Peng Ning

According to our database1, Peng Ning authored at least 167 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Learning Binary Representation for Automatic Patch Detection.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2017
Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks.
IEEE Journal on Selected Areas in Communications, 2017

FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Computer Communications, 2017

Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Toward Proper Guard Zones for Link Signature.
IEEE Trans. Wireless Communications, 2016

Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2016

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry.
IEEE Trans. Signal Processing, 2016

Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.
IEEE Trans. Information Forensics and Security, 2016

Wireless Communications under Broadband Reactive Jamming Attacks.
IEEE Trans. Dependable Sec. Comput., 2016

Zero-determinant Strategies for Multi-player Multi-action Iterated Games.
IEEE Signal Process. Lett., 2016

SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

Cost-efficient and attack-resilient approaches for state estimation in power grids.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

No time to demodulate - fast physical layer verification of friendly jamming.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Improving learning and adaptation in security games by exploiting information asymmetry.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A stochastic multi-channel spectrum access game with incomplete information.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Dynamic Adaptive Anti-Jamming via Controlled Mobility.
IEEE Trans. Wireless Communications, 2014

Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Information Forensics and Security, 2014

Guest Editorial Special Issue on Security for IoT: The State of the Art.
IEEE Internet of Things Journal, 2014

DACSA: A Decoupled Architecture for Cloud Security Analysis.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Securing Hadoop in cloud.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Channel correlation modeling for link signature security assessment.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

The security of link signature: A view from channel models.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Samsung KNOX and Enterprise Mobile Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SEER: practical memory virus scanning as a service.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check.
IEEE Trans. Wireless Communications, 2013

Providing DoS resistance for signature-based broadcast authentication in sensor networks.
ACM Trans. Embedded Comput. Syst., 2013

HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing.
IEEE Journal on Selected Areas in Communications, 2013

MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Program Chair's Message.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Is link signature dependable for wireless security?
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Dynamic adaptive anti-jamming via controlled mobility.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
MAC Design of Uncoordinated FH-Based Collaborative Broadcast.
IEEE Wireless Commun. Letters, 2012

Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks.
IEEE Trans. Signal Processing, 2012

Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
TOSN, 2012

BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012

Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping.
IEEE Trans. Information Forensics and Security, 2012

Interval-based flow watermarking for tracing interactive traffic.
Computer Networks, 2012

Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks.
Ad Hoc Networks, 2012

MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks.
Ad Hoc Networks, 2012

On the Accurate Identification of Network Service Dependencies in Distributed Systems.
Proceedings of the Strategies, 2012

A Byzantine attack defender: The Conditional Frequency Check.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Secure distributed control in unreliable D-NCS.
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

NSDMiner: Automated discovery of Network Service Dependencies.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Enhanced wireless channel authentication using time-synched link signature.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

BitTrickle: Defending against broadband and high-power reactive jamming attacks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012

Detecting repackaged smartphone applications in third-party android marketplaces.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

iHTTP: Efficient Authentication of Non-confidential HTTP Traffic.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Secure Time Synchronization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Code Dissemination in Wireless Sensor Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid.
IEEE Trans. Smart Grid, 2011

False data injection attacks against state estimation in electric power grids.
ACM Trans. Inf. Syst. Secur., 2011

P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks.
IEEE Journal on Selected Areas in Communications, 2011

SeCA: A framework for Secure Channel Assignment in wireless mesh networks.
Computer Communications, 2011

On the Expressiveness of Return-into-libc Attacks.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Mitigating Wireless Jamming Attacks via Channel Migration.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks.
Proceedings of the Global Communications Conference, 2011

Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks.
Proceedings of the Global Communications Conference, 2011

Poster: mimicry attacks against wireless link signature.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Automated Software Vulnerability Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Always up-to-date: scalable offline patching of VM images in a compute cloud.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks.
TOSN, 2009

