Peng Liu

According to our database1, Peng Liu authored at least 355 papers between 1989 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Investigation of a Fault-Tolerant Control Method for a Multiport Dual-Stator Doubly Salient Electromagnetic Machine Drive.
IEEE Trans. Industrial Electronics, 2019

2018
VideoCoreCluster: Energy-Efficient, Low-Cost, and Hardware-Assisted Video Transcoding System.
Wireless Communications and Mobile Computing, 2018

Multistability of Recurrent Neural Networks With Nonmonotonic Activation Functions and Unbounded Time-Varying Delays.
IEEE Trans. Neural Netw. Learning Syst., 2018

Adaptive Ship Detection for Single-Look Complex SAR Images Based on SVWIE-Noncircularity Decomposition.
Sensors, 2018

Remote Sensing Big Data: Theory, Methods and Applications.
Remote Sensing, 2018

Spectral regression based marginal Fisher analysis dimensionality reduction algorithm.
Neurocomputing, 2018

An efficient controlled LFSR hybrid BIST scheme.
IEICE Electronic Express, 2018

Engine Load Effects on the Energy and Exergy Performance of a Medium Cycle/Organic Rankine Cycle for Exhaust Waste Heat Recovery.
Entropy, 2018

A cyber security data triage operation retrieval system.
Computers & Security, 2018

Dynamic analysis on the calcium oscillation model considering the influences of mitochondria.
Biosystems, 2018

BinQuasi: a peak detection method for ChIP-sequencing data with biological replicates.
Bioinformatics, 2018

A Faster Algorithm for Reducing the Computational Complexity of Convolutional Neural Networks.
Algorithms, 2018

Multi-Branch Deep Residual Network for Single Image Super-Resolution.
Algorithms, 2018

Medshare: A Novel Hybrid Cloud for Medical Resource Sharing Among Autonomous Healthcare Providers.
IEEE Access, 2018

A 95.3% Peak Efficiency, 135NA Quiescent Current Buck-Boost DC-DC Converter with Current-Slope-Based Mode Control.
Proceedings of the 2018 IEEE Symposium on VLSI Circuits, 2018

Elastic sketch: adaptive and fast network-wide measurements.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

EdgeEye: An Edge Service Framework for Real-time Intelligent Video Analytics.
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018

Uniqueness-Driven Saliency Analysis for Automated Lesion Detection with Applications to Retinal Diseases.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Neural Network Evolution Using Expedited Genetic Algorithm for Medical Image Denoising.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Large-Scale Left and Right Eye Classification in Retinal Images.
Proceedings of the Computational Pathology and Ophthalmic Medical Image Analysis, 2018

DeepDisc: Optic Disc Segmentation Based on Atrous Convolution and Spatial Pyramid Pooling.
Proceedings of the Computational Pathology and Ophthalmic Medical Image Analysis, 2018

A Low-power Pyramid Motion Estimation Engine for 4K@30fps Realtime HEVC Video Encoding.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Analysis of Incremental Exponential Stability for Switched Nonlinear Systems.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

SDCNet: Smoothed dense-convolution network for restoring low-dose cerebral CT perfusion.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Accurate per-flow measurement with bloom sketch.
Proceedings of the IEEE INFOCOM 2018, 2018

Development and Performance Analysis of a Fully Functional Return Signal Simulator for HY-2B Scatterometer.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Development and Pre-Launch Test of a Return Signal Simulator for HY-2B Altimeter.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

ID Bloom Filter: Achieving Faster Multi-Set Membership Query in Network Applications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Clinical Valid Pain Database with Biomarker and Visual Information for Pain Level Analysis.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.
Proceedings of the From Database to Cyber Security, 2018

Defect Analysis and Parallel March Test Algorithm for 3D Hybrid CMOS-Memristor Memory.
Proceedings of the 27th IEEE Asian Test Symposium, 2018

Deep Neural Network Based Frame Reconstruction for Optimized Video Coding.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
Performance Analysis of Two Cooperative Multicast Schemes in Cellular Networks.
Wireless Personal Communications, 2017

Multiple Mittag-Leffler Stability of Fractional-Order Recurrent Neural Networks.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2017

The Facile Synthesis of Branch-Trunk Ag Hierarchical Nanostructures and Their Applications for High-Performance H2O2 Electrochemical Sensors.
Sensors, 2017

