


Остановите войну!
for scientists:


default search action
Peng Liu 0005
Person information

- affiliation: Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- affiliation (former): University of Maryland, Department of Information Systems, Baltimore County, Baltimore, MD, USA
- affiliation (PhD 1999): George Mason University, Fairfax, VA, USA
Other persons with the same name
- Peng Liu — disambiguation page
- Peng Liu 0001 — Microsoft Research Asia, Beijing, China
- Peng Liu 0002 — FZI Forschungszentrum Informatik an der Universität Karlsruhe, Germany
- Peng Liu 0003
— Southern University of Science and Technology, Shenzhen, China (and 2 more)
- Peng Liu 0004
— Shenyang University of Technology, School of Management, China
- Peng Liu 0006 — PLA University of Science and Technology, Institute of Command Automation, Nanjing, China
- Peng Liu 0007
— Iowa State University, Department of Statistics, Ames, IA, USA (and 1 more)
- Peng Liu 0008
— Harbin Institute of Technology, Pattern Recognition and Intelligent System Research Center, China
- Peng Liu 0009 — Beijing Institute of Technology, School of Mechanical Engineering, China
- Peng Liu 0010
— Purdue University, USA (and 3 more)
- Peng Liu 0011 — Trinity College Dublin, Ireland
- Peng Liu 0012
— California State University, Fullerton, CA, USA (and 1 more)
- Peng Liu 0013 — China University of Mining and Technology, CUMT-IoT Perception Mine Research Center, Xuzhou, China
- Peng Liu 0014 — Lanzhou University, School of Management, Lanzhou, China
- Peng Liu 0015 — Queen's University, Department of Electr. & Comput. Engineering, Kingston, ON, Canada
- Peng Liu 0016
— Zhejiang University, Department of Information Science and Electronic Engineering, Hangzhou, China
- Peng Liu 0017 — Xidian University, Key Laboratory of Ministry of Education for Electronic Equipment Structure Design, Xian, China
- Peng Liu 0018
— NXP Semiconductors Austria GmbH, Gratkorn, Austria (and 2 more)
- Peng Liu 0019
— Fudan University, Key Laboratory of Wave Scattering and Remote Sensing Information, Shanghai, China (and 1 more)
- Peng Liu 0020
— PLA University of Science and Technology, Department of Network Engineering, Nanjing, China
- Peng Liu 0021
— Huazhong University of Science and Technology, School of Electric and Electronic Engineering, Wuhan, China
- Peng Liu 0022
— Southeast University, School of Automation, Nanjing, China
- Peng Liu 0023
— Jilin University, School of Computer Science and Technology, Changchun, China
- Peng Liu 0024
— Chinese Academic of Science, Institute of Remote Sensing and Digital Earth, Beijing, China
- Peng Liu 0025
— Norwegian University of Science and Technology, Department of Computer Science, Trondheim, Norway
- Peng Liu 0026
— Ohio State University, Department of Electrical and Computer Engineering, Columbus, OH, USA
- Peng Liu 0027
— Hangzhou Dianzi University, School of Computer Science and Technology, National Demonstration Center for Experimental Computer Education, China (and 1 more)
- Peng Liu 0028
— Beijing University of Technology, College of Metropolitan Transportation, China
- Peng Liu 0029
— Jiangnan Institute of Computing Technology, Wuxi, China
- Peng Liu 0030
— Tianjin University, Department of Industrial Engineering, College of Management and Economics, China (and 1 more)
- Peng Liu 0031
— Pennsylvania State University, Department of Electrical Engineering, University Park, PA, USA
- Peng Liu 0032
— Beihang University, School of Electronic and Information Engineering, Beijing, China
- Peng Liu 0033
— Chinese Academy of Science, Institute of Acoustics, Key Laboratory of Information Technology for Autonomous Underwater Vehicles, Beijing, China
- Peng Liu 0034 — University of Newcastle Upon Tyne, UK
- Peng Liu 0035
— Harbin Engineering University, College of Computer Science and Technology, Harbin, China
- Peng Liu 0036
— Ocean University of China, Computing Center, Qingdao, China
- Peng Liu 0037
— University of Florida, J. Crayton Pruitt Family Department of Biomedical Engineering, Gainesvill, FL, USA
- Peng Liu 0038
— Zhengzhou University of Light Industry, College of Electronic and Information Engineering, Zhengzhou, China (and 1 more)
- Peng Liu 0039 — State University of New York at Binghamton, Department of Computer Science, Binghamton, NY, USA
- Peng Liu 0040 — North China Electric Power University, School of Electrical and Electronic Engineering, Beijing, China
- Peng Liu 0041 — University of Wisconsin-Madison, Department of Computer Sciences, Madison, WI, USA
- Peng Liu 0042
— China University of Petroleum, College of Mechanical and Electronic Engineering, Qingdao, China
- Peng Liu 0043
— University of Lausanne, Department of Actuarial Science, Lausanne, Switzerland
- Peng Liu 0044
— Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China (and 1 more)
- Peng Liu 0045
— Guangdong University of Technology, School of Computers, Guangzhou, China (and 1 more)
- Peng Liu 0046
— Chinese Academy of Sciences, Institute of Acoustics, Haikou Laboratory, Haikou, China
- Peng Liu 0047
— Huawei Technologies, Wireless Technology Lab, Shenzhen, China (and 1 more)
- Peng Liu 0048
— University of Kent, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j103]Chuanxu Wang, Jing Wang, Peng Liu:
Complementary adversarial mechanisms for weakly-supervised temporal action localization. Pattern Recognit. 139: 109426 (2023) - [j102]Muskan Sharma Kuinkel
, Chengyi Zhang
, Peng Liu, Sevilay Demirkesen, Khaled Ksaibati:
Suitability Study of Using UAVs to Estimate Landfilled Fly Ash Stockpile. Sensors 23(3): 1242 (2023) - [j101]Lan Zhang
, Peng Liu, Yoon-Ho Choi
, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - [c238]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - 2022
