default search action
Peng Ning
Person information
- affiliation: Samsung Research American, Mountain View, CA, USA
- affiliation: North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j50]Jie Yang, Hongchang Zhang, Peng Ning:
Path Planning and Trajectory Optimization Based on Improved APF and Multi-Target. IEEE Access 11: 139121-139132 (2023) - [j49]Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - 2022
- [j48]Guangda Qiao, Peng Ning, Xiao Xia, Yang Yu, Xiaohui Lu, Tinghai Cheng:
Achieving Smooth Motion for Piezoelectric Stick-Slip Actuator With the Inertial Block Structure. IEEE Trans. Ind. Electron. 69(4): 3948-3958 (2022)
2010 – 2019
- 2019
- [c110]Qian Feng, Rundong Zhou, Yanhui Zhao, Jia Ma, Yifei Wang, Na Yu, Xudong Jin, Jian Wang, Ahmed M. Azab, Peng Ning:
Learning Binary Representation for Automatic Patch Detection. CCNC 2019: 1-6 - 2017
- [j47]Sangwon Hyun, Kun Sun, Peng Ning:
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes. Comput. Commun. 104: 191-203 (2017) - [j46]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. IEEE J. Sel. Areas Commun. 35(3): 615-627 (2017) - [c109]Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning:
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. AsiaCCS 2017: 167-178 - [c108]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c107]Richeng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, Peng Ning:
Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach. PAC 2017: 72-83 - [p7]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - 2016
- [j45]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
Zero-determinant Strategies for Multi-player Multi-action Iterated Games. IEEE Signal Process. Lett. 23(3): 311-315 (2016) - [j44]Song Fang, Yao Liu, Peng Ning:
Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 13(3): 394-408 (2016) - [j43]Song Fang, Yao Liu, Peng Ning:
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature. IEEE Trans. Inf. Forensics Secur. 11(7): 1515-1527 (2016) - [j42]Xiaofan He, Huaiyu Dai, Peng Ning:
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. IEEE Trans. Signal Process. 64(13): 3429-3443 (2016) - [j41]Qian Wang, Kui Ren, Peng Ning, Shengshan Hu:
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(10): 8331-8344 (2016) - [j40]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning, Rudra Dutta:
Toward Proper Guard Zones for Link Signature. IEEE Trans. Wirel. Commun. 15(3): 2104-2117 (2016) - [c106]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. INFOCOM 2016: 1-9 - [c105]Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, Peng Ning:
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. NDSS 2016 - 2015
- [c104]Jason Gionta, William Enck, Peng Ning:
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. CODASPY 2015: 325-336 - [c103]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. GLOBECOM 2015: 1-6 - [c102]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A stochastic multi-channel spectrum access game with incomplete information. ICC 2015: 4799-4804 - [c101]Xiaofan He, Huaiyu Dai, Peng Ning:
Improving learning and adaptation in security games by exploiting information asymmetry. INFOCOM 2015: 1787-1795 - [c100]Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning:
No time to demodulate - fast physical layer verification of friendly jamming. MILCOM 2015: 653-658 - [c99]Kaiqi Xiong, Peng Ning:
Cost-efficient and attack-resilient approaches for state estimation in power grids. SAC 2015: 2192-2197 - [c98]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2014
- [j39]Kui Ren, Pierangela Samarati, Marco Gruteser, Peng Ning, Yunhao Liu:
Guest Editorial Special Issue on Security for IoT: The State of the Art. IEEE Internet Things J. 1(5): 369-371 (2014) - [j38]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - [j37]Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE Trans. Wirel. Commun. 13(8): 4374-4388 (2014) - [c97]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
SEER: practical memory virus scanning as a service. ACSAC 2014: 186-195 - [c96]Peng Ning:
Samsung KNOX and Enterprise Mobile Security. SPSM@CCS 2014: 1 - [c95]Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen:
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. CCS 2014: 90-102 - [c94]Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning:
The security of link signature: A view from channel models. CNS 2014: 103-108 - [c93]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:
