Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Shuchismita Sarkar
Clayton D. Scott
Danilo Orlando
muljowidodo kartidjo
Duzgun, H.Sebnem
Jean Jourdan
Roland Zumkeller
Maximilian Dürr
Philippe Maurine
Dan Graur
Home
/
Author
/
PENG LIU
Author Info
Open Visualization
Name
Affiliation
Papers
PENG LIU
The School of Information Science and Technology, Pennsylvania State University, University Park, 16802 PA
333
Collaborators
Citations
PageRank
708
1701
171.49
Referers
Referees
References
3951
5476
3412
Search Limit
100
1000
Publications (100 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Feature-filter: Detecting adversarial examples by filtering out recessive features
0
0.34
2022
Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture
1
0.37
2022
Using honeypots to model botnet attacks on the internet of medical things
0
0.34
2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach
0
0.34
2022
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation
0
0.34
2022
An End-to-End Macaque Voiceprint Verification Method Based on Channel Fusion Mechanism
0
0.34
2022
General Frame-Wise Steganalysis of Compressed Speech Based on Dual-Domain Representation and Intra-Frame Correlation Leaching
0
0.34
2022
Fast algorithms for restoring survivable spanning connection
0
0.34
2022
Securing Smart Home IoT Systems with Attribute-Based Access Control
0
0.34
2022
Synchronization Analysis of Multi-Order Fractional Neural Networks Via Continuous and Quantized Controls
0
0.34
2022
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks
0
0.34
2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis
1
0.37
2021
Exploiting Security Dependence for Conditional Speculation against Spectre Attacks
0
0.34
2021
Joint Offloading And Energy Harvesting Design In Multiple Time Blocks For Fdma Based Wireless Powered Mec
1
0.34
2021
PID Control for Synchronization of Complex Dynamical Networks With Directed Topologies
3
0.36
2021
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs
0
0.34
2021
Position Paper: Gpt Conjecture: Understanding The Trade-Offs Between Granularity, Performance And Timeliness In Control-Flow Integrity
0
0.34
2021
EEJE: Two-Step Input Transformation for Robust DNN against Adversarial Examples
0
0.34
2021
Mountain Rainfall Estimation and BIM Technology Site Safety Management Based on Internet of Things
0
0.34
2021
GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.
0
0.34
2020
Face Anti-Spoofing Based On Dynamic Color Texture Analysis Using Local Directional Number Pattern
0
0.34
2020
Flat Random Forest: A New Ensemble Learning Method Towards Better Training Efficiency And Adaptive Model Size To Deep Forest
1
0.35
2020
REFUGE Challenge: A unified framework for evaluating automated methods for glaucoma assessment from fundus photographs.
15
0.82
2020
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN
0
0.34
2020
Detecting stabbing by a deep learning method from surveillance videos
0
0.34
2019
Software-Defined Radar Systems for Polar Ice-Sheet Research
0
0.34
2019
Adaptive Measurements Using One Elastic Sketch
2
0.37
2019
MimosaFTL - Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
0
0.34
2019
Spark-Based Parallel Genetic Algorithm for Simulating a Solution of Optimal Deployment of an Underwater Sensor Network.
0
0.34
2019
A Generic Technique for Sketches to Adapt to Different Counting Ranges
0
0.34
2019
Unsupervised multi-stage attack detection framework without details on single-stage attacks
0
0.34
2019
3D Convolutional Neural Networks Fusion Model for Lung Nodule Detection onClinical CT Scans.
0
0.34
2018
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
0
0.34
2018
Multistability of Recurrent Neural Networks With Nonmonotonic Activation Functions and Unbounded Time-Varying Delays.
6
0.42
2018
Elastic sketch: adaptive and fast network-wide measurements.
45
1.09
2018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
0
0.34
2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
2
0.41
2018
Analysis of Incremental Exponential Stability for Switched Nonlinear Systems.
0
0.34
2018
Neural Network Evolution Using Expedited Genetic Algorithm for Medical Image Denoising.
1
0.34
2018
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
0
0.34
2018
IQ Imbalance Compensation Based on Cordic Algorithm in VLC-OFDM System
0
0.34
2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
0
0.34
2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
0
0.34
2018
Learning Pixel-Distribution Prior with Wider Convolution for Image Denoising.
2
0.37
2017
Complete stability of delayed recurrent neural networks with Gaussian activation functions.
13
0.54
2017
Performance Analysis of Two Cooperative Multicast Schemes in Cellular Networks.
0
0.34
2017
Raman Plus X: Biomedical Applications of Multimodal Raman Spectroscopy.
0
0.34
2017
Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style.
3
0.38
2017
Adaptive Enhancement of X-Band Marine Radar Imagery to Detect Oil Spill Segments.
0
0.34
2017
Multistability of Delayed Recurrent Neural Networks with Mexican Hat Activation Functions.
5
0.39
2017
1
2
50 / page