☰

Peng Ning

Affiliations: 
North Carolina State University, Raleigh, NC 
Area:
Computer Science
Google:
"Peng Ning"

Children

Sign in to add trainee
Pai Peng grad student 2006 NCSU
Dingbang Xu grad student 2006 NCSU
Yan Zhai grad student 2006 NCSU
Chongkyung Kil grad student 2008 NCSU
An Liu grad student 2010 NCSU
Sangwon Hyun grad student 2011 NCSU
Ahmed M. Azab grad student 2012 NCSU
Yao Liu grad student 2012 NCSU
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

He X, Dai H, Ning P, et al. (2017) A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks Ieee Journal On Selected Areas in Communications. 35: 615-627
Hyun S, Sun K, Ning P. (2017) FEC-Seluge Computer Communications. 104: 191-203
He X, Dai H, Shen W, et al. (2016) Toward Proper Guard Zones for Link Signature Ieee Transactions On Wireless Communications. 15: 2104-2117
Wang Q, Ren K, Ning P, et al. (2016) Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344
He X, Dai H, Ning P. (2016) Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry Ieee Transactions On Signal Processing. 64: 3429-3443
Fang S, Liu Y, Ning P. (2016) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Ieee Transactions On Information Forensics and Security. 11: 1515-1527
Fang S, Liu Y, Ning P. (2016) Wireless Communications under Broadband Reactive Jamming Attacks Ieee Transactions On Dependable and Secure Computing. 13: 394-408
Zhang Y, Yang M, Yang Z, et al. (2014) Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842
Ren K, Samarati P, Gruteser M, et al. (2014) Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371
Dong Q, Liu D, Ning P. (2013) Providing DoS resistance for signature-based broadcast authentication in sensor networks Acm Transactions in Embedded Computing Systems. 12: 73
See more...