Cao, Peng Liu:
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Networks 4(2): 122-135 (2011) - [j26]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. IEEE Trans. Inf. Forensics Secur. 6(4): 1323-1334 (2011) - [j25]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata. VLDB J. 20(3): 397-415 (2011) - [c101]Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos:
Distributed workload and response time management for web applications. CNSM 2011: 1-9 - [c100]Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li:
LeakProber: a framework for profiling sensitive data leakage paths. CODASPY 2011: 75-84 - [c99]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu:
Identity management for cloud computing: developments and directions. CSIIRW 2011: 32 - [c98]Xukai Zou, Peng Liu, Jake Y. Chen:
Personal genome privacy protection with feature-based hierarchical dual-stage encryption. GENSiPS 2011: 178-181 - [c97]Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. ICC 2011: 1-6 - [c96]Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei:
Multi-Use Unidirectional Proxy Re-Encryption. ICC 2011: 1-5 - [c95]Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu:
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. ICICS 2011: 360-373 - [c94]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu:
Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765 - [c93]Qi Fang, Peng Liu, John Yen, Jonathan H. Morgan, Donald Shemanski, Frank E. Ritter:
Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation. Critical Infrastructure Protection 2011: 201-216 - [c92]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. ISPEC 2011: 317-332 - [c91]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16 - [c90]Xi Xiong, Donghai Tian, Peng Liu:
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. NDSS 2011 - [c89]Qiang Zeng, Dinghao Wu, Peng Liu:
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures. PLDI 2011: 367-377 - [c88]Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu:
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113 - [c87]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - [c86]Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng Liu:
Privacy Preserving Group Linkage. SSDBM 2011: 432-450 - [c85]Nan Zhang, Jiwu Jing, Peng Liu:
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. TrustCom 2011: 1592-1599 - [c84]Jingjing Wu, Peng Liu, Lu Gan, Yongrui Qin, Weiwei Sun:
Energy-Conserving Fragment Methods for Skewed XML Data Access in Push-Based Broadcast. WAIM 2011: 590-601 - [e5]Albert Levi, Peng Liu, Refik Molva:
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2 [contents] - 2010
- [j24]Yoon-Ho Choi, Peng Liu, Seung-Woo Seo:
Creation of the importance scanning worm using information collected by Botnets. Comput. Commun. 33(6): 676-688 (2010) - [j23]Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:
Worm virulence estimation for the containment of local worm outbreak. Comput. Secur. 29(1): 104-123 (2010) - [j22]Meng Yu, Wanyu Zang, Peng Liu:
Recovery of data integrity under multi-tier architectures. IET Inf. Secur. 4(4): 344-351 (2010) - [j21]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. Secur. Commun. Networks 3(4): 334-354 (2010) - [j20]Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-Free Buffer Overflow Attack Blocker. IEEE Trans. Dependable Secur. Comput. 7(1): 65-79 (2010) - [c83]Alex Hai Wang, Su Yan, Peng Liu:
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. ARES 2010: 104-111 - [c82]Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu:
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. CIT 2010: 1299-1305 - [c81]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232 - [c80]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
Cross-layer comprehensive intrusion harm analysis for production workload server systems. ACSAC 2010: 297-306 - [c79]Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:
Using Bayesian networks for cyber security analysis. DSN 2010: 211-220 - [c78]Liang Zhu, Yinan Jing, Weiwei Sun, Dingding Mao, Peng Liu:
Voronoi-based aggregate nearest neighbor query processing in road networks. GIS 2010: 518-521 - [c77]Shenlong Chen, Yuqing Zhang, Peng Liu, Jingyu Feng:
Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks. GLOBECOM 2010: 1-6 - [c76]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia:
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481 - [c75]Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu:
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. INFOCOM 2010: 2820-2828 - [c74]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu:
Study of effect of node seniority in social networks. ISI 2010: 147-149 - [c73]Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu:
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. ISPEC 2010: 153-171 - [c72]Zongbin Liu, Jiwu Jing, Peng Liu:
Rate-Based Watermark Traceback: A New Approach. ISPEC 2010: 172-186 - [c71]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. ISC 2010: 409-415 - [c70]Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu:
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485 - [c69]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. SecureComm 2010: 1-19 - [c68]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325 - [c67]Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:
Protecting Kernel Data through Virtualization Technology. SECURWARE 2010: 5-10 - [c66]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu:
Behavior Evolution and Event-Driven Growth Dynamics in Social Networks. SocialCom/PASSAT 2010: 217-224 - [c65]Heywoong Kim, Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++. SpringSim 2010: 101 - [p5]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p4]John Yen, Michael D. McNeese, Tracy Mullen, David L. Hall, Xiaocong Fan, Peng Liu:
RPD-based Hypothesis Reasoning for Cyber Situation Awareness. Cyber Situational Awareness 2010: 39-49 - [p3]Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li:
Cross-Layer Damage Assessment for Cyber Situational Awareness. Cyber Situational Awareness 2010: 155-176 - [e4]Dengguo Feng, David A. Basin, Peng Liu:
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. ACM 2010, ISBN 978-1-60558-936-7 [contents] - [e3]Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents] - [i1]Jun Shao, Zhenfu Cao, Peng Liu:
CCA-Secure PRE Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 112 (2010)
2000 – 2009
- 2009
- [j19]Meng Yu, Peng Liu, Wanyu Zang:
The implementation and evaluation of a recovery system for workflows. J. Netw. Comput. Appl. 32(1): 158-183 (2009) - [j18]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu:
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Secur. Comput. 6(3): 188-201 (2009) - [j17]Baihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, Xuhua Ding:
Tuning On-Air Signatures for Balancing Performance and Confidentiality. IEEE Trans. Knowl. Data Eng. 21(12): 1783-1797 (2009) - [j16]Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
Evaluating MAPSec by marking attack graphs. Wirel. Networks 15(8): 1042-1058 (2009) - [c64]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158 - [c63]Xi Xiong, Xiaoqi Jia, Peng Liu:
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. ACSAC 2009: 484-493 - [c62]Shengzhi Zhang, Xi Xiong, Xiaoqi Jia, Peng Liu:
Availability-sensitive intrusion recovery. VMSec@CCS 2009: 43-48 - [c61]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Behavior based software theft detection. CCS 2009: 280-290 - [c60]Kun Bai, Peng Liu:
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. EDBT 2009: 720-731 - [c59]Ruidong Li, Jie Li, Peng Liu, Jien Kato:
A Novel Hybrid Trust Management Framework for MANETs. ICDCS Workshops 2009: 251-256 - [c58]Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253 - [e2]Moti Yung, Peng Liu, Dongdai Lin:
Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5487, Springer 2009, ISBN 978-3-642-01439-0 [contents] - 2008
- [c57]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 - [c56]Yuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia:
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318 - [c55]Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu:
Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38 - [c54]Kun Bai, Peng Liu:
A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. CIKM 2008: 1403-1404 - [c53]Peng Liu:
Secure and Privacy-Preserving Information Brokering. Inscrypt 2008: 22 - [c52]Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - [c51]Kun Bai, Meng Yu, Peng Liu:
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176 - [c50]Lunquan Li, Peng Liu, George Kesidis:
Threshold Smart Walk for the Containment of Local Worm Outbreak. GLOBECOM 2008: 2124-2128 - [c49]Kun Bai, Peng Liu:
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. HASE 2008: 373-382 - [c48]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu:
Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 - [c47]Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
EndSec: An end-to-end message security protocol for mobile telecommunication networks. WOWMOM 2008: 1-7 - [c46]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140 - [p2]Peng Liu, Sushil Jajodia, Meng Yu:
Damage Quarantine and Recovery in Data Processing Systems. Handbook of Database Security 2008: 383-407 - 2007
- [j15]Qijun Gu, Peng Liu, Chao-Hsien Chu:
Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007) - [j14]Alex Hai Wang, Peng Liu, Lunquan Li:
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies. Int. J. Inf. Comput. Secur. 1(3): 315-340 (2007) - [j13]Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks. Int. J. Secur. Networks 2(1/2): 154-169 (2007) - [j12]Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann:
Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) - [j11]Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Telecommun. Syst. 35(3-4): 99-122 (2007) - [c45]Jason H. Li, Renato Levy, Peng Liu:
Intelligent Cyber Security Analysis in Enterprise Networks. AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems 2007: 75-78 - [c44]Meng Yu, Wanyu Zang, Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106 - [c43]Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views. AsiaCCS 2007: 105-116 - [c42]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. CCS 2007: 508-518 - [c41]Bo Luo, Dongwon Lee, Peng Liu:
Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71 - [c40]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: A proactive worm containment solution for enterprise networks. SecureComm 2007: 433-442 - [c39]Jingqiang Lin, Jiwu Jing, Peng Liu:
Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241 - [c38]Lunquan Li, Peng Liu, Yoon-chan Jhi, George Kesidis:
Evaluation of Collaborative Worm Containments on DETER Testbed. DETER 2007 - [c37]Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen:
An Objective Trust Management Framework for Mobile Ad Hoc Networks. VTC Spring 2007: 56-60 - [p1]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia:
Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 - 2006
- [j10]Peng Liu, Alex Hai Wang, Lunquan Li:
Real-time data attack isolation for commercial database applications. J. Netw. Comput. Appl. 29(4): 294-320 (2006) - [j9]Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen:
On-demand public-key management for mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 295-306 (2006) - [c36]Kun Bai, Peng Liu:
Towards Database Firewall: Mining the Damage Spreading Patterns. ACSAC 2006: 449-462 - [c35]Qijun Gu, Kun Bai, Hai Wang, Peng Liu, Chao-Hsien Chu:
Modeling of pollution in p2p file sharing systems. CCNC 2006: 1033-1037 - [c34]Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri:
Privacy-preserving semantic interoperation and access control of heterogeneous databases. AsiaCCS 2006: 66-77 - [c33]Alex Hai Wang, Peng Liu:
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. ESORICS 2006: 207-224 - [c32]Chi-Chun Pan, Prasenjit Mitra, Peng Liu:
Semantic access control for information interoperation. SACMAT 2006: 237-246 - [c31]Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. SEC 2006: 158-170 - [c30]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259 - [c29]Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-free Buffer Overflow Attack Blocker. USENIX Security Symposium 2006 - [c28]Lunquan Li, Peng Liu, George Kesidis:
Visual toolkit for network security experiment specification and data analysis. VizSEC 2006: 7-14 - 2005
- [j8]Meng Yu, Peng Liu, Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations. J. Comput. Secur. 13(4): 623-658 (2005) - [j7]Peng Liu, Wanyu Zang, Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) - [c27]Meng Yu, Wanyu Zang, Peng Liu:
Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526 - [c26]Qingzhao Tan, Wang-Chien Lee, Baihua Zheng, Peng Liu, Dik Lun Lee:
Balancing performance and confidentiality in air index. CIKM 2005: 800-807 - [c25]Yan Sun, Peng Liu, Parviz Kermani, Thomas F. La Porta:
An architecture and key management approach for maintaining privacy in location based group services. CollaborateCom 2005 - [c24]Kun Bai, Alex Hai Wang, Peng Liu:
Towards Database Firewalls. DBSec 2005: 178-192 - [c23]Qijun Gu, Peng Liu, Sencun Zhu, Chao-Hsien Chu:
Defending against packet injection attacks unreliable ad hoc networks. GLOBECOM 2005: 5 - [c22]Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta:
A Taxonomy of Cyber Attacks on 3G Networks. ISI 2005: 631-633 - [c21]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu:
KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501 - [c20]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
Deep Set Operators for XQuery. XIME-P 2005 - 2004
- [j6]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [j5]Peng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang:
The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004) - [c19]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552 - [c18]Ruidong Li, Jie Li, Hisao Kameda, Peng Liu:
Localized public-key management for mobile ad hoc networks. GLOBECOM 2004: 1284-1289 - [c17]Meng Yu, Peng Liu, Wanyu Zang:
Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425 - [c16]Alex Hai Wang, Peng Liu, Lunquan Li:
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. ISC 2004: 146-157 - [c15]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147 - [c14]Peng Liu:
Attack Aware Integrity Control in Databases (Invited Abstract). IICIS 2004: 301 - 2003
- [c13]Meng Yu, Peng Liu, Wanyu Zang:
Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-150 - [c12]Jiwu Jing, Peng Liu, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin:
ARECA: a highly attack resilient certification authority. SSRS@CCS 2003: 53-63 - [c11]Peng Liu, Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. CCS 2003: 179-189 - [c10]Jianyong Zhang, Peng Liu:
Delivering Services with Integrity Guarantees in Survivable Database Systems. DBSec 2003: 33-46 - [c9]Meng Yu, Peng Liu, Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 - [c8]Dongwon Lee, Wang-Chien Lee, Peng Liu:
Supporting XML Security Models Using Relational Databases: A Vision. Xsym 2003: 267-281 - [e1]Peng Liu, Partha P. Pal:
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, in Association with 10th ACM Conference on Computer and Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October 31, 2003. ACM 2003, ISBN 978-1-58113-784-2 [contents] - 2002
- [j4]Paul Ammann, Sushil Jajodia, Peng Liu:
Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) - [c7]Peng Liu:
Architectures for Intrusion Tolerant Database Systems. ACSAC 2002: 311-320 - 2001
- [j3]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding loss of fairness owing to failures in fair data exchange systems. Decis. Support Syst. 31(3): 337-350 (2001) - [c6]Peng Liu:
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. ACSAC 2001: 219-229 - [c5]Peng Liu, Sushil Jajodia:
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205 - 2000
- [j2]Peng Liu, Paul Ammann, Sushil Jajodia:
Rewriting Histories: Recovering from Malicious Transactions. Distributed Parallel Databases 8(1): 7-40 (2000) - [j1]Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. J. Comput. Secur. 8(4): 243-279 (2000) - [c4]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
1990 – 1999
- 1999
- [c3]Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 - [c2]Peng Liu, Paul Ammann, Sushil Jajodia:
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 - 1998
- [c1]Sushil Jajodia, Peng Liu, Catherine D. McCollum:
Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint