Peng Liu

Publication Statistics

Publication period start
2004
Publication period end
2008
Number of co-authors
33

Co-authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Liu, Peng, Chetal, Amit (2005): Trust-based secure information sharing between federal government agencies. In JASIST - Journal of the American Society for Information Science and Technology, 56 (3) pp. 283-298. http://dx.doi.org/10.1002/asi.20117

Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. http://doi.acm.org/10.1145/971617.971646

Luo, Bo, Lee, Dongwon, Lee, Wang-Chien, Liu, Peng (2004): QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Grossman, David A., Gravano, Luis, Zhai, Chengxiang, Herzog, Otthein, Evans, David A. (eds.) Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management November 8-13, 2004, Washington, DC, USA. pp. 543-552. http://doi.acm.org/10.1145/1031171.1031273

Tan, Qingzhao, Lee, Wang-Chien, Zheng, Baihua, Liu, Peng, Lee, Dik Lun (2005): Balancing performance and confidentiality in air index. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 800-807. http://doi.acm.org/10.1145/1099554.1099743

Bai, Kun, Liu, Peng (2008): A light weighted damage tracking quarantine and recovery scheme for mission-critical datab. In: Shanahan, James G., Amer-Yahia, Sihem, Manolescu, Ioana, Zhang, Yi, Evans, David A., Kolcz, Aleksander, Choi, Key-Sun, Chowdhury, Abdur (eds.) Proceedings of the 17th ACM Conference on Information and Knowledge Management - CIKM 2008 October 26-30, 2008, Napa Valley, California, USA. pp. 1403-1404. http://doi.acm.org/10.1145/1458082.1458302

Liu, Peng, Chen, Zhong (2004): An Access Control Model for Web Services in Business Process. In: 2004 IEEE/WIC/ACM International Conference on Web Intelligence WI 2004 20-24 September, 2004, Beijing, China. pp. 292-298. http://doi.ieeecomputersociety.org/10.1109/WI.2004.20

Liu, Peng, Hu, Jian-bin, Chen, Zhong (2005): A Formal Language for Access Control Policies in Distributed Environment. In: Skowron, Andrzej, Agrawal, Rakesh, Luck, Michael, Yamaguchi, Takahira, Morizet-Mahoudeaux, Pierre, Liu, Jiming, Zhong, Ning (eds.) 2005 IEEE / WIC / ACM International Conference on Web Intelligence WI 2005 19-22 September, 2005, Compiegne, France. pp. 766-769. http://doi.ieeecomputersociety.org/10.1109/WI.2005.2

Liu, Peng, Soong, Frank K. (2006): Word graph based speech rcognition error correction by handwriting input. In: Quek, Francis K. H., Yang, Jie, Massaro, Dominic W., Alwan, Abeer A., Hazen, Timothy J. (eds.) Proceedings of the 8th International Conference on Multimodal Interfaces - ICMI 2006 November 2-4, 2006, Banff, Alberta, Canada. pp. 339-346. http://doi.acm.org/10.1145/1180995.1181059

Li, Fengjun, Luo, Bo, Liu, Peng, Lee, Dongwon, Mitra, Prasenjit, Lee, Wang-Chien, Chu, Chao-Hsien (2006): In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerag. In: SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 5-7 June, 2006, Taichung, Taiwan. pp. 252-259. http://doi.ieeecomputersociety.org/10.1109/SUTC.2006.80

Wang, Xinran, Jhi, Yoon-chan, Zhu, Sencun, Liu, Peng (2008): Protecting web services from remote exploit code: a static analysis approach. In: Proceedings of the 2008 International Conference on the World Wide Web , 2008, . pp. 1139-1140. http://doi.acm.org/10.1145/1367497.1367695

Liu, Peng, Soong, Frank K. (2006): Word graph based speech recognition error correction by handwriting input. In: Proceedings of the 2006 International Conference on Multimodal Interfaces , 2006, . pp. 339-346. http://doi.acm.org/10.1145/1180995.1181059