Peng Li

Orcid: 0000-0001-9237-9764

Affiliations:
  • University of North Carolina, Chapel Hill, USA (PhD 2014)


According to our database1, Peng Li authored at least 12 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BlockPPA: Blockchain-Assisted Privacy-Preserving Authentication for Cross-Domain Electric Vehicle Charging.
IEEE Trans. Veh. Technol., February, 2025

Delegatable Multi-Authority Attribute-Based Anonymous Credentials.
IEEE Trans. Cloud Comput., 2025

2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023

2021
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.
Secur. Commun. Networks, 2021

2015
Replica Placement for Availability in the Worst Case.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Replication and placement for security in distributed systems.
PhD thesis, 2014

StopWatch: A Cloud Architecture for Timing Channel Mitigation.
ACM Trans. Inf. Syst. Secur., 2014

2013
Mitigating access-driven timing channels in clouds using StopWatch.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2010
On Challenges in Evaluating Malware Clustering.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Automatically Adapting a Trained Anomaly Detector to Software Patches.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...