Name
Affiliation
Papers
PENG LIU
Penn State Univ, State Coll, PA 16803 USA
24
Collaborators
Citations 
PageRank 
67
239
15.80
Referers 
Referees 
References 
761
848
307
Search Limit
100848
Title
Citations
PageRank
Year
Explore K-Anycast Information Dissemination In Mobile Opportunistic Networks00.342016
Roi-Based Reversible Data Hiding Scheme For Medical Images With Tamper Detection30.392015
Enable sustainable sensor networks with non-contact charging: efficient deployment of energy hubs00.342015
Oa-Loc: Supporting Virtual Users In Outdoor Assisted Indoor Localization00.342014
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets1053.002014
An advanced A-law companding algorithm in VLC-OFDM10.362014
System techniques and capabilities of the HY-2A altimeter00.342014
Robust confidentiality preserving data delivery in federated coalition networks00.342014
How To Use Experience In Cyber Analysis: An Analytical Reasoning Support System30.442013
Incentive Mechanism for Multiuser Cooperative Relaying in Wireless Ad Hoc Networks: A Resource-Exchange Based Approach70.472013
Skyline Monitoring In Wireless Sensor Networks20.392013
Behavior Decomposition: Aspect-Level Browser Extension Clustering And Its Security Implications10.372013
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model20.442012
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users70.502012
Towards Dynamic And Scalable High-Speed Ip Address Lookup Based On B Plus Tree20.392012
Energy Level Based Transmission Power Control Scheme for Energy Harvesting WSNs.50.522011
A redistribution method to conserve data in isolated energy-harvesting sensor networks.00.342011
Achieving User Cooperation Diversity in TDMA-Based Wireless Networks Using Cooperative Game Theory80.582011
Semantization Improves the Energy Efficiency of Wireless Sensor Networks20.402010
Using Bayesian Networks For Cyber Security Analysis522.082010
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services90.572009
Energy-Efficient Architecture for Embedded Software with Hard Real-Time Requirements in Partial Reconfigurable Systems00.342009
Research on Experimental Platform and Methods for the Course "Interface and Communication”00.342008
Intrusion confinement by isolation in information systems302.191999