Liyong Tang

According to our database1, Liyong Tang authored at least 19 papers between 2007 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Exploiting Consumer Reviews for Product Feature Ranking.
J. Comput. Sci. Technol., 2012

On key issuing privacy in distributed online social networks.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
A New Enforcement on Declassification with Reachability Analysis
CoRR, 2011

Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
CoRR, 2011

Enforcing Reactive Noninterference with Reachability Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Enforcing Relaxed Declassifications with Reference Points.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Secure Information Flow by Model Checking Pushdown System
CoRR, 2010

Secure Information Flow in Java via Reachability Analysis of Pushdown System.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Automatic Data Extraction from Web Discussion Forums.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Proceedings of the Proceedings P2P'08, 2008

TSearch: A Self-learning Vertical Search Spider for Travel.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008

2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007

Hybrid Overlay Structure Based on Virtual Node.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...