other persons with the same name:
2009 | ||
---|---|---|
140 | Moti Yung, Peng Liu, Dongdai Lin: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Springer 2009 | |
139 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290 | |
138 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158 | |
137 | Xi Xiong, Xiaoqi Jia, Peng Liu: SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. ACSAC 2009: 484-493 | |
136 | Kun Bai, Peng Liu: A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. EDBT 2009: 720-731 | |
135 | Guojun Dai, Peng Liu, Y. Fun Hu, Geyong Min, Zhigang Gao: Transformable Vertexes Information based Algorithm for Online Task Placement in Reconfigurable System. ERSA 2009: 279-282 | |
134 | Peng Liu, Chaofang Zhao: Oil Spill Identification in Marine SAR Images Based on Texture Feature and Fuzzy Logic System. FSKD (3) 2009: 433-437 | |
133 | Peng Liu, Il-Min Kim: Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI. GLOBECOM 2009: 1-6 | |
132 | Ruidong Li, Jie Li, Peng Liu, Jien Kato: A Novel Hybrid Trust Management Framework for MANETs. ICDCS Workshops 2009: 251-256 | |
131 | Yajin Liu, Jiang Guo, Peng Liu, Lin Zhou, Jin Jiang: Virtual Reality Based Nuclear Steam Generator Ageing and Life Management Systems. ISNN (3) 2009: 1230-1239 | |
130 | Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu: An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253 | |
129 | Zhigang Gao, Guojun Dai, Peng Liu, Peifeng Zhang: Energy-Efficient Architecture for Embedded Software with Hard Real-Time Requirements in Partial Reconfigurable Systems. ScalCom-EmbeddedCom 2009: 387-392 | |
128 | Peng Liu, Jingyu Zhang, Xueli Yu: Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge Acquisition. WISM 2009: 261-270 | |
127 | Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Sec. Comput. 6(3): 188-201 (2009) | |
126 | Baihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, Xuhua Ding: Tuning On-Air Signatures for Balancing Performance and Confidentiality. IEEE Trans. Knowl. Data Eng. 21(12): 1783-1797 (2009) | |
125 | Peng Liu, Frank K. Soong: Graph-Based Partial Hypothesis Fusion for Pen-Aided Speech Input. IEEE Transactions on Audio, Speech & Language Processing 17(3): 478-485 (2009) | |
124 | Meng Yu, Peng Liu, Wanyu Zang: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications 32(1): 158-183 (2009) | |
123 | Kameswari Kotapati, Peng Liu, Thomas F. La Porta: Evaluating MAPSec by marking attack graphs. Wireless Networks 15(8): 1042-1058 (2009) | |
2008 | ||
122 | Robert J. Cole, Peng Liu: Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. ACSAC 2008: 269-278 | |
121 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 | |
120 | Yuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia: A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318 | |
119 | Kun Bai, Peng Liu: A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. CIKM 2008: 1403-1404 | |
118 | Peng Liu, Lixin Tang: Two-Agent Scheduling with Linear Deteriorating Jobs on a Single Machine. COCOON 2008: 642-650 | |
117 | Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu: Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 | |
116 | Kun Bai, Meng Yu, Peng Liu: TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176 | |
115 | Xiuyun Li, Jie Yang, Qing Wang, Jinjin Fan, Peng Liu: Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection. FSKD (1) 2008: 401-405 | |
114 | Jiaomin Liu, Li Li, Yaxuan Li, Peng Liu: Intelligent Circuit Breaker Forecasting and Prewarning System Research. FSKD (5) 2008: 631-634 | |
113 | Kun Bai, Peng Liu: A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. HASE 2008: 373-382 | |
112 | Peng Liu, Lei Ma, Frank K. Soong: Prefix tree based auto-completion for convenient bi-modal chinese character input. ICASSP 2008: 4465-4468 | |
111 | Yining Chen, Peng Liu, Jia-Li You, Frank K. Soong: Discriminative training for improving letter-to-sound conversion performance. ICASSP 2008: 4649-4652 | |
110 | Peng Liu, Guojun Dai: Computer Supported Collaborative Learning Framework for the Handicapped in Ubiquitous Computing Environment. ICNSC 2008: 1680-1682 | |
109 | Yongqiang Wang, Peng Liu, Qiang Huo: An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition. ICPR 2008: 1-4 | |
108 | Peng Liu, Lei Ma, Frank K. Soong: Radical based fine trajectory HMMs of online handwritten characters. ICPR 2008: 1-4 | |