Adaptive Enhancement of X-Band Marine Radar Imagery to Detect Oil Spill Segments.
Sensors, 2017

Raman Plus X: Biomedical Applications of Multimodal Raman Spectroscopy.
Sensors, 2017

Identifying key performance shaping factors in digital main control rooms of nuclear power plants: A risk-based approach.
Rel. Eng. & Sys. Safety, 2017

Lévy-driven GPS queues with heavy-tailed input.
Queueing Syst., 2017

Complete stability of delayed recurrent neural networks with Gaussian activation functions.
Neural Networks, 2017

Multistability of Delayed Recurrent Neural Networks with Mexican Hat Activation Functions.
Neural Computation, 2017

Altered salience network is related to functional dyspepsia: a structural and functional MRI data fusion study.
Multimedia Tools Appl., 2017

Steganography integrated into linear predictive coding for low bit-rate speech codec.
Multimedia Tools Appl., 2017

Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec.
Multimedia Syst., 2017

Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style.
IS Management, 2017

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing.
International Journal of Software Engineering and Knowledge Engineering, 2017

Distributed multi-robot formation control in switching networks.
Neurocomputing, 2017

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding.
IEICE Transactions, 2017

A direct AC-DC converter integrated with SSHI circuit for piezoelectric energy harvesting.
IEICE Electronic Express, 2017

A novel test data compression approach based on bit reversion.
IEICE Electronic Express, 2017

Reliability evaluation of logic circuits based on transient faults propagation metrics.
IEICE Electronic Express, 2017

Towards Practical Obfuscation of General Circuits.
IACR Cryptology ePrint Archive, 2017

Lightweight Multitenancy at the Network's Extreme Edge.
IEEE Computer, 2017

VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2017

VaultIME: Regaining User Control for Password Managers Through Auto-Correction.
Proceedings of the Security and Privacy in Communication Networks, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

PMViewer: A Crowdsourcing Approach to Fine-Grained Urban PM2.5 Monitoring in China.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Energy Efficient Multimedia Content Broadcasting in a Risky Mobile Social Network with Adversarial Users.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Efficient OpenFlow based Inbound Load Balancing for Enterprise Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Research on marine radar oil spill network monitoring technology.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

The improved design for HY-2B radar altimeter.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Spontaneous thermal facial expression analysis based on trajectory-pooled fisher vector descriptor.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017

GaDei: On Scale-Up Training as a Service for Deep Learning.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017

Randomized Perturbation for Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE International Conference on Big Knowledge, 2017

Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

One Memory Access Sketch: A More Accurate and Faster Sketch for Per-Flow Measurement.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Short term load forecasting based on wavelet decomposition and random forest.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

A Movable Indoor Air Quality Monitoring System.
Proceedings of the 2nd International Conference on Cybernetics, Robotics and Control, 2017

Edge Computing in the Extreme for Sustainability.
Proceedings of the Communication Systems and Networks - 9th International Conference, 2017

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Building a policy simulation platform for future smart grid in China.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Impact of visual and experiential realism on distance perception in VR using a custom video see-through system.
Proceedings of the ACM Symposium on Applied Perception, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Energy Efficient Real-Time Task Scheduling for Embedded Systems with Hybrid Main Memory.
Signal Processing Systems, 2016

Overhearing Protocol Design Exploiting Intercell Interference in Cooperative Green Networks.
IEEE Trans. Vehicular Technology, 2016

Spectral-Efficient Cellular Communications With Coexistent One- and Two-Hop Transmissions.
IEEE Trans. Vehicular Technology, 2016

Multistability of Recurrent Neural Networks With Nonmonotonic Activation Functions and Mixed Time Delays.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2016

Diffusion Model of PEV Charging Load and Its Application on ACE Correction.
IEEE Trans. Smart Grid, 2016

Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.
IEEE Trans. Reliability, 2016

RSS-Based Method for Sensor Localization with Unknown Transmit Power and Uncertainty in Path Loss Exponent.
Sensors, 2016

Multistability analysis of a general class of recurrent neural networks with non-monotonic activation functions and time-varying delays.
Neural Networks, 2016

Regional homogeneity of intrinsic brain activity correlates with auditory-motor processing of vocal pitch errors.
NeuroImage, 2016

Heterogeneous 3-D circuits: Integrating free-space optics with CMOS.
Microelectronics Journal, 2016

A new freeform depth of field controlling method based on focused plenoptic camera.
J. Comput. Meth. in Science and Engineering, 2016

A parallel-SSHI rectifier for ultra-low-voltage piezoelectric vibration energy harvesting.
IEICE Electronic Express, 2016

Obfuscation without Multilinear Maps.
IACR Cryptology ePrint Archive, 2016

Threads and Data Mapping: Affinity Analysis for Traffic Reduction.
Computer Architecture Letters, 2016

Sample size calculation while controlling false discovery rate for differential expression analysis with RNA-sequencing experiments.
BMC Bioinformatics, 2016

A zero-inflated Poisson model for insertion tolerance analysis of genes based on Tn-seq data.
Bioinformatics, 2016

An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Greening the Video Transcoding Service with Low-Cost Hardware Transcoders.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

On the stability for a cable-driven parallel robot while considering the cable sag effects.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

Anonymity-Based Privacy Preserving Network Data Publication.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Comprehensive Survey of Privacy-Preserving in Smart Grid.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Application Driven Network: providing On-Demand Services for Applications.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

PI in the Sky.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

A research on tracing code of culture of food safety traceability based on RFID and improved EPC.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

StraightTaint: decoupled offline symbolic taint analysis.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

A sub-look alignment method for SAR Altimeter.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

The Utility Evaluation of the Astronaut Virtual Training System in Layout Familiarization Training.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Load pattern analysis of key accounts based on two-step clustering.
Proceedings of the 2016 International Conference on Intelligent Information Processing, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Learning cross-lingual information with multilingual BLSTM for speech synthesis of low-resource languages.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Conceptualizing Performance Shaping Factors in Main Control Rooms of Nuclear Power Plants: A Preliminary Study.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2016

Urban land use classification from high-resolution SAR images based on multi-scale Markov Random Field.
Proceedings of the 24th International Conference on Geoinformatics, GeoInformatics 2016, 2016

A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Low-Cost Video Transcoding at the Wireless Edge.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

ParaDrop: Enabling Lightweight Multi-tenancy at the Network's Extreme Edge.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Multimodal Spontaneous Emotion Corpus for Human Behavior Analysis.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

"Helping Others Makes Me Happy": Social Interaction and Integration of People with Disabilities.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016

A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud Environments.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A Context-Aware Method for Top-k Recommendation in Smart TV.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

Lifting Vendor Loyalty Through Trust: Testing the "Chutes and Ladders" Metaphor.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

H-TDMS: A System for Traffic Big Data Management.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

3D Sketch-Based 3D Shape Retrieval.
Proceedings of the 9th Eurographics Workshop on 3D Object Retrieval, 2016

2015
Cyber Insider Mission Detection for Situation Awareness.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Uplink Co-Tier Interference Management in Femtocell Networks With Successive Group Decoding.
IEEE Trans. Wireless Communications, 2015

Graph-Based User Satisfaction-Aware Fair Resource Allocation in OFDMA Femtocell Networks.
IEEE Trans. Vehicular Technology, 2015

Two-Dimensional Resource Pattern Optimization for Interference Avoidance in Heterogeneous Networks.
IEEE Trans. Vehicular Technology, 2015

An Air Index for Spatial Query Processing in Road Networks.
IEEE Trans. Knowl. Data Eng., 2015

HY-2A Radar Altimeter Ultrastable Oscillator Drift Estimation Using Reconstructive Transponder With Its Validation By Multimission Cross Calibration.
IEEE Trans. Geoscience and Remote Sensing, 2015

Structure and evolution of co-authorship network in an interdisciplinary research field.
Scientometrics, 2015

Analysis on evolving model with modular growth of urban roadway network topology structure.
Kybernetes, 2015

An automaton-based index scheme supporting twig queries for on-demand XML data broadcast.
J. Parallel Distrib. Comput., 2015

Smoothed estimator of quantile residual lifetime for right censored data.
J. Systems Science & Complexity, 2015

A study of decision process in MCDM problems with large number of criteria.
ITOR, 2015

Congestion Control for Nonlinear TD-SCDMA Discrete Networks Based on TCP/IP.
iJOE, 2015

