What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Peng Liu
Google Scholar
112
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark.
Jun Niu
Xiaoyan Zhu
Moxuan Zeng
Ge Zhang
Qingyang Zhao
Chunhui Huang
Yangming Zhang
Suyu An
Yangzhong Wang
Xinghui Yue
Zhipeng He
Weihao Guo
Kuo Shen
Peng Liu
Lan Zhang
Jianfeng Ma
Yuqing Zhang
2025
conf/ndss
Eclipse Attacks on Monero's Peer-to-Peer Network.
Ruisheng Shi
Zhiyuan Peng
Lina Lan
Yulian Ge
Peng Liu
Qin Wang
Juan Wang
2025
conf/ndss
RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives.
Qihang Zhou
Wenzhuo Cao
Xiaoqi Jia
Peng Liu
Shengzhi Zhang
Jiayun Chen
Shaowen Xu
Zhenyu Song
2025
conf/dsn
To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt.
Zhilong Wang
Neha Nagaraja
Lan Zhang
Hayretdin Bahsi
Pawan Patil
Peng Liu
2024
conf/ndss
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Fannv He
Yan Jia
Jiayu Zhao
Yue Fang
Jice Wang
Mengyue Feng
Peng Liu
Yuqing Zhang
2022
journals/tifs
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata.
Junwei Zhou
Yijia Qian
Qingtian Zou
Peng Liu
Jianwen Xiang
2022
conf/ccs
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Wei Zhou
Lan Zhang
Le Guan
Peng Liu
Yuqing Zhang
2022
conf/ccs
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Shuai Li
Zhemin Yang
Nan Hua
Peng Liu
Xiaohan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Shunfan Zhou
Zhemin Yang
Dan Qiao
Peng Liu
Min Yang
Zhe Wang
Chenggang Wu
2022
conf/sp
Exploit the Last Straw That Breaks Android Systems.
Lei Zhang
Keke Lian
Haoyu Xiao
Zhibo Zhang
Peng Liu
Yuan Zhang
Min Yang
Haixin Duan
2022
conf/iciss
Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Qingtian Zou
Lan Zhang
Anoop Singhal
Xiaoyan Sun
Peng Liu
2021
journals/tifs
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
Zhisheng Hu
Ping Chen
Minghui Zhu
Peng Liu
2021
conf/uss
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
Wei Zhou
Le Guan
Peng Liu
Yuqing Zhang
2021
conf/sp
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Wei Song
Boya Li
Zihan Xue
Zhenzhen Li
Wenhao Wang
Peng Liu
2021
conf/asiaccs
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Lun-Pin Yuan
Peng Liu
Sencun Zhu
2021
conf/asiaccs
Analyzing the Overhead of File Protection by Linux Security Modules.
Wenhui Zhang
Peng Liu
Trent Jaeger
2021
conf/acsac
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Dongliang Fang
Zhanwei Song
Le Guan
Puzhuo Liu
Anni Peng
Kai Cheng
Yaowen Zheng
Peng Liu
Hongsong Zhu
Limin Sun
2020
conf/sp
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Feng Xiao
Jinquan Zhang
Jianwei Huang
Guofei Gu
Dinghao Wu
Peng Liu
2020
conf/icics
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Dongdong Huo
Chao Liu
Xiao Wang
Mingxuan Li
Yu Wang
Yazhe Wang
Peng Liu
Zhen Xu
2020
conf/acsac
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Chen Cao
Le Guan
Jiang Ming
Peng Liu
2019
conf/ccs
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy.
Peng Liu
Yuqing Zhang
2019
conf/uss
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Wei Zhou
Yan Jia
Yao Yao
Lipeng Zhu
Le Guan
Yuhang Mao
Peng Liu
Yuqing Zhang
2019
conf/esorics
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Yao Yao
Wei Zhou
Yan Jia
Lipeng Zhu
Peng Liu
Yuqing Zhang
2019
conf/cns
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks.