107 | Jianwen Feng, Guojun Dai, Peng Liu, Xingfa Shen: Research on Experimental Platform and Methods for the Course "Interface and Communication". ICYCS 2008: 2598-2603 | |
106 | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 | |
105 | Yang Zhang, Peng Liu, Deuk Hyoun Heo: A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping. ISCAS 2008: 1000-1003 | |
104 | Peng Liu, Fang Liu, Zhenming Lei: Model of Network Traffic Based on Network Applications and Network Users. ISCSCT (2) 2008: 171-174 | |
103 | Peng Liu: Secure and Privacy-Preserving Information Brokering. Inscrypt 2008: 22 | |
102 | Fuxing Zhang, Rong Zhu, Peng Liu, Wei Xiong, Xudong Liu, Zhaoying Zhou: A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices. RAM 2008: 252-257 | |
101 | Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu: Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38 | |
100 | Kameswari Kotapati, Peng Liu, Thomas F. La Porta: EndSec: An end-to-end message security protocol for mobile telecommunication networks. WOWMOM 2008: 1-7 | |
99 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140 | |
98 | Peng Liu, J. T. Gene Hwang: Gene expression: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 24(1): 149 (2008) | |
2007 | ||
97 | Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu: Automaton segmentation: a new approach to preserve privacy in xml information brokering. ACM Conference on Computer and Communications Security 2007: 508-518 | |
96 | Meng Yu, Wanyu Zang, Peng Liu: Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106 | |
95 | Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee: Incremental adaptation of XPath access control views. ASIACCS 2007: 105-116 | |
94 | Yong-Jie Ni, Chan-Hyun Youn, Byoung-Jin Kim, Youngjoo Han, Peng Liu: A PQRM-based PACS System for Advanced Medical Services under Grid Environment. BIBE 2007: 1225-1229 | |
93 | Peng Liu, Tingting Fu, Ming Cai, Huaidong Shi: An Improved Cooperative Model for Web Service Based Workflow Management. CSCWD 2007: 818-822 | |
92 | Bo Luo, Dongwon Lee, Peng Liu: Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71 | |
91 | Yujuan Sun, Yilei Wang, Tao Li, Peng Liu: A New BP Neural Network Model Based on the Random Fuzzy Theory. FSKD (1) 2007: 42-45 | |
90 | Fang Huang, Dingsheng Liu, Peng Liu, Shaogang Wang, Yi Zeng, Guoqing Li, Wenyang Yu, Jian Wang, Lingjun Zhao, Lv Pang: Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. GCC 2007: 642-649 | |
89 | Peng Liu, Guojun Dai, Tingting Fu, Hong Zeng, Xiang Zhang: A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment. ICA3PP 2007: 49-59 | |
88 | Peng Liu, Yu-ping Ma, Jianshe Dong: Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. IFSA (2) 2007: 495-503 | |
87 | Peng Liu, Jianshe Dong, Wei Zhao: A Statistical Spam Filtering Scheme Based on Grid Platform. IFSA (2) 2007: 527-534 | |
86 | Peng Liu, Dingsheng Liu, Fang Huang: MTF Measurement Based on Interactive Live-Wire Edge Extraction. International Conference on Computational Science (2) 2007: 523-530 | |
85 | Huaidong Shi, Ming Cai, Jinxiang Dong, Peng Liu: A Rich Servants Service Model for Pervasive Computing. International Conference on Computational Science (2) 2007: 896-903 | |
84 | Peng Liu, Ming Cai, Tingting Fu, Jinxiang Dong: An EDF Interrupt Handling Scheme for Real-Time Kernel: Design and Task Simulation. International Conference on Computational Science (4) 2007: 969-972 | |
83 | Tingting Fu, Yigang Wang, Peng Liu, Yehua Du: Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. SNPD (1) 2007: 27-32 | |
82 | Luo Zhong, Shishi Huang, Peng Liu, Yi Yu: A Design for an Online RSS Reader Based On AJAX. SNPD (1) 2007: 794-798 | |
81 | Peng Liu, Guojun Dai, Tingting Fu: A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. SNPD (2) 2007: 412-416 | |
80 | Hao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong: Research on RTOS-Integrated TMR for Fault Tolerant Systems. SNPD (3) 2007: 750-755 | |
79 | Jingqiang Lin, Jiwu Jing, Peng Liu: Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241 | |
78 | Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: An Objective Trust Management Framework for Mobile Ad Hoc Networks. VTC Spring 2007: 56-60 | |
77 | Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 | |
