Peng Liu Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
140Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMoti Yung, Peng Liu, Dongdai Lin: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Springer 2009
139Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290
138Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158
137Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXi Xiong, Xiaoqi Jia, Peng Liu: SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. ACSAC 2009: 484-493
136Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Peng Liu: A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. EDBT 2009: 720-731
135no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuojun Dai, Peng Liu, Y. Fun Hu, Geyong Min, Zhigang Gao: Transformable Vertexes Information based Algorithm for Online Task Placement in Reconfigurable System. ERSA 2009: 279-282
134Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Chaofang Zhao: Oil Spill Identification in Marine SAR Images Based on Texture Feature and Fuzzy Logic System. FSKD (3) 2009: 433-437
133Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Il-Min Kim: Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI. GLOBECOM 2009: 1-6
132Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuidong Li, Jie Li, Peng Liu, Jien Kato: A Novel Hybrid Trust Management Framework for MANETs. ICDCS Workshops 2009: 251-256
131Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYajin Liu, Jiang Guo, Peng Liu, Lin Zhou, Jin Jiang: Virtual Reality Based Nuclear Steam Generator Ageing and Life Management Systems. ISNN (3) 2009: 1230-1239
130Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWanyu Zang, Qijun Gu, Meng Yu, Peng Liu: An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253
129Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhigang Gao, Guojun Dai, Peng Liu, Peifeng Zhang: Energy-Efficient Architecture for Embedded Software with Hard Real-Time Requirements in Partial Reconfigurable Systems. ScalCom-EmbeddedCom 2009: 387-392
128Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jingyu Zhang, Xueli Yu: Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge Acquisition. WISM 2009: 261-270
127Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Sec. Comput. 6(3): 188-201 (2009)
126Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBaihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, Xuhua Ding: Tuning On-Air Signatures for Balancing Performance and Confidentiality. IEEE Trans. Knowl. Data Eng. 21(12): 1783-1797 (2009)
125Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Frank K. Soong: Graph-Based Partial Hypothesis Fusion for Pen-Aided Speech Input. IEEE Transactions on Audio, Speech & Language Processing 17(3): 478-485 (2009)
124Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications 32(1): 158-183 (2009)
123Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKameswari Kotapati, Peng Liu, Thomas F. La Porta: Evaluating MAPSec by marking attack graphs. Wireless Networks 15(8): 1042-1058 (2009)
2008
122Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRobert J. Cole, Peng Liu: Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. ACSAC 2008: 269-278
121Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298
120Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia: A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318
119Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Peng Liu: A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. CIKM 2008: 1403-1404
118Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Lixin Tang: Two-Agent Scheduling with Linear Deteriorating Jobs on a Single Machine. COCOON 2008: 642-650
117Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu: Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112
116Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Meng Yu, Peng Liu: TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176
115Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiuyun Li, Jie Yang, Qing Wang, Jinjin Fan, Peng Liu: Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection. FSKD (1) 2008: 401-405
114Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiaomin Liu, Li Li, Yaxuan Li, Peng Liu: Intelligent Circuit Breaker Forecasting and Prewarning System Research. FSKD (5) 2008: 631-634
113Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Peng Liu: A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. HASE 2008: 373-382
112Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Lei Ma, Frank K. Soong: Prefix tree based auto-completion for convenient bi-modal chinese character input. ICASSP 2008: 4465-4468
111Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYining Chen, Peng Liu, Jia-Li You, Frank K. Soong: Discriminative training for improving letter-to-sound conversion performance. ICASSP 2008: 4649-4652
110Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Guojun Dai: Computer Supported Collaborative Learning Framework for the Handicapped in Ubiquitous Computing Environment. ICNSC 2008: 1680-1682
109Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYongqiang Wang, Peng Liu, Qiang Huo: An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition. ICPR 2008: 1-4
108Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Lei Ma, Frank K. Soong: Radical based fine trajectory HMMs of online handwritten characters. ICPR 2008: 1-4
107Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJianwen Feng, Guojun Dai, Peng Liu, Xingfa Shen: Research on Experimental Platform and Methods for the Course "Interface and Communication". ICYCS 2008: 2598-2603
106Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
105Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYang Zhang, Peng Liu, Deuk Hyoun Heo: A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping. ISCAS 2008: 1000-1003
104Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Fang Liu, Zhenming Lei: Model of Network Traffic Based on Network Applications and Network Users. ISCSCT (2) 2008: 171-174
103Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: Secure and Privacy-Preserving Information Brokering. Inscrypt 2008: 22
102Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFuxing Zhang, Rong Zhu, Peng Liu, Wei Xiong, Xudong Liu, Zhaoying Zhou: A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices. RAM 2008: 252-257
101Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu: Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38
100Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKameswari Kotapati, Peng Liu, Thomas F. La Porta: EndSec: An end-to-end message security protocol for mobile telecommunication networks. WOWMOM 2008: 1-7
99Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140
98Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, J. T. Gene Hwang: Gene expression: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 24(1): 149 (2008)
2007
97Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu: Automaton segmentation: a new approach to preserve privacy in xml information brokering. ACM Conference on Computer and Communications Security 2007: 508-518
96Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Wanyu Zang, Peng Liu: Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106
95Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPadmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee: Incremental adaptation of XPath access control views. ASIACCS 2007: 105-116
94Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYong-Jie Ni, Chan-Hyun Youn, Byoung-Jin Kim, Youngjoo Han, Peng Liu: A PQRM-based PACS System for Advanced Medical Services under Grid Environment. BIBE 2007: 1225-1229
93Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Tingting Fu, Ming Cai, Huaidong Shi: An Improved Cooperative Model for Web Service Based Workflow Management. CSCWD 2007: 818-822
92Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Luo, Dongwon Lee, Peng Liu: Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71
91Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYujuan Sun, Yilei Wang, Tao Li, Peng Liu: A New BP Neural Network Model Based on the Random Fuzzy Theory. FSKD (1) 2007: 42-45
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFang Huang, Dingsheng Liu, Peng Liu, Shaogang Wang, Yi Zeng, Guoqing Li, Wenyang Yu, Jian Wang, Lingjun Zhao, Lv Pang: Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. GCC 2007: 642-649
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Guojun Dai, Tingting Fu, Hong Zeng, Xiang Zhang: A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment. ICA3PP 2007: 49-59
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Yu-ping Ma, Jianshe Dong: Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. IFSA (2) 2007: 495-503
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jianshe Dong, Wei Zhao: A Statistical Spam Filtering Scheme Based on Grid Platform. IFSA (2) 2007: 527-534
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Dingsheng Liu, Fang Huang: MTF Measurement Based on Interactive Live-Wire Edge Extraction. International Conference on Computational Science (2) 2007: 523-530
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHuaidong Shi, Ming Cai, Jinxiang Dong, Peng Liu: A Rich Servants Service Model for Pervasive Computing. International Conference on Computational Science (2) 2007: 896-903
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Ming Cai, Tingting Fu, Jinxiang Dong: An EDF Interrupt Handling Scheme for Real-Time Kernel: Design and Task Simulation. International Conference on Computational Science (4) 2007: 969-972
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTingting Fu, Yigang Wang, Peng Liu, Yehua Du: Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. SNPD (1) 2007: 27-32
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuo Zhong, Shishi Huang, Peng Liu, Yi Yu: A Design for an Online RSS Reader Based On AJAX. SNPD (1) 2007: 794-798
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Guojun Dai, Tingting Fu: A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. SNPD (2) 2007: 412-416
