Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at - Homepage
TitleCited byYear
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 First IEEE International Conference on Smart Grid Communications, 327-332, 2010
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
Multi-phase damage confinement in database systems for Intrusion Tolerance
P Liu, S Jajodia
csfw, 0191, 2001
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE Transactions on Knowledge and Data Engineering 14 (5), 1167-1185, 2002
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Multi-version attack recovery for workflow systems
M Yu, P Liu, W Zang
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
Efficient damage assessment and repair in resilient distributed database systems
P Liu, X Hao
Database and Application Security XV, 75-89, 2002
Architectures for intrusion tolerant database systems
P Liu
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
Rewriting histories: Recovering from malicious transactions
P Liu, P Ammann, S Jajodia
Security of Data and Transaction Processing, 7-40, 2000
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber situational awareness, 3-13, 2010
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
International Conference on Trust and Trustworthy Computing, 169-186, 2013
Cyber defense technology networking and evaluation
R Bajcsy, T Benzel, M Bishop, B Braden, C Brodley, S Fahmy, S Floyd, ...
Communications of the ACM 47 (3), 58-61, 2004
The system can't perform the operation now. Try again later.
Articles 1–20