Securing network access in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Managing security of virtual machine images in a cloud environment.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Countering kernel rootkits with lightweight hook protection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

False data injection attacks against state estimation in electric power grids.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

HIMA: A Hypervisor-Based Integrity Measurement Agent.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.
TOSN, 2008

Group-based key predistribution for wireless sensor networks.
TOSN, 2008

A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Secure and Resilient Localization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
TOSN, 2007

Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Containing denial-of-service attacks in broadcast authentication in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Tracing Traffic through Intermediate Hosts that Repacketize Flows.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Analyzing network traffic to detect self-decrypting exploit code.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A k-anonymous communication protocol for overlay networks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Automated Security Debugging Using Program Structural Constraints.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Security for Wireless Sensor Networks
Advances in Information Security 28, Springer, ISBN: 978-0-387-32723-5, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2006

LAD: Localization anomaly detection for wireless sensor networks.
J. Parallel Distrib. Comput., 2006

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

A Framework for Identifying Compromised Nodes in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A Flexible Approach to Intrusion Alert Anonymization and Correlation.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
Proceedings of the Intelligence and Security Informatics, 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Improving key predistribution with deployment knowledge in static sensor networks.
TOSN, 2005

Establishing pairwise keys in distributed sensor networks.
ACM Trans. Inf. Syst. Secur., 2005

Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2005

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005

Group-based key pre-distribution in wireless sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Secure Address Auto-con.guration for Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Practical Broadcast Authentication in Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

An efficient scheme for authenticating public keys in sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Attack-resistant location estimation in sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

LAD: Localization Anomaly Detection forWireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A beacon-less location discovery scheme for wireless sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Network Access Control for Mobile Ad-Hoc Networks.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Defending against Sybil Attacks in Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Automatic diagnosis and response to memory corruption vulnerabilities.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Broadcast Authentication and Key Management for Secure Sensor Networks.
Proceedings of the Handbook of Sensor Networks: Algorithms and Architectures, 2005

2004
Hypothesizing and reasoning about attacks missed by intrusion detection systems.
ACM Trans. Inf. Syst. Secur., 2004

Techniques and tools for analyzing intrusion alerts.
ACM Trans. Inf. Syst. Secur., 2004

Multilevel µTESLA: Broadcast authentication for distributed sensor networks.
ACM Trans. Embedded Comput. Syst., 2004

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
Proceedings of the Network and Distributed System Security Symposium, 2004

Storage-Efficient Stateless Group Key Revocation.
Proceedings of the Information Security, 7th International Conference, 2004

Certificate Recommendations to Improve the Robustness of Web of Trust.
Proceedings of the Information Security, 7th International Conference, 2004

Improving Robustness of PGP Keyrings by Conflict Detection.
Proceedings of the Topics in Cryptology, 2004

Reasoning About Complementary Intrusion Evidence.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Alert Correlation through Triggering Events and Common Resources.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003

Location-based pairwise key establishments for static sensor networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
Proceedings of the Network and Distributed System Security Symposium, 2003

How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003

Adapting Query Optimization Techniques for Efficient Alert Correlation.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Learning attack strategies from intrusion alerts.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Establishing pairwise keys in distributed sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach
Advances in Information Security 9, Springer, 2003

2002
Design and implementation of a decentralized prototype system for detecting distributed attacks.
Computer Communications, 2002

An Algebraic Representation of Calendars.
Ann. Math. Artif. Intell., 2002

Analyzing Intensive Intrusion Alerts via Correlation.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Constructing attack scenarios through correlation of intrusion alerts.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Abstraction-based intrusion detection in distributed environments.
ACM Trans. Inf. Syst. Secur., 2001

Avoiding loss of fairness owing to failures in fair data exchange systems.
Decision Support Systems, 2001

Discovering Calendar-based Temporal Association Rules.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Modeling requests among cooperating intrusion detection systems.
Computer Communications, 2000

CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000


  Loading...