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong: Research on RTOS-Integrated TMR for Fault Tolerant Systems. SNPD (3) 2007: 750-755
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJingqiang Lin, Jiwu Jing, Peng Liu: Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: An Objective Trust Management Framework for Mobile Ad Hoc Networks. VTC Spring 2007: 56-60
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQijun Gu, Peng Liu, Chao-Hsien Chu: Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007)
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiuwen Zheng, Hung-Chung Huang, Wenyuan Li, Peng Liu, Quan-Zhen Li, Ying Liu: Modeling nonlinearity in dilution design microarray data. Bioinformatics 23(11): 1339-1347 (2007)
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, J. T. Gene Hwang: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 23(6): 739-746 (2007)
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007)
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120. Inf. Process. Manage. 43(1): 296 (2007)
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKameswari Kotapati, Peng Liu, Thomas F. La Porta: Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Telecommunication Systems 35(3-4): 99-122 (2007)
2006
69no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErnesto Damiani, Peng Liu: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings Springer 2006
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Peng Liu: Towards Database Firewall: Mining the Damage Spreading Patterns. ACSAC 2006: 449-462
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Naijun Wu, Jiaxian Zhu, Junjie Yin, Wei Zhang: A Unified Strategy of Feature Selection. ADMA 2006: 457-464
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPrasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHai Wang, Peng Liu: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. ESORICS 2006: 207-224
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Frank K. Soong: Word graph based speech rcognition error correction by handwriting input. ICMI 2006: 339-346
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jian-Lai Zhou, Frank K. Soong: Non-uniform Kernel Allocation Based Parsimonious HMM. ISCSLP 2006: 294-302
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun Du, Peng Liu, Frank K. Soong, Jian-Lai Zhou, Ren-Hua Wang: Noisy Speech Recognition Performance of Discriminative HMMs. ISCSLP 2006: 358-369
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuefeng Zhang, Peng Liu, Jinjin Fan: The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection. ISDA (1) 2006: 377-384
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Lei Lei: Missing Data Treatment Methods and NBI Model. ISDA (1) 2006: 633-638
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJianshe Dong, Haixia Cao, Peng Liu, Li Ren: Bayesian Chinese Spam Filter Based on Crossed N-gram. ISDA (3) 2006: 103-108
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChi-Chun Pan, Prasenjit Mitra, Peng Liu: Semantic access control for information interoperation. SACMAT 2006: 237-246
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKameswari Kotapati, Peng Liu, Thomas F. La Porta: CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. SEC 2006: 158-170
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu: In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHui Zhu, X. L. Tang, Peng Liu: An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition. IJDAR 8(1): 27-34 (2006)
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Hai Wang, Lunquan Li: Real-time data attack isolation for commercial database applications. J. Network and Computer Applications 29(4): 294-320 (2006)
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Yan Zhang, Zhigang Mao: A Restoration Algorithm for Images Contaminated by Impulse Noise. Journal of Computer Research and Development 43(11): 1939-1946 (2006)
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: On-demand public-key management for mobile ad hoc networks. Wireless Communications and Mobile Computing 6: 295-306 (2006)
2005
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Wanyu Zang, Peng Liu: Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Elia El-Darzi, Lei Lei, Christos Vasilakis, Panagiotis Chountas, Wei Huang: An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset. ADMA 2005: 583-590
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQingzhao Tan, Wang-Chien Lee, Baihua Zheng, Peng Liu, Dik Lun Lee: Balancing performance and confidentiality in air index. CIKM 2005: 800-807
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Lei Lei, Naijun Wu: A Quantitative Study of the Effect of Missing Data in Classifiers. CIT 2005: 28-33
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYan Sun, Peng Liu, Parviz Kermani, Thomas F. La Porta: An architecture and key management approach for maintaining privacy in location based group services. CollaborateCom 2005