MCR Decoding: A MIMO approach for defending against wireless jamming attacks. CNS 2014: 133-138 - [c92]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Channel correlation modeling for link signature security assessment. HotSoS 2014: 25 - [c91]Xianqing Yu, Peng Ning, Mladen A. Vouk:
Securing Hadoop in cloud. HotSoS 2014: 26 - [c90]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
DACSA: A Decoupled Architecture for Cloud Security Analysis. CSET 2014 - 2013
- [j36]Xiaofan He, Huaiyu Dai, Peng Ning:
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing. IEEE J. Sel. Areas Commun. 31(11): 2196-2208 (2013) - [j35]Qi Dong, Donggang Liu, Peng Ning:
Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Trans. Embed. Comput. Syst. 12(3): 73:1-73:26 (2013) - [j34]Xiaofan He, Huaiyu Dai, Peng Ning:
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check. IEEE Trans. Wirel. Commun. 12(5): 2512-2523 (2013) - [c89]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c88]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - [c87]Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic adaptive anti-jamming via controlled mobility. CNS 2013: 1-9 - [c86]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Is link signature dependable for wireless security? INFOCOM 2013: 200-204 - [c85]Peng Ning:
Program Chair's Message. NDSS 2013 - [c84]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai:
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. IEEE Symposium on Security and Privacy 2013: 174-188 - [c83]Ruowen Wang, Peng Ning, Tao Xie, Quan Chen:
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. USENIX Security Symposium 2013: 65-80 - 2012
- [j33]Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning:
MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks. Ad Hoc Networks 10(3): 299-316 (2012) - [j32]Attila Altay Yavuz, Peng Ning:
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. Ad Hoc Networks 10(7): 1204-1220 (2012) - [j31]Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning:
Interval-based flow watermarking for tracing interactive traffic. Comput. Networks 56(5): 1646-1665 (2012) - [j30]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. IEEE Trans. Inf. Forensics Secur. 7(1): 297-309 (2012) - [j29]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j28]Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning:
Containing bogus packet insertion attacks for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 8(3): 20:1-20:30 (2012) - [j27]Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning:
Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. IEEE Trans. Signal Process. 60(10): 5281-5292 (2012) - [j26]Liang Xiao, Huaiyu Dai, Peng Ning:
MAC Design of Uncoordinated FH-Based Collaborative Broadcast. IEEE Wirel. Commun. Lett. 1(3): 261-264 (2012) - [c82]Jason Gionta, Peng Ning, Xiaolan Zhang:
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. ACNS 2012: 381-399 - [c81]Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning:
Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY 2012: 317-326 - [c80]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c79]Yao Liu, Peng Ning:
BitTrickle: Defending against broadband and high-power reactive jamming attacks. INFOCOM 2012: 909-917 - [c78]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515 - [c77]Yao Liu, Peng Ning:
Enhanced wireless channel authentication using time-synched link signature. INFOCOM 2012: 2636-2640 - [c76]Wente Zeng, Mo-Yuen Chow, Peng Ning:
Secure distributed control in unreliable D-NCS. ISIE 2012: 1858-1863 - [c75]Xiaofan He, Huaiyu Dai, Peng Ning:
A Byzantine attack defender: The Conditional Frequency Check. ISIT 2012: 975-979 - [c74]Barry W. Peddycord III, Peng Ning, Sushil Jajodia:
On the Accurate Identification of Network Service Dependencies in Distributed Systems. LISA 2012: 181-194 - 2011
- [j25]Mihui Kim, Peng Ning:
SeCA: A framework for Secure Channel Assignment in wireless mesh networks. Comput. Commun. 34(4): 567-576 (2011) - [j24]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty:
P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE J. Sel. Areas Commun. 29(3): 582-594 (2011) - [j23]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j22]Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing Li, Fang Zheng Peng, Peng Ning, Massoud Amin:
A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid. IEEE Trans. Smart Grid 2(4): 770-781 (2011) - [c73]Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. CCS 2011: 375-388 - [c72]Yao Liu, Peng Ning:
Poster: mimicry attacks against wireless link signature. CCS 2011: 801-804 - [c71]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks. GLOBECOM 2011: 1-6 - [c70]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks. GLOBECOM 2011: 1-6 - [c69]Sangwon Hyun, Peng Ning, An Liu:
Mitigating Wireless Jamming Attacks via Channel Migration. ICDCS Workshops 2011: 313-322 - [c68]Qian Wang, Kui Ren, Peng Ning:
Anti-jamming communication in cognitive radio networks with unknown channel statistics. ICNP 2011: 393-402 - [c67]Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning:
On the Expressiveness of Return-into-libc Attacks. RAID 2011: 121-141 - [r2]Sangwon Hyun, Peng Ning:
Secure Code Dissemination in Wireless Sensor Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1099-1102 - [r1]Kun Sun, Peng Ning:
Secure Time Synchronization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1139-1140 - 2010
- [c66]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang:
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376 - [c65]Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala:
Always up-to-date: scalable offline patching of VM images in a compute cloud. ACSAC 2010: 377-386 - [c64]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c63]Yao Liu, Peng Ning, Huaiyu Dai, An Liu:
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. INFOCOM 2010: 695-703 - [c62]An Liu, Peng Ning, Huaiyu Dai, Yao Liu:
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. MASS 2010: 41-50 - [c61]Yao Liu, Peng Ning, Huaiyu Dai:
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. IEEE Symposium on Security and Privacy 2010: 286-301 - [p6]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p5]Emre Can Sezer, Chongkyung Kil, Peng Ning:
Automated Software Vulnerability Analysis. Cyber Situational Awareness 2010: 201-223
2000 – 2009
- 2009
- [j21]Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning:
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 6(1): 9:1-9:29 (2009) - [c60]Attila Altay Yavuz, Peng Ning:
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228 - [c59]Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang:
HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470 - [c58]Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. CCS 2009: 21-32 - [c57]Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning:
Managing security of virtual machine images in a cloud environment. CCSW 2009: 91-96 - [c56]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c55]Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124 - [c54]An Liu, Peng Ning, Chun Wang:
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250 - [c53]Attila Altay Yavuz, Peng Ning:
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks. MobiQuitous 2009: 1-10 - [c52]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - [e10]Michael Backes, Peng Ning:
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings. Lecture Notes in Computer Science 5789, Springer 2009, ISBN 978-3-642-04443-4 [contents] - 2008
- [j20]Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 12:1-12:37 (2008) - [j19]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [j18]Peng Ning, An Liu, Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Networks 4(1): 1:1-1:35 (2008) - [j17]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key predistribution for wireless sensor networks. ACM Trans. Sens. Networks 4(2): 11:1-11:30 (2008) - [c51]An Liu, Peng Ning:
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256 - [c50]Sangwon Hyun, Peng Ning, An Liu, Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 - [c49]An Liu, Young-Hyun Oh, Peng Ning:
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562 - [c48]Qi Dong, Donggang Liu, Peng Ning:
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12 - [e9]Peng Ning, Paul F. Syverson, Somesh Jha:
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. ACM 2008, ISBN 978-1-59593-810-7 [contents] - 2007
- [b2]Donggang Liu, Peng Ning:
Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209 - [j16]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sens. Networks 3(3): 14 (2007) - [c47]Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 - [c46]Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code. AsiaCCS 2007: 4-12 - [c45]Pan Wang, Peng Ning, Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks. AsiaCCS 2007: 45-56 - [c44]Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. CCS 2007: 562-572 - [c43]Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 - [c42]Ronghua Wang, Wenliang Du, Peng Ning:
Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 - [c41]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty:
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8 - [p4]