default search action
Peng Ning
Person information
- affiliation: Samsung Research American, Mountain View, CA, USA
- affiliation: North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j50]Jie Yang, Hongchang Zhang, Peng Ning:
Path Planning and Trajectory Optimization Based on Improved APF and Multi-Target. IEEE Access 11: 139121-139132 (2023) - [j49]Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - 2022
- [j48]Guangda Qiao, Peng Ning, Xiao Xia, Yang Yu, Xiaohui Lu, Tinghai Cheng:
Achieving Smooth Motion for Piezoelectric Stick-Slip Actuator With the Inertial Block Structure. IEEE Trans. Ind. Electron. 69(4): 3948-3958 (2022)
2010 – 2019
- 2019
- [c110]Qian Feng, Rundong Zhou, Yanhui Zhao, Jia Ma, Yifei Wang, Na Yu, Xudong Jin, Jian Wang, Ahmed M. Azab, Peng Ning:
Learning Binary Representation for Automatic Patch Detection. CCNC 2019: 1-6 - 2017
- [j47]Sangwon Hyun, Kun Sun, Peng Ning:
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes. Comput. Commun. 104: 191-203 (2017) - [j46]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. IEEE J. Sel. Areas Commun. 35(3): 615-627 (2017) - [c109]Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning:
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. AsiaCCS 2017: 167-178 - [c108]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c107]Richeng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, Peng Ning:
Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach. PAC 2017: 72-83 - [p7]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - 2016
- [j45]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
Zero-determinant Strategies for Multi-player Multi-action Iterated Games. IEEE Signal Process. Lett. 23(3): 311-315 (2016) - [j44]Song Fang, Yao Liu, Peng Ning:
Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 13(3): 394-408 (2016) - [j43]Song Fang, Yao Liu, Peng Ning:
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature. IEEE Trans. Inf. Forensics Secur. 11(7): 1515-1527 (2016) - [j42]Xiaofan He, Huaiyu Dai, Peng Ning:
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. IEEE Trans. Signal Process. 64(13): 3429-3443 (2016) - [j41]Qian Wang, Kui Ren, Peng Ning, Shengshan Hu:
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(10): 8331-8344 (2016) - [j40]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning, Rudra Dutta:
Toward Proper Guard Zones for Link Signature. IEEE Trans. Wirel. Commun. 15(3): 2104-2117 (2016) - [c106]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. INFOCOM 2016: 1-9 - [c105]Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, Peng Ning:
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. NDSS 2016 - 2015
- [c104]Jason Gionta, William Enck, Peng Ning:
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. CODASPY 2015: 325-336 - [c103]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. GLOBECOM 2015: 1-6 - [c102]Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta:
A stochastic multi-channel spectrum access game with incomplete information. ICC 2015: 4799-4804 - [c101]Xiaofan He, Huaiyu Dai, Peng Ning:
Improving learning and adaptation in security games by exploiting information asymmetry. INFOCOM 2015: 1787-1795 - [c100]Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning:
No time to demodulate - fast physical layer verification of friendly jamming. MILCOM 2015: 653-658 - [c99]Kaiqi Xiong, Peng Ning:
Cost-efficient and attack-resilient approaches for state estimation in power grids. SAC 2015: 2192-2197 - [c98]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2014
- [j39]Kui Ren, Pierangela Samarati, Marco Gruteser, Peng Ning, Yunhao Liu:
Guest Editorial Special Issue on Security for IoT: The State of the Art. IEEE Internet Things J. 1(5): 369-371 (2014) - [j38]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - [j37]Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE Trans. Wirel. Commun. 13(8): 4374-4388 (2014) - [c97]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
SEER: practical memory virus scanning as a service. ACSAC 2014: 186-195 - [c96]Peng Ning:
Samsung KNOX and Enterprise Mobile Security. SPSM@CCS 2014: 1 - [c95]Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen:
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. CCS 2014: 90-102 - [c94]Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning:
The security of link signature: A view from channel models. CNS 2014: 103-108 - [c93]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:
MCR Decoding: A MIMO approach for defending against wireless jamming attacks. CNS 2014: 133-138 - [c92]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Channel correlation modeling for link signature security assessment. HotSoS 2014: 25 - [c91]Xianqing Yu, Peng Ning, Mladen A. Vouk:
Securing Hadoop in cloud. HotSoS 2014: 26 - [c90]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
DACSA: A Decoupled Architecture for Cloud Security Analysis. CSET 2014 - 2013
- [j36]Xiaofan He, Huaiyu Dai, Peng Ning:
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing. IEEE J. Sel. Areas Commun. 31(11): 2196-2208 (2013) - [j35]Qi Dong, Donggang Liu, Peng Ning:
Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Trans. Embed. Comput. Syst. 12(3): 73:1-73:26 (2013) - [j34]Xiaofan He, Huaiyu Dai, Peng Ning:
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check. IEEE Trans. Wirel. Commun. 12(5): 2512-2523 (2013) - [c89]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c88]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - [c87]Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic adaptive anti-jamming via controlled mobility. CNS 2013: 1-9 - [c86]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Is link signature dependable for wireless security? INFOCOM 2013: 200-204 - [c85]Peng Ning:
Program Chair's Message. NDSS 2013 - [c84]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai:
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. IEEE Symposium on Security and Privacy 2013: 174-188 - [c83]Ruowen Wang, Peng Ning, Tao Xie, Quan Chen:
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. USENIX Security Symposium 2013: 65-80 - 2012
- [j33]Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning:
MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks. Ad Hoc Networks 10(3): 299-316 (2012) - [j32]Attila Altay Yavuz, Peng Ning:
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. Ad Hoc Networks 10(7): 1204-1220 (2012) - [j31]Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning:
Interval-based flow watermarking for tracing interactive traffic. Comput. Networks 56(5): 1646-1665 (2012) - [j30]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. IEEE Trans. Inf. Forensics Secur. 7(1): 297-309 (2012) - [j29]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j28]Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning:
Containing bogus packet insertion attacks for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 8(3): 20:1-20:30 (2012) - [j27]Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning:
Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. IEEE Trans. Signal Process. 60(10): 5281-5292 (2012) - [j26]Liang Xiao, Huaiyu Dai, Peng Ning:
MAC Design of Uncoordinated FH-Based Collaborative Broadcast. IEEE Wirel. Commun. Lett. 1(3): 261-264 (2012) - [c82]Jason Gionta, Peng Ning, Xiaolan Zhang:
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. ACNS 2012: 381-399 - [c81]Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning:
Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY 2012: 317-326 - [c80]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c79]Yao Liu, Peng Ning:
BitTrickle: Defending against broadband and high-power reactive jamming attacks. INFOCOM 2012: 909-917 - [c78]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515 - [c77]Yao Liu, Peng Ning:
Enhanced wireless channel authentication using time-synched link signature. INFOCOM 2012: 2636-2640 - [c76]Wente Zeng, Mo-Yuen Chow, Peng Ning:
Secure distributed control in unreliable D-NCS. ISIE 2012: 1858-1863 - [c75]Xiaofan He, Huaiyu Dai, Peng Ning:
A Byzantine attack defender: The Conditional Frequency Check. ISIT 2012: 975-979 - [c74]Barry W. Peddycord III, Peng Ning, Sushil Jajodia:
On the Accurate Identification of Network Service Dependencies in Distributed Systems. LISA 2012: 181-194 - 2011
- [j25]Mihui Kim, Peng Ning:
SeCA: A framework for Secure Channel Assignment in wireless mesh networks. Comput. Commun. 34(4): 567-576 (2011) - [j24]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty:
P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE J. Sel. Areas Commun. 29(3): 582-594 (2011) - [j23]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j22]Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing Li, Fang Zheng Peng, Peng Ning, Massoud Amin:
A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid. IEEE Trans. Smart Grid 2(4): 770-781 (2011) - [c73]Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. CCS 2011: 375-388 - [c72]Yao Liu, Peng Ning:
Poster: mimicry attacks against wireless link signature. CCS 2011: 801-804 - [c71]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks. GLOBECOM 2011: 1-6 - [c70]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks. GLOBECOM 2011: 1-6 - [c69]Sangwon Hyun, Peng Ning, An Liu:
Mitigating Wireless Jamming Attacks via Channel Migration. ICDCS Workshops 2011: 313-322 - [c68]Qian Wang, Kui Ren, Peng Ning:
Anti-jamming communication in cognitive radio networks with unknown channel statistics. ICNP 2011: 393-402 - [c67]Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning:
On the Expressiveness of Return-into-libc Attacks. RAID 2011: 121-141 - [r2]Sangwon Hyun, Peng Ning:
Secure Code Dissemination in Wireless Sensor Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1099-1102 - [r1]Kun Sun, Peng Ning:
Secure Time Synchronization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1139-1140 - 2010
- [c66]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang:
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376 - [c65]Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala:
Always up-to-date: scalable offline patching of VM images in a compute cloud. ACSAC 2010: 377-386 - [c64]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c63]Yao Liu, Peng Ning, Huaiyu Dai, An Liu:
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. INFOCOM 2010: 695-703 - [c62]An Liu, Peng Ning, Huaiyu Dai, Yao Liu:
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. MASS 2010: 41-50 - [c61]Yao Liu, Peng Ning, Huaiyu Dai:
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. IEEE Symposium on Security and Privacy 2010: 286-301 - [p6]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p5]Emre Can Sezer, Chongkyung Kil, Peng Ning:
Automated Software Vulnerability Analysis. Cyber Situational Awareness 2010: 201-223
2000 – 2009
- 2009
- [j21]Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning:
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 6(1): 9:1-9:29 (2009) - [c60]Attila Altay Yavuz, Peng Ning:
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228 - [c59]Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang:
HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470 - [c58]Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. CCS 2009: 21-32 - [c57]Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning:
Managing security of virtual machine images in a cloud environment. CCSW 2009: 91-96 - [c56]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c55]Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124 - [c54]An Liu, Peng Ning, Chun Wang:
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250 - [c53]Attila Altay Yavuz, Peng Ning:
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks. MobiQuitous 2009: 1-10 - [c52]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - [e10]Michael Backes, Peng Ning:
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings. Lecture Notes in Computer Science 5789, Springer 2009, ISBN 978-3-642-04443-4 [contents] - 2008
- [j20]Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 12:1-12:37 (2008) - [j19]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [j18]Peng Ning, An Liu, Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Networks 4(1): 1:1-1:35 (2008) - [j17]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key predistribution for wireless sensor networks. ACM Trans. Sens. Networks 4(2): 11:1-11:30 (2008) - [c51]An Liu, Peng Ning:
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256 - [c50]Sangwon Hyun, Peng Ning, An Liu, Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 - [c49]An Liu, Young-Hyun Oh, Peng Ning:
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562 - [c48]Qi Dong, Donggang Liu, Peng Ning:
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12 - [e9]Peng Ning, Paul F. Syverson, Somesh Jha:
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. ACM 2008, ISBN 978-1-59593-810-7 [contents] - 2007
- [b2]Donggang Liu, Peng Ning:
Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209 - [j16]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sens. Networks 3(3): 14 (2007) - [c47]Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 - [c46]Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code. AsiaCCS 2007: 4-12 - [c45]Pan Wang, Peng Ning, Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks. AsiaCCS 2007: 45-56 - [c44]Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. CCS 2007: 562-572 - [c43]Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 - [c42]Ronghua Wang, Wenliang Du, Peng Ning:
Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 - [c41]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty:
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8 - [p4]Lei Fang, Wenliang Du, Peng Ning:
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 33-55 - [p3]Peng Ning, Donggang Liu, Wenliang Du:
Secure and Resilient Localization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 161-184 - [p2]Kun Sun, Peng Ning, Cliff Wang:
Secure and Resilient Time Synchronization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 347-367 - [e8]Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson:
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM 2007, ISBN 978-1-59593-703-2 [contents] - [e7]Peng Ning, Vijay Atluri:
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-890-9 [contents] - [e6]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9 [contents] - [e5]Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-888-6 [contents] - [e4]Peng Ning, Ernesto Damiani, Seth Proctor:
Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-892-3 [contents] - [e3]Peng Ning, Ting Yu:
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-883-1 [contents] - 2006
- [j15]Wenliang Du, Lei Fang, Peng Ning:
LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distributed Comput. 66(7): 874-886 (2006) - [j14]Kun Sun, Peng Ning, Cliff Wang:
Secure and resilient clock synchronization in wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 395-408 (2006) - [c40]Kun Sun, Pai Peng, Peng Ning, Cliff Wang:
Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140 - [c39]Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning:
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348 - [c38]Kun Sun, Peng Ning, Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks. CCS 2006: 264-277 - [c37]Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 - [c36]Dingbang Xu, Peng Ning:
