


Остановите войну!
for scientists:


default search action
Peng Liu 0005
Person information

- affiliation: Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- affiliation (former): University of Maryland, Department of Information Systems, Baltimore County, Baltimore, MD, USA
- affiliation (PhD 1999): George Mason University, Fairfax, VA, USA
Other persons with the same name
- Peng Liu — disambiguation page
- Peng Liu 0001 — Microsoft Research Asia, Beijing, China
- Peng Liu 0002 — FZI Forschungszentrum Informatik an der Universität Karlsruhe, Germany
- Peng Liu 0003
— Southern University of Science and Technology, Shenzhen, China (and 2 more)
- Peng Liu 0004
— Shenyang University of Technology, School of Management, China
- Peng Liu 0006 — PLA University of Science and Technology, Institute of Command Automation, Nanjing, China
- Peng Liu 0007
— Iowa State University, Department of Statistics, Ames, IA, USA (and 1 more)
- Peng Liu 0008
— Harbin Institute of Technology, Pattern Recognition and Intelligent System Research Center, China
- Peng Liu 0009 — Beijing Institute of Technology, School of Mechanical Engineering, China
- Peng Liu 0010
— Purdue University, USA (and 3 more)
- Peng Liu 0011 — Trinity College Dublin, Ireland
- Peng Liu 0012
— California State University, Fullerton, CA, USA (and 1 more)
- Peng Liu 0013 — China University of Mining and Technology, CUMT-IoT Perception Mine Research Center, Xuzhou, China
- Peng Liu 0014 — Lanzhou University, School of Management, Lanzhou, China
- Peng Liu 0015 — Queen's University, Department of Electr. & Comput. Engineering, Kingston, ON, Canada
- Peng Liu 0016
— Zhejiang University, Department of Information Science and Electronic Engineering, Hangzhou, China
- Peng Liu 0017 — Xidian University, Key Laboratory of Ministry of Education for Electronic Equipment Structure Design, Xian, China
- Peng Liu 0018
— NXP Semiconductors Austria GmbH, Gratkorn, Austria (and 2 more)
- Peng Liu 0019
— Fudan University, Key Laboratory of Wave Scattering and Remote Sensing Information, Shanghai, China (and 1 more)
- Peng Liu 0020
— PLA University of Science and Technology, Department of Network Engineering, Nanjing, China
- Peng Liu 0021
— Huazhong University of Science and Technology, School of Electric and Electronic Engineering, Wuhan, China
- Peng Liu 0022
— Southeast University, School of Automation, Nanjing, China
- Peng Liu 0023
— Jilin University, School of Computer Science and Technology, Changchun, China
- Peng Liu 0024
— Chinese Academic of Science, Institute of Remote Sensing and Digital Earth, Beijing, China
- Peng Liu 0025
— Norwegian University of Science and Technology, Department of Computer Science, Trondheim, Norway
- Peng Liu 0026
— Ohio State University, Department of Electrical and Computer Engineering, Columbus, OH, USA
- Peng Liu 0027
— Hangzhou Dianzi University, School of Computer Science and Technology, National Demonstration Center for Experimental Computer Education, China (and 1 more)
- Peng Liu 0028
— Beijing University of Technology, College of Metropolitan Transportation, China
- Peng Liu 0029
— Jiangnan Institute of Computing Technology, Wuxi, China
- Peng Liu 0030
— Tianjin University, Department of Industrial Engineering, College of Management and Economics, China (and 1 more)
- Peng Liu 0031
— Pennsylvania State University, Department of Electrical Engineering, University Park, PA, USA
- Peng Liu 0032
— Beihang University, School of Electronic and Information Engineering, Beijing, China
- Peng Liu 0033
— Chinese Academy of Science, Institute of Acoustics, Key Laboratory of Information Technology for Autonomous Underwater Vehicles, Beijing, China
- Peng Liu 0034 — University of Newcastle Upon Tyne, UK
- Peng Liu 0035
— Harbin Engineering University, College of Computer Science and Technology, Harbin, China
- Peng Liu 0036
— Ocean University of China, Computing Center, Qingdao, China
- Peng Liu 0037
— University of Florida, J. Crayton Pruitt Family Department of Biomedical Engineering, Gainesvill, FL, USA
- Peng Liu 0038
— Zhengzhou University of Light Industry, College of Electronic and Information Engineering, Zhengzhou, China (and 1 more)
- Peng Liu 0039 — State University of New York at Binghamton, Department of Computer Science, Binghamton, NY, USA
- Peng Liu 0040 — North China Electric Power University, School of Electrical and Electronic Engineering, Beijing, China
- Peng Liu 0041 — University of Wisconsin-Madison, Department of Computer Sciences, Madison, WI, USA
- Peng Liu 0042
— China University of Petroleum, College of Mechanical and Electronic Engineering, Qingdao, China
- Peng Liu 0043
— University of Lausanne, Department of Actuarial Science, Lausanne, Switzerland
- Peng Liu 0044
— Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China (and 1 more)
- Peng Liu 0045
— Guangdong University of Technology, School of Computers, Guangzhou, China (and 1 more)
- Peng Liu 0046
— Chinese Academy of Sciences, Institute of Acoustics, Haikou Laboratory, Haikou, China
- Peng Liu 0047
— Huawei Technologies, Wireless Technology Lab, Shenzhen, China (and 1 more)
- Peng Liu 0048
— University of Kent, UK
- Peng Liu 0049 — University of Electronic Science and Technology of China, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j103]Lingyun Situ
, Chi Zhang
, Le Guan
, Zhiqiang Zuo
, Linzhang Wang
, Xuandong Li, Peng Liu
, Jin Shi:
Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware. IEEE Internet Things J. 10(23): 20718-20734 (2023) - [j102]Muskan Sharma Kuinkel
, Chengyi Zhang
, Peng Liu, Sevilay Demirkesen, Khaled Ksaibati:
Suitability Study of Using UAVs to Estimate Landfilled Fly Ash Stockpile. Sensors 23(3): 1242 (2023) - [j101]Lan Zhang
, Peng Liu, Yoon-Ho Choi
, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - [c238]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - 2022
- [j100]SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples. IEEE Access 10: 33602-33615 (2022) - [j99]Huanran Wang
, Hui He
, Weizhe Zhang
, Wenmao Liu, Peng Liu, Amir Javadpour
:
Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 102: 108212 (2022) - [j98]Xixun He
, Yiyu Yang
, Wei Zhou
, Wenjie Wang, Peng Liu, Yuqing Zhang
:
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet Things J. 9(3): 2083-2093 (2022) - [j97]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [j96]Yanghua Zhang, Jice Wang, Hexiang Huang
, Yuqing Zhang
, Peng Liu
:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. IEEE Trans. Big Data 8(6): 1511-1523 (2022) - [j95]Juan Wang
, Shirong Hao
, Hongxin Hu
, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu
, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [j94]Donghai Tian
, Qiang Zeng, Dinghao Wu
, Peng Liu
, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j93]Shijie Jia
, Qionglu Zhang
, Luning Xia, Jiwu Jing
, Peng Liu
:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [j92]Junwei Zhou
, Yijia Qian, Qingtian Zou, Peng Liu
, Jianwen Xiang
:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Trans. Inf. Forensics Secur. 17: 3051-3061 (2022) - [c237]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis. ASPLOS 2022: 726-739 - [c236]Shuai Li
, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c235]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CCS 2022: 3269-3283 - [c234]Gaurav Goyal, Peng Liu, Shamik Sural
:
Securing Smart Home IoT Systems with Attribute-Based Access Control. SAT-CPS@CODASPY 2022: 37-46 - [c233]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - [c232]Devansh Rajgarhia, Peng Liu, Shamik Sural
:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 113-118 - [c231]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c230]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [i29]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis. CoRR abs/2206.05821 (2022) - [i28]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CoRR abs/2208.07833 (2022) - 2021
- [j91]Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Cybersecur. 4(1): 33 (2021) - [j90]Wei Zhou
, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang
, Le Guan
, Tao Liu
, Yan Jia, Yaowen Zheng, Yuqing Zhang
, Limin Sun, Yazhe Wang, Peng Liu
:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j89]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [j88]Lingyun Situ, Zhiqiang Zuo, Le Guan, Linzhang Wang, Xuandong Li, Jin Shi, Peng Liu:
Vulnerable Region-Aware Greybox Fuzzing. J. Comput. Sci. Technol. 36(5): 1212-1228 (2021) - [j87]Dongdong Huo, Chen Cao, Peng Liu
, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j86]Heqing Huang
, Cong Zheng, Junyuan Zeng
, Wu Zhou, Sencun Zhu, Peng Liu
, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j85]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j84]Zhisheng Hu
, Ping Chen
, Minghui Zhu
, Peng Liu
:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. IEEE Trans. Inf. Forensics Secur. 16: 4691-4704 (2021) - [j83]SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. IEEE Trans. Netw. Sci. Eng. 8(2): 908-920 (2021) - [j82]Dongliang Mu
, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu
:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c229]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu
, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860 - [c228]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c227]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c226]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - [c225]Wei Song
, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. SP 2021: 955-969 - [c224]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. USENIX Security Symposium 2021: 2007-2024 - [i27]Haizhou Wang, Peng Liu:
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection. CoRR abs/2105.02996 (2021) - [i26]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). CoRR abs/2107.07759 (2021) - [i25]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - [i24]Wei Song, Jiameng Ying, Sihao Shen, Boya Li, Hao Ma, Peng Liu:
A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions. CoRR abs/2111.14072 (2021) - 2020
- [j81]DongHyun Ko
, SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu, Yoon-Ho Choi
:
Structural Image De-Identification for Privacy-Preserving Deep Learning. IEEE Access 8: 119848-119862 (2020) - [j80]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs. Autom. 111 (2020) - [j79]Qingtian Zou, Xiaoyan Sun
, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [j78]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou
, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j77]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020) - [j76]Fu Chen
, Peng Liu, Jianming Zhu, Sheng Gao
, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. Secur. Commun. Networks 2020: 8884924:1-8884924:14 (2020) - [j75]Zhisheng Hu
, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. ACM Trans. Priv. Secur. 24(1): 6:1-6:25 (2020) - [j74]Lannan Luo
