Peng Ning
Affiliations:- Samsung Research American, Mountain View, CA, USA
- North Carolina State University, Department of Computer Science, Raleigh, NC, USA
According to our database1,
Peng Ning
authored at least 168 papers
between 2000 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Access, 2023
2022
Achieving Smooth Motion for Piezoelectric Stick-Slip Actuator With the Inertial Block Structure.
IEEE Trans. Ind. Electron., 2022
2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks.
IEEE J. Sel. Areas Commun., 2017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Comput. Commun., 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry.
IEEE Trans. Signal Process., 2016
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Dependable Secur. Comput., 2016
IEEE Signal Process. Lett., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Improving learning and adaptation in security games by exploiting information asymmetry.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Internet Things J., 2014
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check.
IEEE Trans. Wirel. Commun., 2013
Providing DoS resistance for signature-based broadcast authentication in sensor networks.
ACM Trans. Embed. Comput. Syst., 2013
IEEE J. Sel. Areas Commun., 2013
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Wirel. Commun. Lett., 2012
Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks.
IEEE Trans. Signal Process., 2012
Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Comput. Networks, 2012
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks.
Ad Hoc Networks, 2012
Ad Hoc Networks, 2012
On the Accurate Identification of Network Service Dependencies in Distributed Systems.
Proceedings of the Strategies, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Smart Grid, 2011
ACM Trans. Inf. Syst. Secur., 2011
IEEE J. Sel. Areas Commun., 2011
Comput. Commun., 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks.
Proceedings of the Global Communications Conference, 2011
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks.
Proceedings of the Global Communications Conference, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
ACM Trans. Sens. Networks, 2008
ACM Trans. Sens. Networks, 2008
ACM Trans. Inf. Syst. Secur., 2008
ACM Trans. Inf. Syst. Secur., 2008
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
ACM Trans. Sens. Networks, 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Advances in Information Security 28, Springer, ISBN: 978-0-387-32723-5, 2007
2006
IEEE J. Sel. Areas Commun., 2006
J. Parallel Distributed Comput., 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
ACM Trans. Sens. Networks, 2005
ACM Trans. Inf. Syst. Secur., 2005
IEEE Trans. Dependable Secur. Comput., 2005
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the Handbook of Sensor Networks: Algorithms and Architectures, 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
ACM Trans. Inf. Syst. Secur., 2004
ACM Trans. Embed. Comput. Syst., 2004
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
Proceedings of the Network and Distributed System Security Symposium, 2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Advances in Information Security 9, Springer, 2003
2002
Design and implementation of a decentralized prototype system for detecting distributed attacks.
Comput. Commun., 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
ACM Trans. Inf. Syst. Secur., 2001
Decis. Support Syst., 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Comput. Commun., 2000
CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000