SeokHwan Choi
Jin-Myeong Shin
Peng Liu
Yoon-Ho Choi
2019
conf/wisec
Protecting mobile devices from physical memory attacks with targeted encryption.
Le Guan
Chen Cao
Sencun Zhu
Jingqiang Lin
Peng Liu
Yubin Xia
Bo Luo
2018
journals/compsec
A cyber security data triage operation retrieval system.
Chen Zhong
Tao Lin
Peng Liu
John Yen
Kai Chen
2018
journals/tifs
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
Xiaoyan Sun
Jun Dai
Peng Liu
Anoop Singhal
John Yen
2018
conf/dsn
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Pinyao Guo
Hunmin Kim
Nurali Virani
Jun Xu
Minghui Zhu
Peng Liu
2018
conf/acsac
Take It or Leave It: A Survey Study on Operating System Upgrade Practices.
Sadegh Farhang
Jake Weidman
Mohammad Mahdi Kamani
Jens Grossklags
Peng Liu
2018
conf/wisec
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
Lun-Pin Yuan
Peng Liu
Sencun Zhu
2017
conf/ccs
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Shijie Jia
Luning Xia
Bo Chen
Peng Liu
2017
conf/ccs
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Jian Huang
Jun Xu
Xinyu Xing
Peng Liu
Moinuddin K. Qureshi
2017
conf/ccs
IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Theophilus Benson
Peng Liu
Srikanth Sundaresan
Yuqing Zhang
2017
conf/ccs
Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs.
Zhisheng Hu
Minghui Zhu
Peng Liu
2017
conf/uss
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Jun Xu
Dongliang Mu
Xinyu Xing
Peng Liu
Ping Chen
Bing Mao
2017
conf/ndss
WindowGuard: Systematic Protection of GUI Security in Android.
Chuangang Ren
Peng Liu
Sencun Zhu
2017
conf/dsn
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Chen Tian
Yazhe Wang
Peng Liu
Qihui Zhou
Chengyi Zhang
Zhen Xu
2017
conf/dsn
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Ping Chen
Jun Xu
Zhisheng Hu
Xinyu Xing
Minghui Zhu
Bing Mao
Peng Liu
2017
conf/acsac
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Le Guan
Shijie Jia
Bo Chen
Fengwei Zhang
Bo Luo
Jingqiang Lin
Peng Liu
Xinyu Xing
Luning Xia
2016
conf/ccs
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Jun Xu
Dongliang Mu
Ping Chen
Xinyu Xing
Pei Wang
Peng Liu
2016
conf/ccs
Demo: A Symbolic N-Variant System.
Jun Xu
Pinyao Guo
Bo Chen
Robert F. Erbacher
Ping Chen
Peng Liu
2016
conf/ccs
MTD 2016: Third ACM Workshop on Moving Target Defense.
Peng Liu
Cliff Wang
2016
conf/ccs
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Shijie Jia
Luning Xia
Bo Chen
Peng Liu
2016
conf/ccs
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Kai Wang
Yuqing Zhang
Peng Liu
2016
conf/esorics
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Fabo Wang
Yuqing Zhang
Kai Wang
Peng Liu
Wenjie Wang
2016
conf/esorics
A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Qianru Wu
Qixu Liu
Yuqing Zhang
Peng Liu
Guanxing Wen
2016
conf/cns
Towards probabilistic identification of zero-day attack paths.
Xiaoyan Sun
Jun Dai
Peng Liu
Anoop Singhal
John Yen
2016
conf/icics
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Weijuan Zhang
Xiaoqi Jia
Chang Wang
Shengzhi Zhang
Qingjia Huang
Mingsheng Wang
Peng Liu
2016
conf/dsn
Repackage-Proofing Android Apps.
