Author: Peng Liu

Publications

Publication period start: 2006
Number of co-authors: 33

Co-authors

Number of publications with favourite co-authors
Zhong Chen
2
Frank K. Soong
2
Wang-Chien Lee
3

Productive Colleagues

Most productive colleagues in number of publications
Dongwon Lee
18
Wang-Chien Lee
27
Prasenjit Mitra
34

Publications

Liu, Peng, Chetal, Amit (2005): Trust-based secure information sharing between federal government agencies. In JASIST - Journal of the American Society for Information Science and Technology, 56 (3) pp. 283-298. https://dx.doi.org/10.1002/asi.20117

Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. https://dl.acm.org/doi/10.1145/971617.971646

Luo, Bo, Lee, Dongwon, Lee, Wang-Chien, Liu, Peng (2004): QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Grossman, David A., Gravano, Luis, Zhai, Chengxiang, Herzog, Otthein, Evans, David A. (eds.) Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management November 8-13, 2004, Washington, DC, USA. pp. 543-552. https://doi.acm.org/10.1145/1031171.1031273

Tan, Qingzhao, Lee, Wang-Chien, Zheng, Baihua, Liu, Peng, Lee, Dik Lun (2005): Balancing performance and confidentiality in air index. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 800-807. https://doi.acm.org/10.1145/1099554.1099743

Bai, Kun, Liu, Peng (2008): A light weighted damage tracking quarantine and recovery scheme for mission-critical datab. In: Shanahan, James G., Amer-Yahia, Sihem, Manolescu, Ioana, Zhang, Yi, Evans, David A., Kolcz, Aleksander, Choi, Key-Sun, Chowdhury, Abdur (eds.) Proceedings of the 17th ACM Conference on Information and Knowledge Management - CIKM 2008 October 26-30, 2008, Napa Valley, California, USA. pp. 1403-1404. https://doi.acm.org/10.1145/1458082.1458302

Liu, Peng, Chen, Zhong (2004): An Access Control Model for Web Services in Business Process. In: 2004 IEEE/WIC/ACM International Conference on Web Intelligence WI 2004 20-24 September, 2004, Beijing, China. pp. 292-298. https://doi.ieeecomputersociety.org/10.1109/WI.2004.20

Liu, Peng, Hu, Jian-bin, Chen, Zhong (2005): A Formal Language for Access Control Policies in Distributed Environment. In: Skowron, Andrzej, Agrawal, Rakesh, Luck, Michael, Yamaguchi, Takahira, Morizet-Mahoudeaux, Pierre, Liu, Jiming, Zhong, Ning (eds.) 2005 IEEE / WIC / ACM International Conference on Web Intelligence WI 2005 19-22 September, 2005, Compiegne, France. pp. 766-769. https://doi.ieeecomputersociety.org/10.1109/WI.2005.2

Liu, Peng, Soong, Frank K. (2006): Word graph based speech rcognition error correction by handwriting input. In: Quek, Francis K. H., Yang, Jie, Massaro, Dominic W., Alwan, Abeer A., Hazen, Timothy J. (eds.) Proceedings of the 8th International Conference on Multimodal Interfaces - ICMI 2006 November 2-4, 2006, Banff, Alberta, Canada. pp. 339-346. https://doi.acm.org/10.1145/1180995.1181059

Li, Fengjun, Luo, Bo, Liu, Peng, Lee, Dongwon, Mitra, Prasenjit, Lee, Wang-Chien, Chu, Chao-Hsien (2006): In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerag. In: SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 5-7 June, 2006, Taichung, Taiwan. pp. 252-259. https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.80

Wang, Xinran, Jhi, Yoon-chan, Zhu, Sencun, Liu, Peng (2008): Protecting web services from remote exploit code: a static analysis approach. In: Proceedings of the 2008 International Conference on the World Wide Web , 2008, . pp. 1139-1140. https://doi.acm.org/10.1145/1367497.1367695

Liu, Peng, Soong, Frank K. (2006): Word graph based speech recognition error correction by handwriting input. In: Proceedings of the 2006 International Conference on Multimodal Interfaces , 2006, . pp. 339-346. https://doi.acm.org/10.1145/1180995.1181059

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,569 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,569 designers enjoy our newsletter—sure you don’t want to receive it?