76 | Qijun Gu, Peng Liu, Chao-Hsien Chu: Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007) | |
75 | Xiuwen Zheng, Hung-Chung Huang, Wenyuan Li, Peng Liu, Quan-Zhen Li, Ying Liu: Modeling nonlinearity in dilution design microarray data. Bioinformatics 23(11): 1339-1347 (2007) | |
74 | Peng Liu, J. T. Gene Hwang: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 23(6): 739-746 (2007) | |
73 | Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) | |
72 | Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007) | |
71 | Peng Liu: Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120. Inf. Process. Manage. 43(1): 296 (2007) | |
70 | Kameswari Kotapati, Peng Liu, Thomas F. La Porta: Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Telecommunication Systems 35(3-4): 99-122 (2007) | |
2006 | ||
69 | Ernesto Damiani, Peng Liu: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings Springer 2006 | |
68 | Kun Bai, Peng Liu: Towards Database Firewall: Mining the Damage Spreading Patterns. ACSAC 2006: 449-462 | |
67 | Peng Liu, Naijun Wu, Jiaxian Zhu, Junjie Yin, Wei Zhang: A Unified Strategy of Feature Selection. ADMA 2006: 457-464 | |
66 | Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77 | |
65 | Hai Wang, Peng Liu: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. ESORICS 2006: 207-224 | |
64 | Peng Liu, Frank K. Soong: Word graph based speech rcognition error correction by handwriting input. ICMI 2006: 339-346 | |
63 | Peng Liu, Jian-Lai Zhou, Frank K. Soong: Non-uniform Kernel Allocation Based Parsimonious HMM. ISCSLP 2006: 294-302 | |
62 | Jun Du, Peng Liu, Frank K. Soong, Jian-Lai Zhou, Ren-Hua Wang: Noisy Speech Recognition Performance of Discriminative HMMs. ISCSLP 2006: 358-369 | |
61 | Xuefeng Zhang, Peng Liu, Jinjin Fan: The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection. ISDA (1) 2006: 377-384 | |
60 | Peng Liu, Lei Lei: Missing Data Treatment Methods and NBI Model. ISDA (1) 2006: 633-638 | |
59 | Jianshe Dong, Haixia Cao, Peng Liu, Li Ren: Bayesian Chinese Spam Filter Based on Crossed N-gram. ISDA (3) 2006: 103-108 | |
58 | Chi-Chun Pan, Prasenjit Mitra, Peng Liu: Semantic access control for information interoperation. SACMAT 2006: 237-246 | |
57 | Kameswari Kotapati, Peng Liu, Thomas F. La Porta: CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. SEC 2006: 158-170 | |
56 | Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu: In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259 | |
55 | Hui Zhu, X. L. Tang, Peng Liu: An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition. IJDAR 8(1): 27-34 (2006) | |
54 | Peng Liu, Hai Wang, Lunquan Li: Real-time data attack isolation for commercial database applications. J. Network and Computer Applications 29(4): 294-320 (2006) | |
53 | Peng Liu, Yan Zhang, Zhigang Mao: A Restoration Algorithm for Images Contaminated by Impulse Noise. Journal of Computer Research and Development 43(11): 1939-1946 (2006) | |
52 | Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: On-demand public-key management for mobile ad hoc networks. Wireless Communications and Mobile Computing 6: 295-306 (2006) | |
2005 | ||
51 | Meng Yu, Wanyu Zang, Peng Liu: Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526 | |
50 | Peng Liu, Elia El-Darzi, Lei Lei, Christos Vasilakis, Panagiotis Chountas, Wei Huang: An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset. ADMA 2005: 583-590 | |
49 | Qingzhao Tan, Wang-Chien Lee, Baihua Zheng, Peng Liu, Dik Lun Lee: Balancing performance and confidentiality in air index. CIKM 2005: 800-807 | |
48 | Peng Liu, Lei Lei, Naijun Wu: A Quantitative Study of the Effect of Missing Data in Classifiers. CIT 2005: 28-33 | |
47 | Yan Sun, Peng Liu, Parviz Kermani, Thomas F. La Porta: An architecture and key management approach for maintaining privacy in location based group services. CollaborateCom 2005 | |
46 | Kun Bai, Hai Wang, Peng Liu: Towards Database Firewalls. DBSec 2005: 178-192 | |
45 | Peng Liu, Jiaxian Zhu, Lanjuan Liu, Yanhong Li, Xuefeng Zhang: Application of Feature Selection for Unsupervised Learning in Prosecutors' Office. FSKD (2) 2005: 35-38 | |
44 | JiaJu Wu, Gang Liu, Peng Liu, ChuanYu Xi: The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005). GrC 2005: 284-287 | |
43 | Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta: A Taxonomy of Cyber Attacks on 3G Networks. ISI 2005: 631-633 | |