, Qiang Zeng, Chen Cao, Kai Chen
, Jian Liu
, Limin Liu, Neng Gao, Min Yang
, Xinyu Xing, Peng Liu
:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [j73]Weizhe Zhang
, Huanran Wang
, Hui He, Peng Liu
:
DAMBA: Detecting Android Malware by ORGB Analysis. IEEE Trans. Reliab. 69(1): 55-69 (2020) - [c223]Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. ACSAC 2020: 746-759 - [c222]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
On Data-driven Attack-resilient Gaussian Process Regression for Dynamic Systems. ACC 2020: 2981-2986 - [c221]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c220]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c219]Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, Shengwu Xiong:
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern. ICPR 2020: 4221-4228 - [c218]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208 - [c217]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [c216]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [p16]Chen Zhong, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88 - [e11]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i23]Eunjung Yoon, Peng Liu:
Practical Verification of MapReduce Computation Integrity via Partial Re-execution. CoRR abs/2002.09560 (2020) - [i22]Wei Song
, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. CoRR abs/2008.01957 (2020) - [i21]Lan Zhang, Peng Liu, Yoon-Ho Choi:
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. CoRR abs/2009.05602 (2020) - [i20]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020)
2010 – 2019
- 2019
- [j72]Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu:
On convergence rates of game theoretic reinforcement learning algorithms. Autom. 104: 90-101 (2019) - [j71]Jin-Myeong Shin
, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Gener. Comput. Syst. 100: 811-825 (2019) - [j70]Wei Zhou
, Yan Jia, Anni Peng, Yuqing Zhang
, Peng Liu
:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [j69]Chen Zhong
, John Yen, Peng Liu
, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [j68]Le Guan
, Chen Cao, Peng Liu
, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c215]Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. CCS 2019: 2713-2714 - [c214]SeokHwan Choi, Jin-Myeong Shin
, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. CNS 2019: 1-6 - [c213]Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. CODASPY 2019: 327-338 - [c212]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c211]Lingyun Situ, Linzhang Wang, Xuandong Li, Le Guan, Wenhui Zhang, Peng Liu:
Energy distribution matters in greybox fuzzing. ICSE (Companion Volume) 2019: 270-271 - [c210]Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. RAID 2019: 427-442 - [c209]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c208]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - [c207]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo
:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [p15]George Cybenko, Michael P. Wellman
, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p14]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 54-93 - [p13]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p12]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese
, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e10]Peng Liu, Yuqing Zhang:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, IoT S&P@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6838-4 [contents] - [e9]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - [i19]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i18]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems. CoRR abs/1908.03638 (2019) - [i17]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - [i16]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j67]Chen Zhong
, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018) - [j66]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j65]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Cybersecur. 1(1): 3 (2018) - [j64]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang:
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. Cybersecur. 1(1): 5 (2018) - [j63]Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. IEEE Secur. Priv. 16(6): 71-75 (2018) - [j62]Xiaoyan Sun, Jun Dai
, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Trans. Security Safety 4(13): e3 (2018) - [j61]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. EAI Endorsed Trans. Security Safety 4(14): e4 (2018) - [j60]Donghai Tian
, Xi Xiong, Changzhen Hu, Peng Liu:
A policy-centric approach to protecting OS kernel from vulnerable LKMs. Softw. Pract. Exp. 48(6): 1269-1284 (2018) - [j59]Xiaoyan Sun
, Jun Dai
, Peng Liu
, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. IEEE Trans. Inf. Forensics Secur. 13(10): 2506-2521 (2018) - [j58]Kai Chen
, Yingjun Zhang, Peng Liu
:
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. Mob. Comput. 17(8): 1879-1893 (2018) - [c206]Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. ACSAC 2018: 490-504 - [c205]Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu:
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine. APSEC 2018: 219-228 - [c204]Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. From Database to Cyber Security 2018: 227-243 - [c203]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c202]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. DSN 2018: 574-585 - [c201]