Convex optimisation-based joint channel and power allocation scheme for orthogonal frequency division multiple access networks.
IET Communications, 2015

Herd journalism: Investment in novelty and popularity in markets for news.
Information Economics and Policy, 2015

ROI-Based Reversible Data Hiding Scheme for Medical Images with Tamper Detection.
IEICE Transactions, 2015

Logic operation-based DFT method and 1R memristive crossbar March-like test algorithm.
IEICE Electronic Express, 2015

Stackelberg Game Modeling of Pricing for Mobile Virtual Network Operators.
EAI Endorsed Trans. Future Intellig. Educat. Env., 2015

A study on coevolutionary dynamics of knowledge diffusion and social network structure.
Expert Syst. Appl., 2015

Landmark localization on 3D/4D range data using a shape index-based statistical shape model with global and local constraints.
Computer Vision and Image Understanding, 2015

An Information Hiding Approach Based on Integer Transform Coefficient and Virtual Space Encoding for H.264/AVC.
CSSP, 2015

A PAM-4 adaptive analog equalizer with decoupling control loops for 25-Gb/s CMOS serial-link receiver.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

Exploiting multi-band transmission line interconnects to improve the efficiency of cache coherence in multiprocessor system-on-chip.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

Exploiting Transmission Lines on Heterogeneous Networks-on-Chip to Improve the Adaptivity and Efficiency of Cache Coherence.
Proceedings of the 9th International Symposium on Networks-on-Chip, 2015

A DCO-OFDM system employing beneficial clipping method.
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, 2015

The altimeter precision comparison between SAR mode and conventional mode through airborne experiment.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Unmixing low-resolution soil moisture using spectrum downscaling and evapotranspiration.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Advanced A-law employing nonlinear distortion reduction in DCO-OFDM systems.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

A deep recurrent approach for acoustic-to-articulatory inversion.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

An iterative reweighted minimization framework for joint channel and power allocation in the OFDMA system.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Spontaneous facial expression analysis based on temperature changes and head motions.
Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2015

Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

SSDP: A Slot-Sensitive Data Placement Strategy in Cloud Computing.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Learning Similarity Functions for Urban Events Detection by Mining Hotline Phone Records.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

The main lighting direction estimation for the uniform texture images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Air Indexing for On-Demand XML Data Broadcast.
IEEE Trans. Parallel Distrib. Syst., 2014

The Simultaneous Electrochemical Detection of Catechol and Hydroquinone with [Cu(Sal-β-Ala)(3, 5-DMPz)2]/SWCNTs/GCE.
Sensors, 2014

Corrigendum to "Comparison of task complexity measures for emergency operating procedures: Convergent validity and predictive validity" [Reliab. Eng. Syst. Saf. 121(2014) 289-293].
Rel. Eng. & Sys. Safety, 2014

Comparison of task complexity measures for emergency operating procedures: Convergent validity and predictive validity.
Rel. Eng. & Sys. Safety, 2014

Compressive Sensing of Noisy Multispectral Images.
IEEE Geosci. Remote Sensing Lett., 2014

DEAM: Decoupled, Expressive, Area-Efficient Metadata Cache.
J. Comput. Sci. Technol., 2014

OA-Loc: Supporting virtual users in Outdoor assisted Indoor Localization.
JCP, 2014

BP4D-Spontaneous: a high-resolution spontaneous 3D dynamic facial expression database.
Image Vision Comput., 2014

Two-level scheme to maximise the number of guaranteed users in downlink femtocell networks.
IET Communications, 2014

An adaptive neural network A/D converter based on CMOS/memristor hybrid design.
IEICE Electronic Express, 2014

Robust power allocation in two-tier heterogeneous networks.
EURASIP J. Wireless Comm. and Networking, 2014

Model-based clustering for RNA-seq data.
Bioinformatics, 2014

An improved method for computing q-values when the distribution of effect sizes is asymmetric.
Bioinformatics, 2014

Duet: library integrity verification for android applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Sarcasm Detection in Social Media Based on Imbalanced Classification.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

A Personalized Privacy Preserving Method for Publishing Social Network Data.
Proceedings of the Theory and Applications of Models of Computation, 2014

A parking-line detection method based on Edge Direction.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

Energy efficient real-time task scheduling for embedded systems with hybrid main memory.
Proceedings of the 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014

