Name
Affiliation
Papers
PENG LIU
The School of Information Science and Technology, Pennsylvania State University, University Park, 16802 PA
333
Collaborators
Citations 
PageRank 
708
1701
171.49
Referers 
Referees 
References 
3951
5476
3412
Search Limit
1001000
Title
Citations
PageRank
Year
Feature-filter: Detecting adversarial examples by filtering out recessive features00.342022
Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture10.372022
Using honeypots to model botnet attacks on the internet of medical things00.342022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach00.342022
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation00.342022
An End-to-End Macaque Voiceprint Verification Method Based on Channel Fusion Mechanism00.342022
General Frame-Wise Steganalysis of Compressed Speech Based on Dual-Domain Representation and Intra-Frame Correlation Leaching00.342022
Fast algorithms for restoring survivable spanning connection00.342022
Securing Smart Home IoT Systems with Attribute-Based Access Control00.342022
Synchronization Analysis of Multi-Order Fractional Neural Networks Via Continuous and Quantized Controls00.342022
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks00.342021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis10.372021
Exploiting Security Dependence for Conditional Speculation against Spectre Attacks00.342021
Joint Offloading And Energy Harvesting Design In Multiple Time Blocks For Fdma Based Wireless Powered Mec10.342021
PID Control for Synchronization of Complex Dynamical Networks With Directed Topologies30.362021
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs00.342021
Position Paper: Gpt Conjecture: Understanding The Trade-Offs Between Granularity, Performance And Timeliness In Control-Flow Integrity00.342021
EEJE: Two-Step Input Transformation for Robust DNN against Adversarial Examples00.342021
Mountain Rainfall Estimation and BIM Technology Site Safety Management Based on Internet of Things00.342021
GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.00.342020
Face Anti-Spoofing Based On Dynamic Color Texture Analysis Using Local Directional Number Pattern00.342020
Flat Random Forest: A New Ensemble Learning Method Towards Better Training Efficiency And Adaptive Model Size To Deep Forest10.352020
REFUGE Challenge: A unified framework for evaluating automated methods for glaucoma assessment from fundus photographs.150.822020
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN00.342020
Detecting stabbing by a deep learning method from surveillance videos00.342019
Software-Defined Radar Systems for Polar Ice-Sheet Research00.342019
Adaptive Measurements Using One Elastic Sketch20.372019
MimosaFTL - Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.00.342019
Spark-Based Parallel Genetic Algorithm for Simulating a Solution of Optimal Deployment of an Underwater Sensor Network.00.342019
A Generic Technique for Sketches to Adapt to Different Counting Ranges00.342019
Unsupervised multi-stage attack detection framework without details on single-stage attacks00.342019
3D Convolutional Neural Networks Fusion Model for Lung Nodule Detection onClinical CT Scans.00.342018
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.00.342018
Multistability of Recurrent Neural Networks With Nonmonotonic Activation Functions and Unbounded Time-Varying Delays.60.422018
Elastic sketch: adaptive and fast network-wide measurements.451.092018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.00.342018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.20.412018
Analysis of Incremental Exponential Stability for Switched Nonlinear Systems.00.342018
Neural Network Evolution Using Expedited Genetic Algorithm for Medical Image Denoising.10.342018
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.00.342018
IQ Imbalance Compensation Based on Cordic Algorithm in VLC-OFDM System00.342018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.00.342018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.00.342018
Learning Pixel-Distribution Prior with Wider Convolution for Image Denoising.20.372017
Complete stability of delayed recurrent neural networks with Gaussian activation functions.130.542017
Performance Analysis of Two Cooperative Multicast Schemes in Cellular Networks.00.342017
Raman Plus X: Biomedical Applications of Multimodal Raman Spectroscopy.00.342017
Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style.30.382017
Adaptive Enhancement of X-Band Marine Radar Imagery to Detect Oil Spill Segments.00.342017
Multistability of Delayed Recurrent Neural Networks with Mexican Hat Activation Functions.50.392017
  • 1
  • 2