Peng Ning - Publications

Affiliations: 
North Carolina State University, Raleigh, NC 
Area:
Computer Science

49 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 He X, Dai H, Ning P, Dutta R. A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks Ieee Journal On Selected Areas in Communications. 35: 615-627. DOI: 10.1109/Jsac.2017.2659581  0.327
2017 Hyun S, Sun K, Ning P. FEC-Seluge Computer Communications. 104: 191-203. DOI: 10.1016/J.Comcom.2017.01.005  0.409
2016 He X, Dai H, Shen W, Ning P, Dutta R. Toward Proper Guard Zones for Link Signature Ieee Transactions On Wireless Communications. 15: 2104-2117. DOI: 10.1109/Twc.2015.2498621  0.378
2016 Wang Q, Ren K, Ning P, Hu S. Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344. DOI: 10.1109/Tvt.2015.2511071  0.378
2016 He X, Dai H, Ning P. Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry Ieee Transactions On Signal Processing. 64: 3429-3443. DOI: 10.1109/Tsp.2016.2548987  0.314
2016 Fang S, Liu Y, Ning P. Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Ieee Transactions On Information Forensics and Security. 11: 1515-1527. DOI: 10.1109/Tifs.2016.2541307  0.489
2016 Fang S, Liu Y, Ning P. Wireless Communications under Broadband Reactive Jamming Attacks Ieee Transactions On Dependable and Secure Computing. 13: 394-408. DOI: 10.1109/Tdsc.2015.2399304  0.418
2014 Zhang Y, Yang M, Yang Z, Gu G, Ning P, Zang B. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842. DOI: 10.1109/Tifs.2014.2347206  0.337
2014 Ren K, Samarati P, Gruteser M, Ning P, Liu Y. Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371. DOI: 10.1109/Jiot.2014.2361608  0.404
2013 Dong Q, Liu D, Ning P. Providing DoS resistance for signature-based broadcast authentication in sensor networks Acm Transactions in Embedded Computing Systems. 12: 73. DOI: 10.1145/2442116.2442123  0.43
2013 He X, Dai H, Ning P. A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check Ieee Transactions On Wireless Communications. 12: 2512-2523. DOI: 10.1109/Twc.2013.031313.121551  0.367
2013 He X, Dai H, Ning P. HMM-based malicious user detection for robust collaborative spectrum sensing Ieee Journal On Selected Areas in Communications. 31: 2196-2208. DOI: 10.1109/Jsac.2013.131119  0.345
2012 Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems Acm Transactions On Information and System Security. 15. DOI: 10.1145/2240276.2240280  0.403
2012 Xiong K, Wang R, Du W, Ning P. Containing bogus packet insertion attacks for broadcast authentication in sensor networks Acm Transactions On Sensor Networks. 8. DOI: 10.1145/2240092.2240094  0.426
2012 Xiao L, Dai H, Ning P. MAC Design of Uncoordinated FH-Based Collaborative Broadcast Ieee Wireless Communications Letters. 1: 261-264. DOI: 10.1109/Wcl.2012.041012.120162  0.395
2012 Li C, Dai H, Xiao L, Ning P. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks Ieee Transactions On Signal Processing. 60: 5281-5292. DOI: 10.1109/Tsp.2012.2206589  0.338
2012 Xiao L, Dai H, Ning P. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping Ieee Transactions On Information Forensics and Security. 7: 297-309. DOI: 10.1109/Tifs.2011.2165948  0.388
2012 Liu Y, Ning P. Enhanced wireless channel authentication using time-synched link signature Proceedings - Ieee Infocom. 2636-2640. DOI: 10.1109/INFCOM.2012.6195669  0.303
2012 Pyun YJ, Park Y, Reeves DS, Wang X, Ning P. Interval-based flow watermarking for tracing interactive traffic Computer Networks. 56: 1646-1665. DOI: 10.1016/J.Comnet.2012.01.017  0.323
2012 Yavuz AA, Ning P. Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks Ad Hoc Networks. 10: 1204-1220. DOI: 10.1016/j.adhoc.2012.03.006  0.336
2011 Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids Acm Transactions On Information and System Security. 14: 13. DOI: 10.1145/1952982.1952995  0.444
2011 Qi H, Wang X, Tolbert LM, Li F, Peng FZ, Ning P, Amin M. A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid Ieee Transactions On Smart Grid. 2: 770-781. DOI: 10.1109/Tsg.2011.2159819  0.343
2011 Zhou T, Choudhury RR, Ning P, Chakrabarty K. P2DAP - Sybil attacks detection in vehicular ad hoc networks Ieee Journal On Selected Areas in Communications. 29: 582-594. DOI: 10.1109/Jsac.2011.110308  0.434
2011 Kim M, Ning P. SeCA: A framework for secure channel assignment in wireless mesh networks Computer Communications. 34: 567-576. DOI: 10.1016/J.Comcom.2010.05.008  0.348
2010 Sezer EC, Kil C, Ning P. Automated software vulnerability analysis Advances in Information Security. 46: 201-223. DOI: 10.1007/978-1-4419-0140-8_10  0.663