- [j100]SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples. IEEE Access 10: 33602-33615 (2022) - [j99]Huanran Wang
, Hui He
, Weizhe Zhang
, Wenmao Liu, Peng Liu, Amir Javadpour
:
Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 102: 108212 (2022) - [j98]Xixun He
, Yiyu Yang
, Wei Zhou
, Wenjie Wang, Peng Liu, Yuqing Zhang
:
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet Things J. 9(3): 2083-2093 (2022) - [j97]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [j96]Yanghua Zhang, Jice Wang, Hexiang Huang
, Yuqing Zhang
, Peng Liu
:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. IEEE Trans. Big Data 8(6): 1511-1523 (2022) - [j95]Juan Wang
, Shirong Hao
, Hongxin Hu
, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu
, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [j94]Donghai Tian
, Qiang Zeng, Dinghao Wu
, Peng Liu
, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j93]Shijie Jia
, Qionglu Zhang
, Luning Xia, Jiwu Jing
, Peng Liu
:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [j92]Junwei Zhou
, Yijia Qian, Qingtian Zou, Peng Liu
, Jianwen Xiang
:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Trans. Inf. Forensics Secur. 17: 3051-3061 (2022) - [c237]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis. ASPLOS 2022: 726-739 - [c236]Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c235]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CCS 2022: 3269-3283 - [c234]Gaurav Goyal, Peng Liu, Shamik Sural
:
Securing Smart Home IoT Systems with Attribute-Based Access Control. SAT-CPS@CODASPY 2022: 37-46 - [c233]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - [c232]Devansh Rajgarhia, Peng Liu, Shamik Sural
:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 113-118 - [c231]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c230]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [i29]Benjamin Reidys, Peng Liu, Jian Huang:
RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis. CoRR abs/2206.05821 (2022) - [i28]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CoRR abs/2208.07833 (2022) - 2021
- [j91]Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Cybersecur. 4(1): 33 (2021) - [j90]Wei Zhou
, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang
, Le Guan
, Tao Liu
, Yan Jia, Yaowen Zheng, Yuqing Zhang
, Limin Sun, Yazhe Wang, Peng Liu
:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j89]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [j88]Lingyun Situ, Zhiqiang Zuo, Le Guan, Linzhang Wang, Xuandong Li, Jin Shi, Peng Liu:
Vulnerable Region-Aware Greybox Fuzzing. J. Comput. Sci. Technol. 36(5): 1212-1228 (2021) - [j87]Dongdong Huo, Chen Cao, Peng Liu
, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j86]Heqing Huang
, Cong Zheng, Junyuan Zeng
, Wu Zhou, Sencun Zhu, Peng Liu
, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j85]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j84]Zhisheng Hu
, Ping Chen
, Minghui Zhu
, Peng Liu
:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. IEEE Trans. Inf. Forensics Secur. 16: 4691-4704 (2021) - [j83]SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. IEEE Trans. Netw. Sci. Eng. 8(2): 908-920 (2021) - [j82]Dongliang Mu
, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu
:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c229]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu
, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860 - [c228]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c227]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c226]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - [c225]Wei Song
, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. SP 2021: 955-969 - [c224]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. USENIX Security Symposium 2021: 2007-2024 - [i27]Haizhou Wang, Peng Liu:
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection. CoRR abs/2105.02996 (2021) - [i26]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). CoRR abs/2107.07759 (2021) - [i25]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - [i24]Wei Song, Jiameng Ying, Sihao Shen, Boya Li, Hao Ma, Peng Liu:
A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions. CoRR abs/2111.14072 (2021) - 2020
- [j81]DongHyun Ko
, SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu, Yoon-Ho Choi
:
Structural Image De-Identification for Privacy-Preserving Deep Learning. IEEE Access 8: 119848-119862 (2020) - [j80]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs. Autom. 111 (2020) - [j79]Qingtian Zou, Xiaoyan Sun
, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [j78]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou
, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j77]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020) - [j76]Fu Chen
, Peng Liu, Jianming Zhu, Sheng Gao
, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. Secur. Commun. Networks 2020: 8884924:1-8884924:14 (2020) - [j75]Zhisheng Hu
, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. ACM Trans. Priv. Secur. 24(1): 6:1-6:25 (2020) - [j74]Lannan Luo
, Qiang Zeng, Chen Cao, Kai Chen
, Jian Liu
, Limin Liu, Neng Gao, Min Yang
, Xinyu Xing, Peng Liu
:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [j73]Weizhe Zhang
, Huanran Wang
, Hui He, Peng Liu
:
DAMBA: Detecting Android Malware by ORGB Analysis. IEEE Trans. Reliab. 69(1): 55-69 (2020) - [c223]Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. ACSAC 2020: 746-759 - [c222]Hunmin Kim, Pinyao Guo, Minghui Zhu, Peng Liu:
On Data-driven Attack-resilient Gaussian Process Regression for Dynamic Systems. ACC 2020: 2981-2986 - [c221]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c220]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c219]Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, Shengwu Xiong:
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern. ICPR 2020: 4221-4228 - [c218]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208 - [c217]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [c216]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [p16]Chen Zhong, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88 - [e11]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i23]Eunjung Yoon, Peng Liu:
Practical Verification of MapReduce Computation Integrity via Partial Re-execution. CoRR abs/2002.09560 (2020) - [i22]Wei Song
, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. CoRR abs/2008.01957 (2020) - [i21]Lan Zhang, Peng Liu, Yoon-Ho Choi:
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. CoRR abs/2009.05602 (2020) - [i20]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020)
2010 – 2019
- 2019
- [j72]Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu:
On convergence rates of game theoretic reinforcement learning algorithms. Autom. 104: 90-101 (2019) - [j71]Jin-Myeong Shin
, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Gener. Comput. Syst. 100: 811-825 (2019) - [j70]Wei Zhou
, Yan Jia, Anni Peng, Yuqing Zhang
, Peng Liu
:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [j69]Chen Zhong
, John Yen, Peng Liu
, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [j68]Le Guan
, Chen Cao, Peng Liu
, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c215]Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. CCS 2019: 2713-2714 - [c214]SeokHwan Choi, Jin-Myeong Shin
, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. CNS 2019: 1-6 - [c213]Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. CODASPY 2019: 327-338 - [c212]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c211]Lingyun Situ, Linzhang Wang, Xuandong Li, Le Guan, Wenhui Zhang, Peng Liu:
Energy distribution matters in greybox fuzzing. ICSE (Companion Volume) 2019: 270-271 - [c210]Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. RAID 2019: 427-442 - [c209]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c208]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - [c207]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo
:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [p15]George Cybenko, Michael P. Wellman
, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p14]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 54-93 - [p13]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p12]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese
, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e10]Peng Liu, Yuqing Zhang:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, IoT S&P@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6838-4 [contents] - [e9]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - [i19]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i18]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems. CoRR abs/1908.03638 (2019) - [i17]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - [i16]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j67]Chen Zhong
, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018) - [j66]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j65]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Cybersecur. 1(1): 3 (2018) - [j64]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang:
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. Cybersecur. 1(1): 5 (2018) - [j63]Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. IEEE Secur. Priv. 16(6): 71-75 (2018) - [j62]Xiaoyan Sun, Jun Dai
, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Trans. Security Safety 4(13): e3 (2018) - [j61]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. EAI Endorsed Trans. Security Safety 4(14): e4 (2018) - [j60]Donghai Tian
, Xi Xiong, Changzhen Hu, Peng Liu:
A policy-centric approach to protecting OS kernel from vulnerable LKMs. Softw. Pract. Exp. 48(6): 1269-1284 (2018) - [j59]Xiaoyan Sun
, Jun Dai
, Peng Liu
, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. IEEE Trans. Inf. Forensics Secur. 13(10): 2506-2521 (2018) - [j58]Kai Chen
, Yingjun Zhang, Peng Liu
:
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. Mob. Comput. 17(8): 1879-1893 (2018) - [c206]Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. ACSAC 2018: 490-504 - [c205]Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu:
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine. APSEC 2018: 219-228 - [c204]Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. From Database to Cyber Security 2018: 227-243 - [c203]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c202]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. DSN 2018: 574-585 - [c201]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo
, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c200]Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee
, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo
:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. SACMAT 2018: 93-104 - [c199]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. WISEC 2018: 248-259 - [i15]Wei Zhou, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. CoRR abs/1802.03110 (2018) - [i14]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots. CoRR abs/1804.02814 (2018) - [i13]Xusheng Li, Zhisheng Hu, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
ROPNN: Detection of ROP Payloads Using Deep Neural Networks. CoRR abs/1807.11110 (2018) - [i12]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps. CoRR abs/1811.03241 (2018) - 2017
- [j57]