Lannan Luo
Yu Fu
Dinghao Wu
Sencun Zhu
Peng Liu
2016
conf/acsac
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Bo Chen
Shijie Jia
Luning Xia
Peng Liu
2016
conf/sacrypt
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Yuan Zhao
Wuqiong Pan
Jingqiang Lin
Peng Liu
Cong Xue
Fangyu Zheng
2015
conf/ccs
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Heqing Huang
Sencun Zhu
Kai Chen
Peng Liu
2015
conf/ccs
An Empirical Study of Web Vulnerability Discovery Ecosystems.
Mingyi Zhao
Jens Grossklags
Peng Liu
2015
conf/ccs
Discover and Tame Long-running Idling Processes in Enterprise Systems.
Jun Wang
Zhiyun Qian
Zhichun Li
Zhenyu Wu
Junghwan Rhee
Xia Ning
Peng Liu
Guofei Jiang
2015
conf/ccs
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Heqing Huang
Kai Chen
Chuangang Ren
Peng Liu
Sencun Zhu
Dinghao Wu
2015
conf/uss
Towards Discovering and Understanding Task Hijacking in Android.
Chuangang Ren
Yulong Zhang
Hui Xue
Tao Wei
Peng Liu
2015
conf/uss
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Kai Chen
Peng Wang
Yeonjoon Lee
XiaoFeng Wang
Nan Zhang
Heqing Huang
Wei Zou
Peng Liu
2015
conf/uss
TaintPipe: Pipelined Symbolic Taint Analysis.
Jiang Ming
Dinghao Wu
Gaoyao Xiao
Jun Wang
Peng Liu
2015
conf/acns
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming
Zhi Xin
Pengwei Lan
Dinghao Wu
Peng Liu
Bing Mao
2015
conf/esorics
A Practical Approach for Adaptive Data Structure Layout Randomization.
Ping Chen
Jun Xu
Zhiqiang Lin
Dongyan Xu
Bing Mao
Peng Liu
2015
conf/dsn
HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Qiang Zeng
Mingyi Zhao
Peng Liu
2015
conf/dsn
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Jun Wang
Mingyi Zhao
Qiang Zeng
Dinghao Wu
Peng Liu
2015
conf/acsac
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Chen Cao
Neng Gao
Peng Liu
Ji Xiang
2014
conf/ccs
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed.
Minghui Zhu
Zhisheng Hu
Peng Liu
2014
conf/ccs
Comparing Different Moving Target Defense Techniques.
Jun Xu
Pinyao Guo
Mingyi Zhao
Robert F. Erbacher
Minghui Zhu
Peng Liu
2014
conf/iciss
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
George Cybenko
Sushil Jajodia
Michael P. Wellman
Peng Liu
2014
conf/esorics
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Lingchen Zhang
Sachin Shetty
Peng Liu
Jiwu Jing
2014
conf/esorics
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Min Li
Zili Zha
Wanyu Zang
Meng Yu
Peng Liu
Kun Bai
2014
conf/dsn
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Rui Wu
Ping Chen
Peng Liu
Bing Mao
2014
conf/wisec
ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Fangfang Zhang
Heqing Huang
Sencun Zhu
Dinghao Wu
Peng Liu
2014
conf/wisec
Duet: library integrity verification for android applications.
Wenhui Hu
Damien Octeau
Patrick D. McDaniel
Peng Liu
2013
journals/tifs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
Fengjun Li
Bo Luo
Peng Liu
Dongwon Lee
Chao-Hsien Chu
2013
conf/esorics
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Jun Dai
Xiaoyan Sun
Peng Liu
2013
conf/icics
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation.
Eunjung Yoon
Peng Liu
2013
conf/icics
Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Jing Wang
Peng Liu
Limin Liu
Le Guan
Jiwu Jing
2013
conf/acsac
MyCloud: supporting user-configured privacy protection in cloud computing.
Min Li
Wanyu Zang
Kun Bai
Meng Yu
Peng Liu
2012
conf/ccs
Letting applications operate through attacks launched from compromised drivers.