2009 Yavuz AA, Ning P. Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks 2009 6th Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services, Mobiquitous 2009. DOI: 10.4108/ICST.MOBIQUITOUS2009.6824  0.335
2009 Wang R, Du W, Liu X, Ning P. ShortPK: A short-term public key scheme for broadcast authentication in sensor networks Acm Transactions On Sensor Networks. 6: 9. DOI: 10.1145/1653760.1653769  0.408
2008 Liu D, Ning P, Liu A, Wang C, Du WK. Attack-Resistant Location Estimation in Wireless Sensor Networks Acm Transactions On Information and System Security. 11: 22. DOI: 10.1145/1380564.1380570  0.536
2008 Dong Q, Liu D, Ning P. Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in sensor networks Wisec'08: Proceedings of the 1st Acm Conference On Wireless Network Security. 2-13. DOI: 10.1145/1352533.1352536  0.314
2008 Zhang Q, Yu T, Ning P. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks Acm Transactions On Information and System Security. 11: 12. DOI: 10.1145/1341731.1341733  0.381
2008 Liu D, Ning P, Du W. Group-based key predistribution for wireless sensor networks Acm Transactions On Sensor Networks. 4: 11. DOI: 10.1145/1340771.1340777  0.365
2008 Ning P, Liu A, Du W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks Acm Transactions On Sensor Networks. 4: 1-35. DOI: 10.1145/1325651.1325652  0.568
2008 Xu D, Ning P. Correlation analysis of intrusion alerts Advances in Information Security. 38: 65-92. DOI: 10.1007/978-0-387-77265-3_4  0.349
2007 Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062  0.43
2007 Zhou T, Choudhury RR, Ning P, Chakrabarty K. Privacy-preserving detection of sybil attacks in vehicular ad hoc networks Proceedings of the 4th Annual International Conference On Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2007. DOI: 10.1109/MOBIQ.2007.4451013  0.303
2007 Sun K, Ning P, Wang C. Secure and resilient time synchronization in wireless sensor networks Advances in Information Security. 30: 347-367.  0.3
2006 Peng P, Ning P, Reeves DS. On the secrecy of timing-based active watermarking trace-back techniques Proceedings - Ieee Symposium On Security and Privacy. 2006: 334-348. DOI: 10.1109/SP.2006.28  0.532
2006 Sun K, Ning P, Wang C. Secure and resilient clock synchronization in wireless sensor networks Ieee Journal On Selected Areas in Communications. 24: 395-408. DOI: 10.1109/Jsac.2005.861396  0.419
2005 Liu D, Ning P. Improving key predistribution with deployment knowledge in static sensor networks Acm Transactions On Sensor Networks. 1: 204-239. DOI: 10.1145/1105688.1105691  0.404
2005 Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks Acm Transactions On Information and System Security. 8: 41-77. DOI: 10.1145/1053283.1053287  0.427
2005 Sun K, Ning P, Wang C. Fault-tolerant cluster-wise clock synchronization for wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 2: 177-189. DOI: 10.1109/Tdsc.2005.36  0.381
2005 Wang P, Reeves DS, Ning P. Secure address auto-configuration for mobile ad hoc networks Mobiquitous 2005: Second Annual International Conference On Mobile and Ubiquitous Systems -Networking and Services. 519-521. DOI: 10.1109/MOBIQUITOUS.2005.52  0.313
2004 Ning P, Cui Y, Reeves DS, Xu D. Techniques and tools for analyzing intrusion alerts Acm Transactions On Information and System Security. 7: 274-318. DOI: 10.1145/996943.996947  0.61
2004 Ning P, Xu D. Hypothesizing and reasoning about attacks missed by intrusion detection systems Acm Transactions On Information and System Security. 7: 591-627. DOI: 10.1145/1042031.1042036  0.601
2004 Liu D, Ning P. Multilevel μTESLA: Broadcast authentication for distributed sensor networks Acm Transactions in Embedded Computing Systems. 3: 800-836. DOI: 10.1145/1027794.1027800  0.425
2003 Liu D, Ning P. Establishing pairwise keys in distributed sensor networks Proceedings of the Acm Conference On Computer and Communications Security. 52-61.  0.327
2002 Ning P, Jajodia S, Wang XS. Design and implementation of a decentralized prototype system for detecting distributed attacks Computer Communications. 25: 1374-1391. DOI: 10.1016/S0140-3664(02)00039-7  0.336
2001 Ning P, Jajodia S, Wang XS. Abstraction-based intrusion detection in distributed environments Acm Transactions On Information and System Security. 4: 407-452. DOI: 10.1145/503339.503342  0.371
2000 Ning P, Wang XS, Jajodia S. Modeling requests among cooperating intrusion detection systems Computer Communications. 23: 1702-1715. DOI: 10.1016/S0140-3664(00)00256-5  0.411
Show low-probability matches.