Author: Peng Liu
Publication Overview
Publication period start: 2006
Number of co-authors: 33
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Liu,
Peng,
Chetal,
Amit
(2005):
Trust-based secure information sharing between federal government agencies.
In
JASIST - Journal of the American Society for Information Science and Technology,
56
(3)
pp. 283-298.
https://dx.doi.org/10.1002/asi.20117
Bajcsy,
Ruzena,
Benzel,
Terry,
Bishop,
Matt,
Braden,
Robert,
Brodley,
Carla E.,
Fahmy,
Sonia,
Floyd,
Sally,
Hardaker,
W.,
Joseph,
Anthony D.,
Kesidis,
George,
Levitt,
Karl N.,
Lindell,
Robert,
Liu,
Peng,
Miller,
David,
Mundy,
Russ,
Neuman,
Cliford,
Ostrenga,
Ron
(2004):
Cyber defense technology networking and evaluation.
In
Communications of the ACM,
47
(3)
pp. 58-61.
https://dl.acm.org/doi/10.1145/971617.971646
Luo,
Bo,
Lee,
Dongwon,
Lee,
Wang-Chien,
Liu,
Peng
(2004):
QFilter: fine-grained run-time XML access control via NFA-based query rewriting.
In:
Grossman,
David A.,
Gravano,
Luis,
Zhai,
Chengxiang,
Herzog,
Otthein,
Evans,
David A.
(eds.)
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management
November 8-13,
2004,
Washington, DC, USA.
pp. 543-552.
https://doi.acm.org/10.1145/1031171.1031273
Tan,
Qingzhao,
Lee,
Wang-Chien,
Zheng,
Baihua,
Liu,
Peng,
Lee,
Dik Lun
(2005):
Balancing performance and confidentiality in air index.
In:
Herzog,
Otthein,
Schek,
Hans-Jorg,
Fuhr,
Norbert
(eds.)
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management
October 31 - November 5,
2005,
Bremen, Germany.
pp. 800-807.
https://doi.acm.org/10.1145/1099554.1099743
Bai,
Kun,
Liu,
Peng
(2008):
A light weighted damage tracking quarantine and recovery scheme for mission-critical datab.
In:
Shanahan,
James G.,
Amer-Yahia,
Sihem,
Manolescu,
Ioana,
Zhang,
Yi,
Evans,
David A.,
Kolcz,
Aleksander,
Choi,
Key-Sun,
Chowdhury,
Abdur
(eds.)
Proceedings of the 17th ACM Conference on Information and Knowledge Management - CIKM 2008
October 26-30,
2008,
Napa Valley, California, USA.
pp. 1403-1404.
https://doi.acm.org/10.1145/1458082.1458302
Liu,
Peng,
Chen,
Zhong
(2004):
An Access Control Model for Web Services in Business Process.
In:
2004 IEEE/WIC/ACM International Conference on Web Intelligence WI 2004
20-24 September,
2004,
Beijing, China.
pp. 292-298.
https://doi.ieeecomputersociety.org/10.1109/WI.2004.20
Liu,
Peng,
Hu,
Jian-bin,
Chen,
Zhong
(2005):
A Formal Language for Access Control Policies in Distributed Environment.
In:
Skowron,
Andrzej,
Agrawal,
Rakesh,
Luck,
Michael,
Yamaguchi,
Takahira,
Morizet-Mahoudeaux,
Pierre,
Liu,
Jiming,
Zhong,
Ning
(eds.)
2005 IEEE / WIC / ACM International Conference on Web Intelligence WI 2005
19-22 September,
2005,
Compiegne, France.
pp. 766-769.
https://doi.ieeecomputersociety.org/10.1109/WI.2005.2
Liu,
Peng,
Soong,
Frank K.
(2006):
Word graph based speech rcognition error correction by handwriting input.
In:
Quek,
Francis K. H.,
Yang,
Jie,
Massaro,
Dominic W.,
Alwan,
Abeer A.,
Hazen,
Timothy J.
(eds.)
Proceedings of the 8th International Conference on Multimodal Interfaces - ICMI 2006
November 2-4,
2006,
Banff, Alberta, Canada.
pp. 339-346.
https://doi.acm.org/10.1145/1180995.1181059
Li,
Fengjun,
Luo,
Bo,
Liu,
Peng,
Lee,
Dongwon,
Mitra,
Prasenjit,
Lee,
Wang-Chien,
Chu,
Chao-Hsien
(2006):
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerag.
In:
SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
5-7 June,
2006,
Taichung, Taiwan.
pp. 252-259.
https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.80
Wang,
Xinran,
Jhi,
Yoon-chan,
Zhu,
Sencun,
Liu,
Peng
(2008):
Protecting web services from remote exploit code: a static analysis approach.
In:
Proceedings of the 2008 International Conference on the World Wide Web
,
2008,
.
pp. 1139-1140.
https://doi.acm.org/10.1145/1367497.1367695
Liu,
Peng,
Soong,
Frank K.
(2006):
Word graph based speech recognition error correction by handwriting input.
In:
Proceedings of the 2006 International Conference on Multimodal Interfaces
,
2006,
.
pp. 339-346.
https://doi.acm.org/10.1145/1180995.1181059