default search action
Peng Liu 0005
Person information
- affiliation: Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- affiliation (former): University of Maryland, Department of Information Systems, Baltimore, MD, USA
- affiliation (PhD 1999): George Mason University, Fairfax, VA, USA
Other persons with the same name
- Peng Liu — disambiguation page
- Peng Liu 0001 — Microsoft Research Asia, Beijing, China
- Peng Liu 0002 — FZI Forschungszentrum Informatik an der Universität Karlsruhe, Germany
- Peng Liu 0003 — Southern University of Science and Technology, Shenzhen, China (and 2 more)
- Peng Liu 0004 — Shenyang University of Technology, School of Management, China
- Peng Liu 0006 — PLA University of Science and Technology, Institute of Command Automation, Nanjing, China
- Peng Liu 0007 — Iowa State University, Department of Statistics, Ames, IA, USA (and 1 more)
- Peng Liu 0008 — Harbin Institute of Technology, Pattern Recognition and Intelligent System Research Center, China
- Peng Liu 0009 — Beijing Institute of Technology, School of Mechanical Engineering, China
- Peng Liu 0010 — Purdue University, USA (and 3 more)
- Peng Liu 0011 — Trinity College Dublin, Ireland
- Peng Liu 0012 — California State University, Fullerton, CA, USA (and 1 more)
- Peng Liu 0013 — China University of Mining and Technology, CUMT-IoT Perception Mine Research Center, Xuzhou, China
- Peng Liu 0014 — Lanzhou University, School of Management, Lanzhou, China
- Peng Liu 0015 — Queen's University, Department of Electr. & Comput. Engineering, Kingston, ON, Canada
- Peng Liu 0016 — Zhejiang University, Department of Information Science and Electronic Engineering, Hangzhou, China
- Peng Liu 0017 — Xidian University, Key Laboratory of Ministry of Education for Electronic Equipment Structure Design, Xian, China
- Peng Liu 0018 — NXP Semiconductors Austria GmbH, Gratkorn, Austria (and 2 more)
- Peng Liu 0019 — Fudan University, Key Laboratory of Wave Scattering and Remote Sensing Information, Shanghai, China (and 1 more)
- Peng Liu 0020 — PLA University of Science and Technology, Department of Network Engineering, Nanjing, China
- Peng Liu 0021 — Huazhong University of Science and Technology, School of Electric and Electronic Engineering, Wuhan, China
- Peng Liu 0022 — Southeast University, School of Automation, Nanjing, China
- Peng Liu 0023 — Jilin University, School of Computer Science and Technology, Changchun, China
- Peng Liu 0024 — Chinese Academic of Science, Institute of Remote Sensing and Digital Earth, Beijing, China
- Peng Liu 0025 — Norwegian University of Science and Technology, Department of Computer Science, Trondheim, Norway
- Peng Liu 0026 — Ohio State University, Department of Electrical and Computer Engineering, Columbus, OH, USA
- Peng Liu 0027 — Hangzhou Dianzi University, School of Computer Science and Technology, National Demonstration Center for Experimental Computer Education, China (and 1 more)
- Peng Liu 0028 — Beijing University of Technology, College of Metropolitan Transportation, China
- Peng Liu 0029 — Jiangnan Institute of Computing Technology, Wuxi, China
- Peng Liu 0030 — Tianjin University, Department of Industrial Engineering, College of Management and Economics, China (and 1 more)
- Peng Liu 0031 — Pennsylvania State University, Department of Electrical Engineering, University Park, PA, USA
- Peng Liu 0032 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Peng Liu 0033 — Chinese Academy of Science, Institute of Acoustics, Key Laboratory of Information Technology for Autonomous Underwater Vehicles, Beijing, China
- Peng Liu 0034 — University of Newcastle Upon Tyne, UK
- Peng Liu 0035 — Harbin Engineering University, College of Computer Science and Technology, Harbin, China
- Peng Liu 0036 — Ocean University of China, Computing Center, Qingdao, China
- Peng Liu 0037 — University of Florida, J. Crayton Pruitt Family Department of Biomedical Engineering, Gainesvill, FL, USA
- Peng Liu 0038 — Zhengzhou University of Light Industry, College of Electronic and Information Engineering, Zhengzhou, China (and 1 more)
- Peng Liu 0039 — State University of New York at Binghamton, Department of Computer Science, Binghamton, NY, USA
- Peng Liu 0040 — North China Electric Power University, School of Electrical and Electronic Engineering, Beijing, China
- Peng Liu 0041 — University of Wisconsin-Madison, Department of Computer Sciences, Madison, WI, USA
- Peng Liu 0042 — China University of Petroleum, College of Mechanical and Electronic Engineering, Qingdao, China
- Peng Liu 0043 — University of Lausanne, Department of Actuarial Science, Lausanne, Switzerland
- Peng Liu 0044 — Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China (and 1 more)
- Peng Liu 0045 — Guangdong University of Technology, School of Computers, Guangzhou, China (and 1 more)
- Peng Liu 0046 — Chinese Academy of Sciences, Institute of Acoustics, Haikou Laboratory, Haikou, China
- Peng Liu 0047 — Huawei Technologies, Wireless Technology Lab, Shenzhen, China (and 1 more)
- Peng Liu 0048 — University of Kent, UK
- Peng Liu 0049 — University of Electronic Science and Technology of China, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j111]Qingtian Zou, Lan Zhang, Xiaoyan Sun, Anoop Singhal, Peng Liu:
Using Explainable AI for Neural Network-Based Network Attack Detection. Computer 57(5): 78-85 (2024) - [j110]Yiyu Yang, Jice Wang, Peng Liu, Anmin Fu, Yuqing Zhang:
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms. IEEE Internet Things J. 11(22): 36841-36857 (2024) - [j109]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Analysis of neural network detectors for network attacks. J. Comput. Secur. 32(3): 193-220 (2024) - [j108]Hui Liu, Bo Zhao, Jiabao Guo, Kehuan Zhang, Peng Liu:
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest. Pattern Recognit. 147: 110127 (2024) - [j107]Wei Song, Zihan Xue, Jinchi Han, Zhenzhen Li, Peng Liu:
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks. IEEE Trans. Computers 73(4): 1019-1033 (2024) - [c243]Lan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code. IWSPA@CODASPY 2024: 49-58 - [c242]Peng Liu, He Wang, Chen Zheng, Yuqing Zhang:
Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering. ICNC 2024: 116-120 - [c241]Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. NDSS 2024 - [i40]Fan Zhang, Peng Liu:
Protecting the 'Stop Using My Data' Right through Blockchain-assisted Evidence Generation. CoRR abs/2406.17694 (2024) - 2023
- [j106]Lingyun Situ, Chi Zhang, Le Guan, Zhiqiang Zuo, Linzhang Wang, Xuandong Li, Peng Liu, Jin Shi:
Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware. IEEE Internet Things J. 10(23): 20718-20734 (2023) - [j105]Muskan Sharma Kuinkel, Chengyi Zhang, Peng Liu, Sevilay Demirkesen, Khaled Ksaibati:
Suitability Study of Using UAVs to Estimate Landfilled Fly Ash Stockpile. Sensors 23(3): 1242 (2023) - [j104]Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - [c240]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - [i39]Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. CoRR abs/2309.01281 (2023) - 2022
- [j103]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples. IEEE Access 10: 33602-33615 (2022) - [j102]Hui Liu, Bo Zhao, Minzhi Ji, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-filter: Detecting adversarial examples by filtering out recessive features. Appl. Soft Comput. 124: 109027 (2022) - [j101]Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu, Amir Javadpour:
Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 102: 108212 (2022) - [j100]Xixun He, Yiyu Yang, Wei Zhou, Wenjie Wang, Peng Liu, Yuqing Zhang:
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet Things J. 9(3): 2083-2093 (2022) - [j99]Hui Liu, Bo Zhao, Minzhi Ji, Mengchen Li, Peng Liu:
GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack. Inf. Sci. 613: 717-730 (2022) - [j98]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [j97]Yanghua Zhang, Jice Wang, Hexiang Huang, Yuqing Zhang, Peng Liu:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. IEEE Trans. Big Data 8(6): 1511-1523 (2022) - [j96]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [j95]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j94]Shijie Jia, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [j93]Junwei Zhou, Yijia Qian, Qingtian Zou, Peng Liu, Jianwen Xiang:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Trans. Inf. Forensics Secur. 17: 3051-3061 (2022) - [c239]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis. ASPLOS 2022: 726-739 - [c238]Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c237]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CCS 2022: 3269-3283 - [c236]Gaurav Goyal, Peng Liu, Shamik Sural:
Securing Smart Home IoT Systems with Attribute-Based Access Control. SAT-CPS@CODASPY 2022: 37-46 - [c235]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - [c234]Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. INFOCOM Workshops 2022: 1-6 - [c233]Devansh Rajgarhia, Peng Liu, Shamik Sural:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 113-118 - [c232]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c231]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [i38]Hui Liu, Bo Zhao, Yuefeng Peng, Weidong Li, Peng Liu:
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection. CoRR abs/2201.01080 (2022) - [i37]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis. CoRR abs/2206.05821 (2022) - [i36]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CoRR abs/2208.07833 (2022) - [i35]Hui Liu, Bo Zhao, Kehuan Zhang, Peng Liu:
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples. CoRR abs/2210.08579 (2022) - [i34]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - 2021
- [j92]Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Cybersecur. 4(1): 33 (2021) - [j91]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j90]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [j89]Lingyun Situ, Zhiqiang Zuo, Le Guan, Linzhang Wang, Xuandong Li, Jin Shi, Peng Liu:
Vulnerable Region-Aware Greybox Fuzzing. J. Comput. Sci. Technol. 36(5): 1212-1228 (2021) - [j88]Dongdong Huo, Chen Cao, Peng Liu, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j87]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j86]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Peng Liu, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j85]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. IEEE Trans. Inf. Forensics Secur. 16: 4691-4704 (2021) - [j84]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. IEEE Trans. Netw. Sci. Eng. 8(2): 908-920 (2021) - [j83]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c230]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860 - [c229]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c228]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c227]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - [c226]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. SP 2021: 955-969 - [c225]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. USENIX Security Symposium 2021: 2007-2024 - [i33]Wenhui Zhang, Trent Jaeger, Peng Liu:
Analyzing the Overhead of Filesystem Protection Using Linux Security Modules. CoRR abs/2101.11611 (2021) - [i32]Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios V. Vasilakos:
Security and Privacy for Artificial Intelligence: Opportunities and Challenges. CoRR abs/2102.04661 (2021) - [i31]Haizhou Wang, Peng Liu:
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection. CoRR abs/2105.02996 (2021) - [i30]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). CoRR abs/2107.07759 (2021) - [i29]Hui Liu, Bo Zhao, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features. CoRR abs/2107.09502 (2021) - [i28]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - [i27]Wei Song, Jiameng Ying, Sihao Shen, Boya Li, Hao Ma, Peng Liu:
A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions. CoRR abs/2111.14072 (2021) - 2020
- [j82]DongHyun Ko, SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Structural Image De-Identification for Privacy-Preserving Deep Learning. IEEE Access 8: 119848-119862 (2020) - [j81]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs. Autom. 111 (2020) - [j80]Qingtian Zou, Xiaoyan Sun, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [j79]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j78]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020) - [j77]Fu Chen, Peng Liu, Jianming Zhu, Sheng Gao, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. Secur. Commun. Networks 2020: 8884924:1-8884924:14 (2020) - [j76]Zhisheng Hu, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. ACM Trans. Priv. Secur. 24(1): 6:1-6:25 (2020) - [j75]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [j74]Weizhe Zhang, Huanran Wang, Hui He, Peng Liu:
DAMBA: Detecting Android Malware by ORGB Analysis. IEEE Trans. Reliab. 69(1): 55-69 (2020) - [c224]Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. ACSAC 2020: 746-759 - [c223]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
On Data-driven Attack-resilient Gaussian Process Regression for Dynamic Systems. ACC 2020: 2981-2986 - [c222]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c221]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c220]Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, Shengwu Xiong:
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern. ICPR 2020: 4221-4228 - [c219]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208 - [c218]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [c217]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [p16]Chen Zhong, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88 - [e11]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i26]Eunjung Yoon, Peng Liu:
Practical Verification of MapReduce Computation Integrity via Partial Re-execution. CoRR abs/2002.09560 (2020) - [i25]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. CoRR abs/2008.01957 (2020) - [i24]Lan Zhang, Peng Liu, Yoon-Ho Choi:
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. CoRR abs/2009.05602 (2020) - [i23]Hui Liu, Bo Zhao, Jiabao Guo, Yang An, Peng Liu:
GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks. CoRR abs/2010.06855 (2020) - [i22]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020) - [i21]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder. CoRR abs/2012.13972 (2020)
2010 – 2019
- 2019
- [j73]Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu:
On convergence rates of game theoretic reinforcement learning algorithms. Autom. 104: 90-101 (2019) - [j72]Jin-Myeong Shin, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Gener. Comput. Syst. 100: 811-825 (2019) - [j71]Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [j70]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [j69]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c216]Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. CCS 2019: 2713-2714 - [c215]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. CNS 2019: 1-6 - [c214]Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. CODASPY 2019: 327-338 - [c213]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c212]Lingyun Situ, Linzhang Wang, Xuandong Li, Le Guan, Wenhui Zhang, Peng Liu:
Energy distribution matters in greybox fuzzing. ICSE (Companion Volume) 2019: 270-271 - [c211]Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. RAID 2019: 427-442 - [c210]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c209]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - [c208]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [p15]George Cybenko, Michael P. Wellman, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p14]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 54-93 - [p13]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p12]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e10]Peng Liu, Yuqing Zhang:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, IoT S&P@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6838-4 [contents] - [e9]Sushil Jajodia, George Cybenko, Peng Liu,