Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Peng Liu 0005
Author information
- affiliation: College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA
- affiliation: Department of Information Systems, University of Maryland, Baltimore County, Baltimore, MD, USA
Other persons with the same name
- Peng Liu
- Peng Liu 0001 — Microsoft Research Asia, Beijing, China
- Peng Liu 0002 — FZI Forschungszentrum Informatik an der Universität Karlsruhe, Germany
- Peng Liu 0003 — School of Geographical and Earth Sciences, University of Glasgow, Glasgow, United Kingdom
- Peng Liu 0004 — School of Management, Shenyang University of Technology, Shenyang, China
- Peng Liu 0006 — PLA University of Science & Technology, Nanjing, China
- Peng Liu 0007 — Department of Biological Statistics and Computational Biology, Cornell University, Ithaca, NY, USA
- Peng Liu 0008 — Harbin Institute of Technology, Harbin, Heilongjiang, China
- Peng Liu 0009 — School of Mechanical Engineering, Beijing Institute of Technology, Beijing, China
- Peng Liu 0010 — Hong Kong University of Science and Technology, Hong Kong, China
- Peng Liu 0011 — Trinity College Dublin, Dublin, Ireland
- Peng Liu 0012 — California State University, Fullerton, USA / Michigan State University, USA
- Peng Liu 0013 — CUMT-IoT Perception Mine Research Center, China University of Mining and Technology, Xuzhou, China
- Peng Liu 0014 — School of Management, Lanzhou University, Lanzhou, China
- Peng Liu 0015 — Department of Electr. & Comput. Engineering, Queen's University, Kingston, ON, Canada
- Peng Liu 0016 — Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China
2010 – today
- 2013
[j28]Shengzhi Zhang, Wenjie Wang, Haishan Wu, Athanasios V. Vasilakos, Peng Liu: Towards transparent and distributed workload management for large scale web servers. Future Generation Comp. Syst. 29(4): 913-925 (2013)
[j27]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia: Quantitative survivability evaluation of three virtual machine-based server architectures. J. Network and Computer Applications 36(2): 781-790 (2013)
[j26]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang: Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Security and Communication Networks 6(5): 612-630 (2013)
[j25]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu: Semantic aware attribution analysis of remote exploits. Security and Communication Networks 6(7): 818-832 (2013)
[j24]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu: Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Transactions on Information Forensics and Security 8(6): 888-900 (2013)
[c73]Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve Hutchinson, Hasan Cam: How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265
[c72]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu: A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186
[i4]Jun Wang, Xi Xiong, Peng Liu: Practical Fine-grained Privilege Separation in Multithreaded Applications. CoRR abs/1305.2553 (2013)
[i3]Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu: HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware. IACR Cryptology ePrint Archive 2013: 461 (2013)- 2012
[j23]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie: Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012)
[j22]Jun Shao, Peng Liu, Yuan Zhou: Achieving key privacy without losing CCA security in proxy re-encryption. Journal of Systems and Software 85(3): 655-665 (2012)
[j21]Jingqiang Lin, Jiwu Jing, Peng Liu: Evaluating Intrusion-Tolerant Certification Authority Systems. Quality and Reliability Eng. Int. 28(8): 825-841 (2012)
[j20]Jun Shao, Peng Liu, Guiyi Wei, Yun Ling: Anonymous proxy re-encryption. Security and Communication Networks 5(5): 439-449 (2012)
[c71]Shengzhi Zhang, Peng Liu: Letting applications operate through attacks launched from compromised drivers. ASIACCS 2012: 91-92
[c70]Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu: Stalking online: on user privacy in social networks. CODASPY 2012: 37-48
[c69]Jingqiang Lin, Peng Liu, Jiwu Jing: Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. GameSec 2012: 118-137
[c68]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu: A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121
[c67]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu: Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012
[c66]- 2011
[j19]Fengjun Li, Xukai Zou, Peng Liu, Jake Y. Chen: New threats to health data privacy. BMC Bioinformatics 12(S-12): S7 (2011)
[j18]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi: SAS: semantics aware signature generation for polymorphic worm detection. Int. J. Inf. Sec. 10(5): 269-283 (2011)
[j17]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu, Frank E. Ritter: Event-driven modelling of evolving social networks. IJSCCPS 1(1): 13-32 (2011)
[j16]Fengjun Li, Bo Luo, Peng Liu: Secure and privacy-preserving information aggregation for smart grids. IJSN 6(1): 28-39 (2011)
[j15]Jun Shao, Zhenfu Cao, Peng Liu: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks 4(2): 122-135 (2011)
[j14]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing: PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. IEEE Transactions on Information Forensics and Security 6(4): 1323-1334 (2011)
[j13]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata. VLDB J. 20(3): 397-415 (2011)
[c65]Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos: Distributed workload and response time management for web applications. CNSM 2011: 1-9
[c64]Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li: LeakProber: a framework for profiling sensitive data leakage paths. CODASPY 2011: 75-84
[c63]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani M. Thuraisingham, Ting Yu: Identity management for cloud computing: developments and directions. CSIIRW 2011: 32
[c62]Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei: Multi-Use Unidirectional Proxy Re-Encryption. ICC 2011: 1-5
[c61]Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu: HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. ICICS 2011: 360-373
[c60]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu: Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765
[c59]Qi Fang, Peng Liu, John Yen, Jonathan H. Morgan, Donald Shemanski, Frank E. Ritter: Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation. Critical Infrastructure Protection 2011: 201-216
[c58]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. ISPEC 2011: 317-332
[c57]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie: Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16
[c56]Xi Xiong, Donghai Tian, Peng Liu: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. NDSS 2011
[c55]Qiang Zeng, Dinghao Wu, Peng Liu: Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures. PLDI 2011: 367-377
[c54]Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu: A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113
[c53]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu: SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208
[c52]Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng Liu: Privacy Preserving Group Linkage. SSDBM 2011: 432-450- 2010
[j12]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis: PWC: a proactive worm containment solution for enterprise networks. Security and Communication Networks 3(4): 334-354 (2010)
[j11]Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu: SigFree: A Signature-Free Buffer Overflow Attack Blocker. IEEE Trans. Dependable Sec. Comput. 7(1): 65-79 (2010)
[c51]Alex Hai Wang, Su Yan, Peng Liu: A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. ARES 2010: 104-111
[c50]Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu: CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. CIT 2010: 1299-1305
[c49]Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu: The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232
[c48]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing: Cross-layer comprehensive intrusion harm analysis for production workload server systems. ACSAC 2010: 297-306
[c47]Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy: Using Bayesian networks for cyber security analysis. DSN 2010: 211-220
[c46]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia: Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481
[c45]Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu: A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. INFOCOM 2010: 2820-2828
[c44]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu: Study of effect of node seniority in social networks. ISI 2010: 147-149
[c43]Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu: Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. ISPEC 2010: 153-171
[c42]Zongbin Liu, Jiwu Jing, Peng Liu: Rate-Based Watermark Traceback: A New Approach. ISPEC 2010: 172-186
[c41]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. ISC 2010: 409-415
[c40]Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu: Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485
[c39]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi: SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. SecureComm 2010: 1-19
[c38]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang: Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325
[c37]Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu: Behavior Evolution and Event-Driven Growth Dynamics in Social Networks. SocialCom/PASSAT 2010: 217-224
[p5]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen: Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13
[p4]John Yen, Michael D. McNeese, Tracy Mullen, David L. Hall, Xiaocong Fan, Peng Liu: RPD-based Hypothesis Reasoning for Cyber Situation Awareness. Cyber Situational Awareness 2010: 39-49
[p3]Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li: Cross-Layer Damage Assessment for Cyber Situational Awareness. Cyber Situational Awareness 2010: 155-176
[e1]Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (Eds.): Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2
[i2]Jun Shao, Zhenfu Cao, Peng Liu: CCA-Secure PRE Scheme without Random Oracles. IACR Cryptology ePrint Archive 2010: 112 (2010)
[i1]Jun Shao, Peng Liu, Jian Weng: CCA-Secure PRE Scheme without Public Verifiability. IACR Cryptology ePrint Archive 2010: 357 (2010)
2000 – 2009
- 2009
[j10]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Sec. Comput. 6(3): 188-201 (2009)
[c36]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158
[c35]Xi Xiong, Xiaoqi Jia, Peng Liu: SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. ACSAC 2009: 484-493
[c34]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290
[c33]- 2008
[c32]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298
[c31]Yuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia: A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318
[c30]Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu: Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38
[c29]
[c28]Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu: Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112
[c27]Kun Bai, Meng Yu, Peng Liu: TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176
[c26]
[c25]Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
[c24]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140
[p2]Peng Liu, Sushil Jajodia, Meng Yu: Damage Quarantine and Recovery in Data Processing Systems. Handbook of Database Security 2008: 383-407- 2007
[j9]Qijun Gu, Peng Liu, Chao-Hsien Chu: Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007)
[j8]Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007)
[j7]Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
[c23]Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee: Incremental adaptation of XPath access control views. ASIACCS 2007: 105-116
[c22]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu: Automaton segmentation: a new approach to preserve privacy in xml information brokering. ACM Conference on Computer and Communications Security 2007: 508-518
[c21]Bo Luo, Dongwon Lee, Peng Liu: Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71
[c20]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis: PWC: A proactive worm containment solution for enterprise networks. SecureComm 2007: 433-442
[c19]Jingqiang Lin, Jiwu Jing, Peng Liu: Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241
[p1]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94- 2006
[j6]Peng Liu, Alex Hai Wang, Lunquan Li: Real-time data attack isolation for commercial database applications. J. Network and Computer Applications 29(4): 294-320 (2006)
[c18]Kun Bai, Peng Liu: Towards Database Firewall: Mining the Damage Spreading Patterns. ACSAC 2006: 449-462
[c17]Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77
[c16]Alex Hai Wang, Peng Liu: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. ESORICS 2006: 207-224
[c15]Chi-Chun Pan, Prasenjit Mitra, Peng Liu: Semantic access control for information interoperation. SACMAT 2006: 237-246
[c14]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu: In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259- 2005
[c13]
[c12]Qijun Gu, Peng Liu, Sencun Zhu, Chao-Hsien Chu: Defending against packet injection attacks unreliable ad hoc networks. GLOBECOM 2005: 5
[c11]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501
[c10]- 2004
[j5]Peng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang: The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004)
[c9]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552
[c8]Alex Hai Wang, Peng Liu, Lunqun Li: Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. ISC 2004: 146-157
[c7]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147- 2003
[c6]Dongwon Lee, Wang-Chien Lee, Peng Liu: Supporting XML Security Models Using Relational Databases: A Vision. Xsym 2003: 267-281- 2002
[j4]Paul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)- 2001
[j3]Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
[c5]Peng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205- 2000
[j2]Peng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
[j1]Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): 243-279 (2000)
[c4]Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
1990 – 1999
- 1999
[c3]Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18
[c2]Peng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423- 1998
[c1]Sushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-16 21:29 CEST by the dblp team