Shengzhi Zhang
Peng Liu
2012
conf/esorics
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Qijun Gu
Kyle Jones
Wanyu Zang
Meng Yu
Peng Liu
2012
conf/ndss
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Donghai Tian
Qiang Zeng
Dinghao Wu
Peng Liu
Changzhen Hu
2011
journals/tifs
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
Shengzhi Zhang
Xiaoqi Jia
Peng Liu
Jiwu Jing
2011
conf/ndss
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Xi Xiong
Donghai Tian
Peng Liu
2011
conf/icics
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Jun Jiang
Xiaoqi Jia
Dengguo Feng
Shengzhi Zhang
Peng Liu
2010
journals/compsec
Worm virulence estimation for the containment of local worm outbreak.
Yoon-Ho Choi
Lunquan Li
Peng Liu
George Kesidis
2010
conf/acisp
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Jun Shao
Min Feng
Bin B. Zhu
Zhenfu Cao
Peng Liu
2010
conf/dsn
Using Bayesian networks for cyber security analysis.
Peng Xie
Jason H. Li
Xinming Ou
Peng Liu
Renato Levy
2010
conf/acsac
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Shengzhi Zhang
Xiaoqi Jia
Peng Liu
Jiwu Jing
2009
conf/ccs
Behavior based software theft detection.
Xinran Wang
Yoon-chan Jhi
Sencun Zhu
Peng Liu
2009
conf/ccs
Availability-sensitive intrusion recovery.
Shengzhi Zhang
Xi Xiong
Xiaoqi Jia
Peng Liu
2009
conf/acsac
Detecting Software Theft via System Call Based Birthmarks.
Xinran Wang
Yoon-chan Jhi
Sencun Zhu
Peng Liu
2009
conf/acsac
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Xi Xiong
Xiaoqi Jia
Peng Liu
2008
conf/ccs
Using virtual machines to do cross-layer damage assessment.
Xiaoqi Jia
Shengzhi Zhang
Jiwu Jing
Peng Liu
2008
conf/esorics
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Kun Bai
Meng Yu
Peng Liu
2008
conf/acsac
STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Xinran Wang
Yoon-chan Jhi
Sencun Zhu
Peng Liu
2007
conf/ccs
Incremental adaptation of XPath access control views.
Padmapriya Ayyagari
Prasenjit Mitra
Dongwon Lee
Peng Liu
Wang-Chien Lee
2007
conf/ccs
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Fengjun Li
Bo Luo
Peng Liu
Dongwon Lee
Chao-Hsien Chu
2007
conf/uss
Evaluation of Collaborative Worm Containments on DETER Testbed.
Lunquan Li
Peng Liu
Yoon-chan Jhi
George Kesidis
2007
conf/esorics
Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Bo Luo
Dongwon Lee
Peng Liu
2007
conf/acsac
Database Isolation and Filtering against Data Corruption Attacks.
Meng Yu
Wanyu Zang
Peng Liu
2006
conf/ccs
Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Prasenjit Mitra
Chi-Chun Pan
Peng Liu
Vijayalakshmi Atluri
2006
conf/uss
SigFree: A Signature-free Buffer Overflow Attack Blocker.
Xinran Wang
Chi-Chun Pan
Peng Liu
Sencun Zhu
2006
conf/sec
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Kameswari Kotapati
Peng Liu
Thomas F. La Porta
2006
conf/esorics
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
Alex Hai Wang
Peng Liu
2006
conf/acsac
Towards Database Firewall: Mining the Damage Spreading Patterns.
Kun Bai
Peng Liu
2005
conf/acsac
Defensive Execution of Transactional Processes against Attacks.
Meng Yu
Wanyu Zang
Peng Liu
2003
conf/ccs
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Peng Liu
Wanyu Zang
2003
conf/ccs
ARECA: a highly attack resilient certification authority.
Jiwu Jing
Peng Liu
Dengguo Feng
Ji Xiang
Neng Gao
Jingqiang Lin
2003
conf/sec
Intrusion Masking for Distributed Atomic Operations.
Meng Yu
Peng Liu
Wanyu Zang
2003
conf/acsac
Multi-Version Attack Recovery for Workflow System.
Meng Yu
Peng Liu
Wanyu Zang
2002
conf/acsac
Architectures for Intrusion Tolerant Database Systems.
Peng Liu
2001
conf/acsac
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications.
Peng Liu
2000
conf/dsn
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Peng Liu
Peng Ning
Sushil Jajodia
1998
conf/acsac
Application-Level Isolation to Cope with Malicious Database Users.
Sushil Jajodia
Peng Liu
Catherine D. McCollum
Coauthors
Alex Hai Wang
(1)
Anni Peng
(1)
Anoop Singhal
(3)
Bin B. Zhu
(1)
Bing Mao
(5)
Bo Chen
(5)
Bo Luo
(5)
Boya Li
(1)
Catherine D. McCollum
(1)
Chang Wang
(1)
Changzhen Hu
(1)
Chao Liu
(1)
Chao-Hsien Chu
(2)
Chen Cao
(3)
Chen Tian
(1)
Chen Zhong
(1)
Chenggang Wu
(1)
Chengyi Zhang
(1)
Chi-Chun Pan
(2)
Chuangang Ren
(3)
Chunhui Huang
(1)
Cliff Wang
(1)
Cong Xue
(1)
Damien Octeau
(1)
Dan Qiao
(1)
Dengguo Feng
(2)
Dinghao Wu
(8)
Dongdong Huo
(1)
Donghai Tian
(2)
Dongliang Fang
(1)
Dongliang Mu
(2)
Dongwon Lee
(4)
Dongyan Xu
(1)
Eunjung Yoon
(1)
Fabo Wang
(1)
Fangfang Zhang
(1)
Fangyu Zheng
(1)
Fannv He
(1)
Feng Xiao
(1)
Fengjun Li
(2)
Fengwei Zhang
(1)
Gaoyao Xiao
(1)
Ge Zhang
(1)
George Cybenko
(1)
George Kesidis
(2)
Guangliang Yang
(1)
Guanxing Wen
(1)
Guofei Gu
(1)
Guofei Jiang
(1)
Haixin Duan
(1)
Haoyu Xiao
(1)
Hayretdin Bahsi
(1)
Heqing Huang
(4)
Hongsong Zhu
(1)
Hui Xue
(1)
Hunmin Kim
(1)
Jake Weidman
(1)
Jason H. Li
(1)
Jens Grossklags
(2)
Ji Xiang
(2)
Jian Huang
(1)
Jianfeng Ma
(1)
Jiang Ming
(3)
Jianwei Huang
(1)
Jianwen Xiang
(1)
Jiayu Zhao
(1)
Jiayun Chen
(1)
Jice Wang
(1)
Jin-Myeong Shin
(1)
Jing Wang
(1)
Jingqiang Lin
(4)
Jinquan Zhang
(1)
Jiwu Jing
(6)
John Yen
(3)
Juan Wang
(1)
Jun Dai
(3)
Jun Jiang
(1)
Jun Niu
(1)
Jun Shao
(1)
Jun Wang
(3)
Jun Xu
(8)
Junghwan Rhee
(1)
Junwei Zhou
(1)
Kai Chen
(4)
Kai Cheng
(1)
Kai Wang
(2)
Kameswari Kotapati
(1)
Keke Lian
(1)
Kun Bai
(4)
Kuo Shen
(1)
Kyle Jones
(1)
Lan Zhang
(4)
Lannan Luo
(1)
Le Guan
(8)
Lei Zhang
(1)
Limin Liu
(1)
Limin Sun
(1)
Lina Lan
(1)
Lingchen Zhang
(1)
Lipeng Zhu
(2)
Lun-Pin Yuan
(2)
Luning Xia
(4)
Lunquan Li
(2)
Meng Yu
(8)
Mengyue Feng
(1)
Michael P. Wellman
(1)
Min Feng
(1)
Min Li
(2)
Min Yang
(3)
Minghui Zhu
(6)
Mingsheng Wang
(1)
Mingxuan Li
(1)
Mingyi Zhao
(4)
Mohammad Mahdi Kamani
(1)
Moinuddin K. Qureshi
(1)
Moxuan Zeng
(1)
Nan Hua
(1)
Nan Zhang
(1)
Neha Nagaraja
(1)
Neng Gao
(2)
Nurali Virani
(1)
Padmapriya Ayyagari
(1)
Patrick D. McDaniel
(1)
Pawan Patil
(1)
Pei Wang
(1)
Peng Liu
(112)
Peng Ning
(1)
Peng Wang
(1)
Peng Xie
(1)
Pengwei Lan
(1)
Ping Chen
(7)
Pinyao Guo
(3)
Prasenjit Mitra
(2)
Puzhuo Liu
(1)
Qiang Zeng
(3)
Qianru Wu
(1)
Qihang Zhou
(1)
Qihui Zhou
(1)
Qijun Gu
(1)
Qin Wang
(1)
Qingjia Huang
(1)
Qingtian Zou
(2)
Qingyang Zhao
(1)
Qixu Liu
(1)
Renato Levy
(1)
Robert F. Erbacher
(2)
Rui Wu
(1)
Ruisheng Shi
(1)
Sachin Shetty
(1)
Sadegh Farhang
(1)
Sencun Zhu
(12)
SeokHwan Choi
(1)
Shaowen Xu
(1)
Shengzhi Zhang
(8)
Shijie Jia
(4)
Shuai Li
(1)
Shunfan Zhou
(1)
Srikanth Sundaresan
(1)
Sushil Jajodia
(3)
Suyu An
(1)
Tao Lin
(1)
Tao Wei
(1)
Theophilus Benson
(1)
Thomas F. La Porta
(1)
Trent Jaeger
(1)
Vijayalakshmi Atluri
(1)
Wang-Chien Lee
(1)
Wanyu Zang
(8)
Wei Song
(1)
Wei Zhou
(4)
Wei Zou
(1)
Weihao Guo
(1)
Weijuan Zhang
(1)
Wenhao Wang
(1)
Wenhui Hu
(1)
Wenhui Zhang
(1)
Wenjie Wang
(1)
Wenzhuo Cao
(1)
Wuqiong Pan
(1)
Xi Xiong
(3)
Xia Ning
(1)
Xiao Wang
(1)
XiaoFeng Wang
(1)
Xiaohan Zhang
(1)
Xiaoqi Jia
(8)
Xiaoyan Sun
(4)
Xiaoyan Zhu
(1)
Xinghui Yue
(1)
Xinming Ou
(1)
Xinran Wang
(4)
Xinyu Xing
(5)
Yan Jia
(3)
Yangming Zhang
(1)
Yangzhong Wang
(1)
Yao Yao
(2)
Yaowen Zheng
(1)
Yazhe Wang
(2)
Yeonjoon Lee
(1)
Yijia Qian
(1)
Yoon-chan Jhi
(4)
Yoon-Ho Choi
(2)
Yu Fu
(1)
Yu Wang
(1)
Yuan Zhang
(1)
Yuan Zhao
(1)
Yubin Xia
(1)
Yue Fang
(1)
Yuhang Mao
(1)
Yulian Ge
(1)
Yulong Zhang
(1)
Yuqing Zhang
(11)
Zhanwei Song
(1)
Zhe Wang
(1)
Zhemin Yang
(2)
Zhen Xu
(2)
Zhenfu Cao
(1)
Zhenyu Song
(1)
Zhenyu Wu
(1)
Zhenzhen Li
(1)
Zhi Xin
(1)
Zhibo Zhang
(1)
Zhichun Li
(1)
Zhilong Wang
(1)
Zhipeng He
(1)
Zhiqiang Lin
(1)
Zhisheng Hu
(4)
Zhiyuan Peng
(1)
Zhiyun Qian
(1)
Zihan Xue
(1)
Zili Zha
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to