Year |
Citation |
Score |
2017 |
He X, Dai H, Ning P, Dutta R. A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks Ieee Journal On Selected Areas in Communications. 35: 615-627. DOI: 10.1109/Jsac.2017.2659581 |
0.327 |
|
2017 |
Hyun S, Sun K, Ning P. FEC-Seluge Computer Communications. 104: 191-203. DOI: 10.1016/J.Comcom.2017.01.005 |
0.409 |
|
2016 |
He X, Dai H, Shen W, Ning P, Dutta R. Toward Proper Guard Zones for Link Signature Ieee Transactions On Wireless Communications. 15: 2104-2117. DOI: 10.1109/Twc.2015.2498621 |
0.378 |
|
2016 |
Wang Q, Ren K, Ning P, Hu S. Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344. DOI: 10.1109/Tvt.2015.2511071 |
0.378 |
|
2016 |
He X, Dai H, Ning P. Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry Ieee Transactions On Signal Processing. 64: 3429-3443. DOI: 10.1109/Tsp.2016.2548987 |
0.314 |
|
2016 |
Fang S, Liu Y, Ning P. Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Ieee Transactions On Information Forensics and Security. 11: 1515-1527. DOI: 10.1109/Tifs.2016.2541307 |
0.489 |
|
2016 |
Fang S, Liu Y, Ning P. Wireless Communications under Broadband Reactive Jamming Attacks Ieee Transactions On Dependable and Secure Computing. 13: 394-408. DOI: 10.1109/Tdsc.2015.2399304 |
0.418 |
|
2014 |
Zhang Y, Yang M, Yang Z, Gu G, Ning P, Zang B. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842. DOI: 10.1109/Tifs.2014.2347206 |
0.337 |
|
2014 |
Ren K, Samarati P, Gruteser M, Ning P, Liu Y. Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371. DOI: 10.1109/Jiot.2014.2361608 |
0.404 |
|
2013 |
Dong Q, Liu D, Ning P. Providing DoS resistance for signature-based broadcast authentication in sensor networks Acm Transactions in Embedded Computing Systems. 12: 73. DOI: 10.1145/2442116.2442123 |
0.43 |
|
2013 |
He X, Dai H, Ning P. A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check Ieee Transactions On Wireless Communications. 12: 2512-2523. DOI: 10.1109/Twc.2013.031313.121551 |
0.367 |
|
2013 |
He X, Dai H, Ning P. HMM-based malicious user detection for robust collaborative spectrum sensing Ieee Journal On Selected Areas in Communications. 31: 2196-2208. DOI: 10.1109/Jsac.2013.131119 |
0.345 |
|
2012 |
Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems Acm Transactions On Information and System Security. 15. DOI: 10.1145/2240276.2240280 |
0.403 |
|
2012 |
Xiong K, Wang R, Du W, Ning P. Containing bogus packet insertion attacks for broadcast authentication in sensor networks Acm Transactions On Sensor Networks. 8. DOI: 10.1145/2240092.2240094 |
0.426 |
|
2012 |
Xiao L, Dai H, Ning P. MAC Design of Uncoordinated FH-Based Collaborative Broadcast Ieee Wireless Communications Letters. 1: 261-264. DOI: 10.1109/Wcl.2012.041012.120162 |
0.395 |
|
2012 |
Li C, Dai H, Xiao L, Ning P. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks Ieee Transactions On Signal Processing. 60: 5281-5292. DOI: 10.1109/Tsp.2012.2206589 |
0.338 |
|
2012 |
Xiao L, Dai H, Ning P. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping Ieee Transactions On Information Forensics and Security. 7: 297-309. DOI: 10.1109/Tifs.2011.2165948 |
0.388 |
|
2012 |
Liu Y, Ning P. Enhanced wireless channel authentication using time-synched link signature Proceedings - Ieee Infocom. 2636-2640. DOI: 10.1109/INFCOM.2012.6195669 |
0.303 |
|
2012 |
Pyun YJ, Park Y, Reeves DS, Wang X, Ning P. Interval-based flow watermarking for tracing interactive traffic Computer Networks. 56: 1646-1665. DOI: 10.1016/J.Comnet.2012.01.017 |
0.323 |
|
2012 |
Yavuz AA, Ning P. Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks Ad Hoc Networks. 10: 1204-1220. DOI: 10.1016/j.adhoc.2012.03.006 |
0.336 |
|
2011 |
Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids Acm Transactions On Information and System Security. 14: 13. DOI: 10.1145/1952982.1952995 |
0.444 |
|
2011 |
Qi H, Wang X, Tolbert LM, Li F, Peng FZ, Ning P, Amin M. A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid Ieee Transactions On Smart Grid. 2: 770-781. DOI: 10.1109/Tsg.2011.2159819 |
0.343 |
|
2011 |
Zhou T, Choudhury RR, Ning P, Chakrabarty K. P2DAP - Sybil attacks detection in vehicular ad hoc networks Ieee Journal On Selected Areas in Communications. 29: 582-594. DOI: 10.1109/Jsac.2011.110308 |
0.434 |
|
2011 |
Kim M, Ning P. SeCA: A framework for secure channel assignment in wireless mesh networks Computer Communications. 34: 567-576. DOI: 10.1016/J.Comcom.2010.05.008 |
0.348 |
|
2010 |
Sezer EC, Kil C, Ning P. Automated software vulnerability analysis Advances in Information Security. 46: 201-223. DOI: 10.1007/978-1-4419-0140-8_10 |
0.663 |
|
2009 |