Beyond eICIC-Two-dimensional resource pattern optimization for macro-femto interference avoidance.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Robust confidentiality preserving data delivery in federated coalition networks.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

A DHT-Based Discovery Service for RFID Network.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Some Thoughts About the Future of Intelligent Buildings and Smart Transportation.
Proceedings of the Workshop Proceedings of the 10th International Conference on Intelligent Environments, Shanghai, China, June 30, 2014

System techniques and capabilities of the HY-2A altimeter.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Oil spill detection in SAR images using multiscale normalized cut segmentation.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014

Design and simulation of PDMS-Si machined micro-liquid flow sensor.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

An advanced A-law companding algorithm in VLC-OFDM.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

A system for web page sensitive keywords detection.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

A Hybrid Algorithm for Privacy Preserving Social Network Publication.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Art Critic: Multisignal Vision and Speech Interaction System in a Gaming Context.
IEEE Trans. Cybernetics, 2013

Defending return-oriented programming based on virtualization techniques.
Security and Communication Networks, 2013

Hybrid algorithms for hardware/software partitioning and scheduling on reconfigurable devices.
Mathematical and Computer Modelling, 2013

Handover optimization in business processes via prediction.
Kybernetes, 2013

Ray targeting for optimizing smooth freeform surfaces for LED non-rotational illumination.
Journal of Zhejiang University - Science C, 2013

A new decision support model in multi-criteria decision making with intuitionistic fuzzy sets based on risk preferences and criteria reduction.
JORS, 2013

Efficient Flow Control Scheme in Multimedia Cloud Computing.
JNW, 2013

A Study of Composition/Correction System with Corpus Retrieval Function.
IJDET, 2013

Skyline Monitoring in Wireless Sensor Networks.
IEICE Transactions, 2013

Low power logic BIST with high test effectiveness.
IEICE Electronic Express, 2013

Nonrigid 3D Medical Image Registration and Fusion Based on Deformable Models.
Comp. Math. Methods in Medicine, 2013

Aspect-Specific Polarity-Aware Summarization of Online Reviews.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

A QoS-Based Hybrid Centralized/Distributed Resource Allocation Algorithm in Downlink Femtocell Networks.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Timing Verification Framework for AUTOSAR OS Component Development Based on Real-Time Maude.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Simulation of threshold voltage adjustment by B+ implantation for pMOS-RADFET application.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Algorithm analysis of PHM for sensitive cargo transportation.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

RAS: A Task Scheduling Algorithm Based on Resource Attribute Selection in a Task Scheduling Framework.
Proceedings of the Internet and Distributed Computing Systems, 2013

Multi-agent planning for fleet cooperative air defense decision-making.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Dialog Act classification in Chinese spoken language.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Saliency-guided 3D head pose estimation on 3D expression models.
Proceedings of the 2013 International Conference on Multimodal Interaction, 2013

Linking Algebraic Semantics and Operational Semantics for Web Services Using Maude.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

An Improved Privacy Preserving Algorithm for Publishing Social Network Data.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A high-resolution spontaneous 3D dynamic facial expression database.
Proceedings of the 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2013

Towards Enabling More Effective Locomotion in VR Using a Wheelchair-based Motion Platform.
Proceedings of the Joint Virtual Reality Conference of EGVE, 2013

A New Algorithm to Exploit Superword Level Parallelism.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Normalization of Abbreviations/Acronyms: THCIB at CLEF eHealth 2013 Task 2.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

Combining MetaMap and cTAKES in Disorder Recognition: THCIB at CLEF eHealth Lab 2013 Task 1.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

Linking the Semantics of BPEL Using Maude.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

Building expressive, area-efficient coherence directories.
Proceedings of the 22nd International Conference on Parallel Architectures and Compilation Techniques, 2013

2012
Rational Herding in Microloan Markets.
Management Science, 2012

Optimized design of LED freeform lens for uniform circular illumination.
Journal of Zhejiang University - Science C, 2012

Fault detection of motor's inter-turn short circuit based on BP neural network.
IJMIC, 2012

Towards Dynamic and Scalable High-Speed IP Address Lookup Based on B+ Tree.
IEICE Transactions, 2012

A scan disabling-based BAST scheme for test cost and test power reduction.
IEICE Electronic Express, 2012

