Peng Ning
Affiliations: | North Carolina State University, Raleigh, NC |
Area:
Computer ScienceGoogle:
"Peng Ning"Children
Sign in to add traineePai Peng | grad student | 2006 | NCSU |
Dingbang Xu | grad student | 2006 | NCSU |
Yan Zhai | grad student | 2006 | NCSU |
Chongkyung Kil | grad student | 2008 | NCSU |
An Liu | grad student | 2010 | NCSU |
Sangwon Hyun | grad student | 2011 | NCSU |
Ahmed M. Azab | grad student | 2012 | NCSU |
Yao Liu | grad student | 2012 | NCSU |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
He X, Dai H, Ning P, et al. (2017) A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks Ieee Journal On Selected Areas in Communications. 35: 615-627 |
Hyun S, Sun K, Ning P. (2017) FEC-Seluge Computer Communications. 104: 191-203 |
He X, Dai H, Shen W, et al. (2016) Toward Proper Guard Zones for Link Signature Ieee Transactions On Wireless Communications. 15: 2104-2117 |
Wang Q, Ren K, Ning P, et al. (2016) Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344 |
He X, Dai H, Ning P. (2016) Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry Ieee Transactions On Signal Processing. 64: 3429-3443 |
Fang S, Liu Y, Ning P. (2016) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Ieee Transactions On Information Forensics and Security. 11: 1515-1527 |
Fang S, Liu Y, Ning P. (2016) Wireless Communications under Broadband Reactive Jamming Attacks Ieee Transactions On Dependable and Secure Computing. 13: 394-408 |
Zhang Y, Yang M, Yang Z, et al. (2014) Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842 |
Ren K, Samarati P, Gruteser M, et al. (2014) Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371 |
Dong Q, Liu D, Ning P. (2013) Providing DoS resistance for signature-based broadcast authentication in sensor networks Acm Transactions in Embedded Computing Systems. 12: 73 |