Yavuz AA, Ning P. Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks 2009 6th Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services, Mobiquitous 2009. DOI: 10.4108/ICST.MOBIQUITOUS2009.6824 |
0.335 |
|
2009 |
Wang R, Du W, Liu X, Ning P. ShortPK: A short-term public key scheme for broadcast authentication in sensor networks Acm Transactions On Sensor Networks. 6: 9. DOI: 10.1145/1653760.1653769 |
0.408 |
|
2008 |
Liu D, Ning P, Liu A, Wang C, Du WK. Attack-Resistant Location Estimation in Wireless Sensor Networks Acm Transactions On Information and System Security. 11: 22. DOI: 10.1145/1380564.1380570 |
0.536 |
|
2008 |
Dong Q, Liu D, Ning P. Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in sensor networks Wisec'08: Proceedings of the 1st Acm Conference On Wireless Network Security. 2-13. DOI: 10.1145/1352533.1352536 |
0.314 |
|
2008 |
Zhang Q, Yu T, Ning P. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks Acm Transactions On Information and System Security. 11: 12. DOI: 10.1145/1341731.1341733 |
0.381 |
|
2008 |
Liu D, Ning P, Du W. Group-based key predistribution for wireless sensor networks Acm Transactions On Sensor Networks. 4: 11. DOI: 10.1145/1340771.1340777 |
0.365 |
|
2008 |
Ning P, Liu A, Du W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks Acm Transactions On Sensor Networks. 4: 1-35. DOI: 10.1145/1325651.1325652 |
0.568 |
|
2008 |
Xu D, Ning P. Correlation analysis of intrusion alerts Advances in Information Security. 38: 65-92. DOI: 10.1007/978-0-387-77265-3_4 |
0.349 |
|
2007 |
Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062 |
0.43 |
|
2007 |
Zhou T, Choudhury RR, Ning P, Chakrabarty K. Privacy-preserving detection of sybil attacks in vehicular ad hoc networks Proceedings of the 4th Annual International Conference On Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2007. DOI: 10.1109/MOBIQ.2007.4451013 |
0.303 |
|
2007 |
Sun K, Ning P, Wang C. Secure and resilient time synchronization in wireless sensor networks Advances in Information Security. 30: 347-367. |
0.3 |
|
2006 |
Peng P, Ning P, Reeves DS. On the secrecy of timing-based active watermarking trace-back techniques Proceedings - Ieee Symposium On Security and Privacy. 2006: 334-348. DOI: 10.1109/SP.2006.28 |
0.532 |
|
2006 |
Sun K, Ning P, Wang C. Secure and resilient clock synchronization in wireless sensor networks Ieee Journal On Selected Areas in Communications. 24: 395-408. DOI: 10.1109/Jsac.2005.861396 |
0.419 |
|
2005 |
Liu D, Ning P. Improving key predistribution with deployment knowledge in static sensor networks Acm Transactions On Sensor Networks. 1: 204-239. DOI: 10.1145/1105688.1105691 |
0.404 |
|
2005 |
Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks Acm Transactions On Information and System Security. 8: 41-77. DOI: 10.1145/1053283.1053287 |
0.427 |
|
2005 |
Sun K, Ning P, Wang C. Fault-tolerant cluster-wise clock synchronization for wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 2: 177-189. DOI: 10.1109/Tdsc.2005.36 |
0.381 |
|
2005 |
Wang P, Reeves DS, Ning P. Secure address auto-configuration for mobile ad hoc networks Mobiquitous 2005: Second Annual International Conference On Mobile and Ubiquitous Systems -Networking and Services. 519-521. DOI: 10.1109/MOBIQUITOUS.2005.52 |
0.313 |
|
2004 |
Ning P, Cui Y, Reeves DS, Xu D. Techniques and tools for analyzing intrusion alerts Acm Transactions On Information and System Security. 7: 274-318. DOI: 10.1145/996943.996947 |
0.61 |
|
2004 |
Ning P, Xu D. Hypothesizing and reasoning about attacks missed by intrusion detection systems Acm Transactions On Information and System Security. 7: 591-627. DOI: 10.1145/1042031.1042036 |
0.601 |
|
2004 |
Liu D, Ning P. Multilevel μTESLA: Broadcast authentication for distributed sensor networks Acm Transactions in Embedded Computing Systems. 3: 800-836. DOI: 10.1145/1027794.1027800 |
0.425 |
|
2003 |
Liu D, Ning P. Establishing pairwise keys in distributed sensor networks Proceedings of the Acm Conference On Computer and Communications Security. 52-61. |
0.327 |
|
2002 |
Ning P, Jajodia S, Wang XS. Design and implementation of a decentralized prototype system for detecting distributed attacks Computer Communications. 25: 1374-1391. DOI: 10.1016/S0140-3664(02)00039-7 |
0.336 |
|
2001 |
Ning P, Jajodia S, Wang XS. Abstraction-based intrusion detection in distributed environments Acm Transactions On Information and System Security. 4: 407-452. DOI: 10.1145/503339.503342 |
0.371 |
|
2000 |
Ning P, Wang XS, Jajodia S. Modeling requests among cooperating intrusion detection systems Computer Communications. 23: 1702-1715. DOI: 10.1016/S0140-3664(00)00256-5 |
0.411 |
|
Show low-probability matches. |