A Flexible Approach to Intrusion Alert Anonymization and Correlation. SecureComm 2006: 1-10 - [c35]Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Sensor Networks. SecureComm 2006: 1-10 - [c34]Pai Peng, Peng Ning, Douglas S. Reeves:
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. S&P 2006: 334-349 - [e2]Peng Ning, Sihan Qing, Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0 [contents] - 2005
- [j13]Peng Ning, Kun Sun:
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005) - [j12]Kun Sun, Peng Ning, Cliff Wang:
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 177-189 (2005) - [j11]Donggang Liu, Peng Ning, Rongfang Li:
Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005) - [j10]Donggang Liu, Peng Ning:
Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Networks 1(2): 204-239 (2005) - [c33]Dingbang Xu, Peng Ning:
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546 - [c32]Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt:
Automatic diagnosis and response to memory corruption vulnerabilities. CCS 2005: 223-234 - [c31]Donggang Liu, Peng Ning, Wenliang Du:
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 - [c30]Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113 - [c29]Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning:
Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191 - [c28]Pan Wang, Peng Ning, Douglas S. Reeves:
Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362 - [c27]Lei Fang, Wenliang Du, Peng Ning:
A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 - [c26]Wenliang Du, Lei Fang, Peng Ning:
LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 - [c25]Donggang Liu, Peng Ning, Wenliang Du:
Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 - [c24]Wenliang Du, Ronghua Wang, Peng Ning:
An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 - [c23]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 - [c22]Pan Wang, Douglas S. Reeves, Peng Ning:
Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522 - [c21]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 - [p1]Peng Ning, Donggang Liu:
Broadcast Authentication and Key Management for Secure Sensor Networks. Handbook of Sensor Networks 2005: 141-172 - [e1]Vijay Atluri, Peng Ning, Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-227-5 [contents] - 2004
- [j9]Donggang Liu, Peng Ning:
Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3(4): 800-836 (2004) - [j8]Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:
Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) - [j7]Peng Ning, Dingbang Xu:
Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004) - [c20]Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48 - [c19]Dingbang Xu, Peng Ning:
Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369 - [c18]Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207 - [c17]Pan Wang, Peng Ning, Douglas S. Reeves:
Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38 - [c16]Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303 - [c15]Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant:
Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004 - [c14]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. S&P 2004: 259-271 - 2003
- [b1]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112 - [j6]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) - [c13]Donggang Liu, Peng Ning:
Establishing pairwise keys in distributed sensor networks. CCS 2003: 52-61 - [c12]Peng Ning, Dingbang Xu:
Learning attack strategies from intrusion alerts. CCS 2003: 200-209 - [c11]Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. CCS 2003: 231-240 - [c10]Peng Ning, Dingbang Xu:
Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88 - [c9]Peng Ning, Kun Sun:
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67 - [c8]Donggang Liu, Peng Ning:
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003 - [c7]Donggang Liu, Peng Ning:
Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82 - 2002
- [j5]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) - [j4]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Design and implementation of a decentralized prototype system for detecting distributed attacks. Comput. Commun. 25(15): 1374-1391 (2002) - [c6]Peng Ning, Yun Cui, Douglas S. Reeves:
Constructing attack scenarios through correlation of intrusion alerts. CCS 2002: 245-254 - [c5]Peng Ning, Yun Cui, Douglas S. Reeves:
Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94 - 2001
- [j3]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding loss of fairness owing to failures in fair data exchange systems. Decis. Support Syst. 31(3): 337-350 (2001) - [j2]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) - [c4]Peng Ning, Yiqun Lisa Yin:
Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188 - [c3]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 - 2000
- [j1]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Modeling requests among cooperating intrusion detection systems. Comput. Commun. 23(17): 1702-1715 (2000) - [c2]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 - [c1]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint