Author: Peng Liu
Publications
Co-authors
Productive Colleagues
- Dongwon Lee
- Wang-Chien Lee
- Prasenjit Mitra
- 18
- 27
- 34
Publications
Liu, Peng, Chetal, Amit (2005): Trust-based secure information sharing between federal government agencies. In JASIST - Journal of the American Society for Information Science and Technology, 56 (3) pp. 283-298. https://dx.doi.org/10.1002/asi.20117
Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. https://dl.acm.org/doi/10.1145/971617.971646
Luo, Bo, Lee, Dongwon, Lee, Wang-Chien, Liu, Peng (2004): QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Grossman, David A., Gravano, Luis, Zhai, Chengxiang, Herzog, Otthein, Evans, David A. (eds.) Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management November 8-13, 2004, Washington, DC, USA. pp. 543-552. https://doi.acm.org/10.1145/1031171.1031273
Tan, Qingzhao, Lee, Wang-Chien, Zheng, Baihua, Liu, Peng, Lee, Dik Lun (2005): Balancing performance and confidentiality in air index. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 800-807. https://doi.acm.org/10.1145/1099554.1099743
Bai, Kun, Liu, Peng (2008): A light weighted damage tracking quarantine and recovery scheme for mission-critical datab. In: Shanahan, James G., Amer-Yahia, Sihem, Manolescu, Ioana, Zhang, Yi, Evans, David A., Kolcz, Aleksander, Choi, Key-Sun, Chowdhury, Abdur (eds.) Proceedings of the 17th ACM Conference on Information and Knowledge Management - CIKM 2008 October 26-30, 2008, Napa Valley, California, USA. pp. 1403-1404. https://doi.acm.org/10.1145/1458082.1458302
Liu, Peng, Chen, Zhong (2004): An Access Control Model for Web Services in Business Process. In: 2004 IEEE/WIC/ACM International Conference on Web Intelligence WI 2004 20-24 September, 2004, Beijing, China. pp. 292-298. https://doi.ieeecomputersociety.org/10.1109/WI.2004.20
Liu, Peng, Hu, Jian-bin, Chen, Zhong (2005): A Formal Language for Access Control Policies in Distributed Environment. In: Skowron, Andrzej, Agrawal, Rakesh, Luck, Michael, Yamaguchi, Takahira, Morizet-Mahoudeaux, Pierre, Liu, Jiming, Zhong, Ning (eds.) 2005 IEEE / WIC / ACM International Conference on Web Intelligence WI 2005 19-22 September, 2005, Compiegne, France. pp. 766-769. https://doi.ieeecomputersociety.org/10.1109/WI.2005.2
Liu, Peng, Soong, Frank K. (2006): Word graph based speech rcognition error correction by handwriting input. In: Quek, Francis K. H., Yang, Jie, Massaro, Dominic W., Alwan, Abeer A., Hazen, Timothy J. (eds.) Proceedings of the 8th International Conference on Multimodal Interfaces - ICMI 2006 November 2-4, 2006, Banff, Alberta, Canada. pp. 339-346. https://doi.acm.org/10.1145/1180995.1181059
Li, Fengjun, Luo, Bo, Liu, Peng, Lee, Dongwon, Mitra, Prasenjit, Lee, Wang-Chien, Chu, Chao-Hsien (2006): In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerag. In: SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 5-7 June, 2006, Taichung, Taiwan. pp. 252-259. https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.80
Wang, Xinran, Jhi, Yoon-chan, Zhu, Sencun, Liu, Peng (2008): Protecting web services from remote exploit code: a static analysis approach. In: Proceedings of the 2008 International Conference on the World Wide Web , 2008, . pp. 1139-1140. https://doi.acm.org/10.1145/1367497.1367695
Liu, Peng, Soong, Frank K. (2006): Word graph based speech recognition error correction by handwriting input. In: Proceedings of the 2006 International Conference on Multimodal Interfaces , 2006, . pp. 339-346. https://doi.acm.org/10.1145/1180995.1181059