Switching activity reduction for scan-based BIST using weighted scan input data.
IEICE Electronic Express, 2012

Using Transmission Lines for Global On-Chip Communication.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012

Formal Modeling and Analysis of the REST Architecture Using CSP.
Proceedings of the Web Services and Formal Methods - 9th International Workshop, 2012

Mechanical Approach to Linking Operational Semantics and Algebraic Semantics for Verilog Using Maude.
Proceedings of the Unifying Theories of Programming, 4th International Symposium, 2012

Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Integrated Heuristic for Hardware/Software Co-design on Reconfigurable Devices.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

The AmphiHex: A novel amphibious robot with transformable leg-flipper composite propulsion mechanism.
Proceedings of the 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012

Secure Provable Data Possession for Object Storage System.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Unsupervised change detection on remote sensing images using non-local information and Markov Random Field Models.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

3D Head Pose Estimation Based on Scene Flow and Generic Head Model.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

Impact of tracking errors on dual diversity structure over the free space optics links.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

New structure of using image sensor communication in smart house with smart grid.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

An Automaton-Based Index Scheme for On-Demand XML Data Broadcast.
Proceedings of the Database Systems for Advanced Applications, 2012

Frequency Selection in ECRT-Based Radio Interferometric Ranging.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A randomized controlled study of emotion and quality of life on mild to moderate insomnia intervened by Chinese Medicine in integrated program.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

2011
Welcome message from the Editor-in-Chief.
EAI Endorsed Trans. Security Safety, 2011

Approaches to Improving Corpus Quality for Statistical Machine Translation.
Int. J. Comput. Proc. Oriental Lang., 2011

A scan disabling-based BAST scheme for test cost reduction.
IEICE Electronic Express, 2011

Damage assessment and repair in attack resilient distributed database systems.
Computer Standards & Interfaces, 2011

IDD Info: A software to manage surveillance data of Iodine Deficiency Disorders.
Computer Methods and Programs in Biomedicine, 2011

Bit error rate performance analysis of optical CDMA time-diversity links over gamma-gamma atmospheric turbulence channels.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Energy-Conserving Fragment Methods for Skewed XML Data Access in Push-Based Broadcast.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A design space exploration of transmission-line links for on-chip interconnect.
Proceedings of the 2011 International Symposium on Low Power Electronics and Design, 2011

A New Perspective on Object Tracking Based on BYY and Five Action Circling.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2011

The Application and Research of a Simulation-Based Line Balancing Method.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Silicon Content and Isothermal Quenching Process' Influence on High Silicon Cast Steel Organization and Performance.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

Toward Understanding the Relationship between Task Complexity and Task Performance.
Proceedings of the Internationalization, Design and Global Development, 2011

Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011

Short-term traffic flow prediction based on rough set and support vector machine.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Analysis on the influence of temperature differences affecting on the stress of thin-walled concrete structure.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Back analysis of non-adiabatic temperature parameters of roller-compacted concrete.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Using eye gaze, head pose, and facial expression for personalized non-player character interaction.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011

A randomized, controlled study of efficacy and safety on mild to moderate insomnia intervened by Chinese medicine in the integrated program.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

2010
Nonlinear statistical approach for 2.5D human face reconstruction.
PhD thesis, 2010

High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain.
Journal of Zhejiang University - Science C, 2010

Recovery of data integrity under multi-tier architectures.
IET Information Security, 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes.
Proceedings of the SMI 2010, 2010

Data selection for statistical machine translation.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

Semi-supervised sparse metric learning using alternating linearization optimization.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

An intra-chip free-space optical interconnect.
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010

Applying Granular Computing theories to system modelling with optimised development process.
Proceedings of the 5th IEEE International Conference on Intelligent Systems, 2010

A load balancing algorithm for homogeneous multiprocessor system.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Optimized control for ball mill powder making.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Approaches to improving corpus quality for statistical machine translation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Voronoi-based aggregate nearest neighbor query processing in road networks.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

2009
Evaluating MAPSec by marking attack graphs.
Wireless Networks, 2009

Tuning On-Air Signatures for Balancing Performance and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2009

A Flexible Flow Sensor System and Its Characteristics for Fluid Mechanics Measurements.
Sensors, 2009