42 | Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501 | |
41 | Peng Liu, Jian-bin Hu, Zhong Chen: A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769 | |
40 | Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: Deep Set Operators for XQuery. XIME-P 2005 | |
39 | Peng Liu, Wanyu Zang, Meng Yu: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) | |
38 | Peng Liu, Amit Chetal: Trust-based secure information sharing between federal government agencies. JASIST 56(3): 283-298 (2005) | |
37 | Meng Yu, Peng Liu, Wanyu Zang: Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security 13(4): 623-658 (2005) | |
2004 | ||
36 | Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552 | |
35 | Meng Yu, Peng Liu, Wanyu Zang: Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425 | |
34 | Hai Wang, Peng Liu, Lunqun Li: Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. ISC 2004: 146-157 | |
33 | Ming Liu, Peng Liu, Donghua Zhou: Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay. ISNN (2) 2004: 91-96 | |
32 | Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147 | |
31 | Peng Liu, Zhong Chen: An Access Control Model for Web Services in Business Process. Web Intelligence 2004: 292-298 | |
30 | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) | |
29 | Peng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang: The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004) | |
2003 | ||
28 | Peng Liu, Wanyu Zang: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Conference on Computer and Communications Security 2003: 179-189 | |
27 | Meng Yu, Peng Liu, Wanyu Zang: Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-151 | |
26 | Yu Chen, Zhenqiang Jiao, Jun Xie, Zhihui Du, Peng Liu, Ziyu Zhu: A High Performance Design and Implementation of the Virtual Interface Architecture. APPT 2003: 125-135 | |
25 | Jianyong Zhang, Peng Liu: Delivering Services with Integrity Guarantees in Survivable Database Systems. DBSec 2003: 33-46 | |
24 | Peng Liu: ITDB: An Attack Self-Healing Database System Prototype. DISCEX (2) 2003: 131-133 | |
23 | Peng Liu: Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. DISCEX (2) 2003: 284-289 | |
22 | Peng Liu, Yao Shi, Sanli Li: Computing Pool: A Simplified and Practical Computational Grid Model. GCC (1) 2003: 661-668 | |
21 | Meng Yu, Peng Liu, Wanyu Zang: Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 | |
20 | Dongwon Lee, Wang-Chien Lee, Peng Liu: Supporting XML Security Models Using Relational Databases: A Vision. Xsym 2003: 267-281 | |
2002 | ||
19 | Peng Liu: Architectures for Intrusion Tolerant Database Systems. ACSAC 2002: 311-320 | |
18 | Dongxiao Li, Qingdong Yao, Peng Liu, Li Zhou: A bus arbitration scheme for HDTV decoder SoC. APCCAS (2) 2002: 79-83 | |
17 | Peng Liu, Ying Wang: Multiphase Damage Confinement System for Databases. DBSec 2002: 75-87 | |
16 | Peng Liu, Qingdong Yao, Weijian Yang: Hardware/software codesign for HDTV source decoder on system level. VCIP 2002: 679-686 | |
15 | Paul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) | |
2001 | ||
14 | Peng Liu: DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. ACSAC 2001: 219-229 | |
13 | Peng Liu, Zhihui Du: Cluster Trend: DataSpeaking. CLUSTER 2001: 168-171 | |
12 | Peng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205 | |
11 | Pramote Luenam, Peng Liu: ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. DBSec 2001: 239-252 | |
10 | Peng Liu, Xu Hao: Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. DBSec 2001: 75-89 | |
9 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001) | |
2000 | ||
8 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 | |
7 | Douglas M. Blough, Peng Liu: FIMD-MPI: A Tool for Injecting Faults into MPI Applications. IPDPS 2000: 241- | |
6 | Peng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000) | |
5 | Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): (2000) | |
1999 | ||
4 | Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 | |
3 | Peng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 | |
1998 | ||
2 | Sushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82 | |
1989 | ||
1 | Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda: Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. DASFAA 1989: 266-273 |