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Bai, Hai Wang, Peng Liu: Towards Database Firewalls. DBSec 2005: 178-192
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jiaxian Zhu, Lanjuan Liu, Yanhong Li, Xuefeng Zhang: Application of Feature Selection for Unsupervised Learning in Prosecutors' Office. FSKD (2) 2005: 35-38
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiaJu Wu, Gang Liu, Peng Liu, ChuanYu Xi: The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005). GrC 2005: 284-287
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta: A Taxonomy of Cyber Attacks on 3G Networks. ISI 2005: 631-633
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jian-bin Hu, Zhong Chen: A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: Deep Set Operators for XQuery. XIME-P 2005
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Wanyu Zang, Meng Yu: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005)
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Amit Chetal: Trust-based secure information sharing between federal government agencies. JASIST 56(3): 283-298 (2005)
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang: Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security 13(4): 623-658 (2005)
2004
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang: Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHai Wang, Peng Liu, Lunqun Li: Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. ISC 2004: 146-157
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMing Liu, Peng Liu, Donghua Zhou: Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay. ISNN (2) 2004: 91-96
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Zhong Chen: An Access Control Model for Web Services in Business Process. Web Intelligence 2004: 292-298
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang: The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004)
2003
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Wanyu Zang: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Conference on Computer and Communications Security 2003: 179-189
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang: Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-151
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Chen, Zhenqiang Jiao, Jun Xie, Zhihui Du, Peng Liu, Ziyu Zhu: A High Performance Design and Implementation of the Virtual Interface Architecture. APPT 2003: 125-135
25no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJianyong Zhang, Peng Liu: Delivering Services with Integrity Guarantees in Survivable Database Systems. DBSec 2003: 33-46
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: ITDB: An Attack Self-Healing Database System Prototype. DISCEX (2) 2003: 131-133
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. DISCEX (2) 2003: 284-289
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Yao Shi, Sanli Li: Computing Pool: A Simplified and Practical Computational Grid Model. GCC (1) 2003: 661-668
21no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeng Yu, Peng Liu, Wanyu Zang: Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongwon Lee, Wang-Chien Lee, Peng Liu: Supporting XML Security Models Using Relational Databases: A Vision. Xsym 2003: 267-281
2002
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: Architectures for Intrusion Tolerant Database Systems. ACSAC 2002: 311-320
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongxiao Li, Qingdong Yao, Peng Liu, Li Zhou: A bus arbitration scheme for HDTV decoder SoC. APCCAS (2) 2002: 79-83
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Ying Wang: Multiphase Damage Confinement System for Databases. DBSec 2002: 75-87
16no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Qingdong Yao, Weijian Yang: Hardware/software codesign for HDTV source decoder on system level. VCIP 2002: 679-686
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)
2001
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu: DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. ACSAC 2001: 219-229
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Zhihui Du: Cluster Trend: DataSpeaking. CLUSTER 2001: 168-171
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPramote Luenam, Peng Liu: ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. DBSec 2001: 239-252
10no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Xu Hao: Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. DBSec 2001: 75-89
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
2000
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDouglas M. Blough, Peng Liu: FIMD-MPI: A Tool for Injecting Faults into MPI Applications. IPDPS 2000: 241-
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
5no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): (2000)
1999
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423
1998
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
1989
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda: Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. DASFAA 1989: 266-273