The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications, 2009

Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge Acquisition.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Approach to Selecting Best Development Set for Phrase-Based Statistical Machine Translation.
Proceedings of the 23rd Pacific Asia Conference on Language, Information and Computation, 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

Virtual Reality Based Nuclear Steam Generator Ageing and Life Management Systems.
Proceedings of the Advances in Neural Networks, 2009

A Novel Hybrid Trust Management Framework for MANETs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Cross-lingual speech recognition under runtime resource constraints.
Proceedings of the IEEE International Conference on Acoustics, 2009

Oil Spill Identification in Marine SAR Images Based on Texture Feature and Fuzzy Logic System.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

One colored image based 2.5D human face reconstruction.
Proceedings of the 17th European Signal Processing Conference, 2009

2008
Workflow Mining of More Perspectives of Workflow.
JSEA, 2008

Applying data mining algorithms to inpatient dataset with missing values.
J. Enterprise Inf. Management, 2008

EndSec: An end-to-end message security protocol for mobile telecommunication networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Model of Network Traffic Based on Network Applications and Network Users.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Intelligent Circuit Breaker Forecasting and Prewarning System Research.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Secure and Privacy-Preserving Information Brokering.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Telecommunication Systems, 2007

Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120.
Inf. Process. Manage., 2007

An Objective Trust Management Framework for Mobile Ad Hoc Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

A Design for an Online RSS Reader Based On AJAX.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New BP Neural Network Model Based on the Random Fuzzy Theory.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A PQRM-based PACS System for Advanced Medical Services under Grid Environment.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Database Isolation and Filtering against Data Corruption Attacks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
On-demand public-key management for mobile ad hoc networks.
Wireless Communications and Mobile Computing, 2006

A Restoration Algorithm for Images Contaminated by Impulse Noise.
Journal of Computer Research and Development, 2006

Designing a Quadrupedal Robot Mimicking Cat Locomotion.
Proceedings of the IEEE International Conference on Systems, 2006

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

NLPR translation system for IWSLT 2006 evaluation campaign.
Proceedings of the 2006 International Workshop on Spoken Language Translation, 2006

The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Missing Data Treatment Methods and NBI Model.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

A Unified Strategy of Feature Selection.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005

Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security, 2005

Trust-based secure information sharing between federal government agencies.
JASIST, 2005

RAID-M: A high performance RAID Matrix mass storage.
Science in China Series F: Information Sciences, 2005

A Formal Language for Access Control Policies in Distributed Environment.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

A Taxonomy of Cyber Attacks on 3G Networks.
Proceedings of the Intelligence and Security Informatics, 2005

The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005).
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

Application of Feature Selection for Unsupervised Learning in Prosecutors' Office.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

An architecture and key management approach for maintaining privacy in location based group services.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Balancing performance and confidentiality in air index.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

Defensive Execution of Transactional Processes against Attacks.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

A Quantitative Study of the Effect of Missing Data in Classifiers.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A new frequency synchronization scheme for OFDM.
IEEE Trans. Consumer Electronics, 2004

An Access Control Model for Web Services in Business Process.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Attack Aware Integrity Control in Databases (Invited Abstract).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Comparative Analysis of Data Mining Algorithms for Predicting Inpatient Length of Stay.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay.
Proceedings of the Advances in Neural Networks, 2004

Self-Healing Workflow Systems under Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Voice activity detection using visual information.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

Localized public-key management for mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Computing Pool: A Simplified and Practical Computational Grid Model.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Engineering a Distributed Intrusion Tolerant Database System Using COTS Components.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

ITDB: An Attack Self-Healing Database System Prototype.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Delivering Services with Integrity Guarantees in Survivable Database Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

A High Performance Design and Implementation of the Virtual Interface Architecture.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

Multi-Version Attack Recovery for Workflow System.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Multiphase Damage Confinement System for Databases.
Proceedings of the Research Directions in Data and Applications Security, 2002

Architectures for Intrusion Tolerant Database Systems.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications.
Proceedings of the Database and Application Security XV, 2001

Efficient Damage Assessment and Repair in Resilient Distributed Database Systems.
Proceedings of the Database and Application Security XV, 2001

Cluster Trend: DataSpeaking.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001

DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
FIMD-MPI: A Tool for Injecting Faults into MPI Applications.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1989
Efficient algorithms for resource allocation in distributed and parallel query processing environments.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989


  Loading...