Coauthor Index

1Paul Ammann [3] [6] [15] [73]
2Vijayalakshmi Atluri (Vijay Atluri) [66]
3Padmapriya Ayyagari [95]
4Kun Bai [46] [68] [113] [116] [119] [136]
5Ruzena Bajcsy [30]
6Terry Benzel [30]
7Matt Bishop [30]
8Douglas M. Blough [7]
9Robert Braden [30]
10Carla E. Brodley [30]
11Ming Cai [80] [84] [85] [93]
12Haixia Cao [59]
13Hsiao-Hwa Chen [52] [78]
14Yining Chen [111]
15Yu Chen [26]
16Zhong Chen [31] [41]
17Amit Chetal [38]
18Panagiotis Chountas [50]
19Chao-Hsien Chu [42] [56] [72] [76] [97] [117] [127]
20Robert J. Cole [122]
21Guojun Dai [81] [89] [107] [110] [129] [135]
22Ernesto Damiani [69]
23Xuhua Ding [126]
24Jianshe Dong [59] [87] [88]
25Jinxiang Dong [80] [84] [85]
26Jun Du [62]
27Yehua Du [83]
28Zhihui Du [13] [26]
29Elia El-Darzi [50]
30Sonia Fahmy [30]
31Jinjin Fan [61] [115]
32Liu Fang [80]
33Jianwen Feng [107]
34Sally Floyd [30]
35Hao Fu [80]
36Tingting Fu [81] [83] [84] [89] [93]
37Zhigang Gao [129] [135]
38Qijun Gu [42] [72] [76] [127] [130]
39Jiang Guo [131]
40Youngjoo Han [94]
41Xu Hao [10]
42W. Hardaker [30]
43Deuk Hyoun Heo [105]
44Jian-bin Hu [41]
45Y. Fun Hu [135]
46Fang Huang [86] [90]
47Hung-Chung Huang [75]
48Shishi Huang [82]
49Wei Huang [50]
50Qiang Huo [109]
51J. T. Gene Hwang [74] [98]
52Supawadee Ingsriswang [29]
53Sushil Jajodia [2] [3] [4] [5] [6] [8] [9] [12] [15] [73] [77]
54Yoon-chan Jhi [99] [121] [138] [139]
55Xiaoqi Jia [101] [120] [137]
56Jin Jiang [131]
57Zhenqiang Jiao [26]
58Jiwu Jing [29] [79] [101] [120]
59Anthony D. Joseph [30]
60Jien Kato [132]
61Kazuhiko Kato [1]
62Parviz Kermani [47]
63George Kesidis [30]
64Latifur Khan [106]
65Byoung-Jin Kim [94]
66Il-Min Kim [133]
67Yasushi Kiyoki [1]
68Kameswari Kotapati [43] [57] [70] [100] [123]
69Takahiro Kurosawa [1]
70Dik Lun Lee [49] [126]
71Dongwon Lee [20] [32] [36] [40] [56] [92] [95] [97] [117]
72Wang-Chien Lee [20] [32] [36] [40] [42] [49] [56] [95] [126] [127]
73Lei Lei [48] [50] [60]
74Zhenming Lei [104]
75Karl N. Levitt [30]
76Dongxiao Li [18]
77Fengjun Li [56] [97] [117]
78Guoqing Li [90]
79Jie Li [52] [73] [78] [132]
80Li Li [114]
81Lunquan Li [29] [54]
82Lunqun Li [34]
83Quan-Zhen Li [75]
84Ruidong Li [52] [78] [132]
85Sanli Li [22]
86Tao Li [91]
87Wenyuan Li [75]
88Xiuyun Li [115]
89Yanhong Li [45]
90Yaxuan Li [114]
91Dongdai Lin [140]
92Jingqiang Lin [79]
93Robert Lindell [30]
94Dingsheng Liu [86] [90]
95Fang Liu [104]
96Gang Liu [44]
97Jiaomin Liu [114]
98Lanjuan Liu [45]
99Ming Liu [33]
100Xudong Liu [102]
101Yajin Liu [131]
102Ying Liu [75]
103Pramote Luenam [11] [29]
104Bo Luo [32] [36] [40] [56] [92] [97] [117]
105Lei Ma [108] [112]
106Yu-ping Ma [88]
107Zhigang Mao [53]
108Mohammad M. Masud [106]
109Takashi Masuda [1]
110Catherine D. McCollum [2] [4] [5]
111David Miller [30]
112Geyong Min [135]
113Prasenjit Mitra [56] [58] [66] [95]
114Russ Mundy [30]
115Cliford Neuman [30]
116Yong-Jie Ni [94]
117Peng Ning [8] [9]
118Ron Ostrenga [30]
119Chi-Chun Pan [58] [66]
120Lv Pang [90]
121Vern Paxson [30]
122Phillip A. Porras [30]
123Thomas F. La Porta (Tom La Porta) [43] [47] [57] [70] [100] [123]
124Li Ren [59]
125Catherine Rosenberg [30]
126Shankar Sastry (Shankar S. Sastry) [30]
127Xingfa Shen [107]
128Huaidong Shi [85] [93]
129Yao Shi [22]
130Frank K. Soong [62] [63] [64] [108] [111] [112] [125]
131Anna Cinzia Squicciarini [117]
132Daniel F. Sterne [30]
133Yan Lindsay Sun (Yan Sun) [43] [47]
134Yujuan Sun [91]
135Qingzhao Tan [49]
136Lixin Tang [118]
137X. L. Tang [55]
138Bhavani M. Thuraisingham [106]
139J. Doug Tygar (J. D. Tygar) [30]
140Christos Vasilakis [50]
141Hai Wang [34] [46] [54] [65]
142Jian Wang [90]
143Qing Wang [115]
144Ren-Hua Wang [62]
145Shaogang Wang [90]
146Xinran Wang [99] [106] [121] [138] [139]
147Yigang Wang [83]
148Yilei Wang [91]
149Ying Wang [17] [29]
150Yongqiang Wang [109]
151Yuewu Wang [120]
152JiaJu Wu [44]
153Naijun Wu [48] [67]
154Shyhtsun Felix Wu [30]
155ChuanYu Xi [44]
156Jun Xie [26]
157Wei Xiong [102]
158Xi Xiong [137]
159Jie Yang [115]
160Weijian Yang [16]
161Qingdong Yao [16] [18]
162Junjie Yin [67]
163Jia-Li You [111]
164Chan-Hyun Youn [94]
165Meng Yu [21] [27] [35] [37] [39] [51] [77] [96] [116] [124] [130]
166Wenyang Yu [90]
167Xueli Yu [128]
168Yi Yu [82]
169Moti Yung (Mordechai M. Yung) [140]
170Wanyu Zang [21] [27] [28] [35] [37] [39] [51] [77] [96] [124] [130]
171Hong Zeng [89]
172Yi Zeng [90]
173Fuxing Zhang [102]
174Jianyong Zhang [25]
175Jingyu Zhang [128]
176Peifeng Zhang [129]
177Shengzhi Zhang [101]
178Wei Zhang [67]
179Xiang Zhang [89]
180Xuefeng Zhang [45] [61]
181Yan Zhang [53]
182Yang Zhang [105]
183Chaofang Zhao [134]
184Lingjun Zhao [90]
185Wei Zhao [87]
186Baihua Zheng [49] [126]
187Xiuwen Zheng [75]
188Luo Zhong [82]
189Donghua Zhou [33]
190Jian-Lai Zhou [62] [63]
191Li Zhou [18]
192Lin Zhou [131]
193Zhaoying Zhou [102]
194Hui Zhu [55]
195Jiaxian Zhu [45] [67]
196Rong Zhu [102]
197Sencun Zhu [72] [99] [106] [121] [138] [139]
198Ziyu Zhu [26]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)