Peng Liu

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
2004
Publication period end
2008
Number of co-authors
33

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Wang, Xinran, Jhi, Yoon-chan, Zhu, Sencun, Liu, Peng (2008): Protecting web services from remote exploit code: a static analysis approach. In: Proceedings of the 2008 International Conference on the World Wide Web , 2008, . pp. 1139-1140. http://doi.acm.org/10.1145/1367497.1367695

Bai, Kun, Liu, Peng (2008): A light weighted damage tracking quarantine and recovery scheme for mission-critical datab. In: Shanahan, James G., Amer-Yahia, Sihem, Manolescu, Ioana, Zhang, Yi, Evans, David A., Kolcz, Aleksander, Choi, Key-Sun, Chowdhury, Abdur (eds.) Proceedings of the 17th ACM Conference on Information and Knowledge Management - CIKM 2008 October 26-30, 2008, Napa Valley, California, USA. pp. 1403-1404. http://doi.acm.org/10.1145/1458082.1458302

Liu, Peng, Soong, Frank K. (2006): Word graph based speech rcognition error correction by handwriting input. In: Quek, Francis K. H., Yang, Jie, Massaro, Dominic W., Alwan, Abeer A., Hazen, Timothy J. (eds.) Proceedings of the 8th International Conference on Multimodal Interfaces - ICMI 2006 November 2-4, 2006, Banff, Alberta, Canada. pp. 339-346. http://doi.acm.org/10.1145/1180995.1181059

Li, Fengjun, Luo, Bo, Liu, Peng, Lee, Dongwon, Mitra, Prasenjit, Lee, Wang-Chien, Chu, Chao-Hsien (2006): In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerag. In: SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 5-7 June, 2006, Taichung, Taiwan. pp. 252-259. http://doi.ieeecomputersociety.org/10.1109/SUTC.2006.80

Liu, Peng, Soong, Frank K. (2006): Word graph based speech recognition error correction by handwriting input. In: Proceedings of the 2006 International Conference on Multimodal Interfaces , 2006, . pp. 339-346. http://doi.acm.org/10.1145/1180995.1181059

Tan, Qingzhao, Lee, Wang-Chien, Zheng, Baihua, Liu, Peng, Lee, Dik Lun (2005): Balancing performance and confidentiality in air index. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 800-807. http://doi.acm.org/10.1145/1099554.1099743

Liu, Peng, Hu, Jian-bin, Chen, Zhong (2005): A Formal Language for Access Control Policies in Distributed Environment. In: Skowron, Andrzej, Agrawal, Rakesh, Luck, Michael, Yamaguchi, Takahira, Morizet-Mahoudeaux, Pierre, Liu, Jiming, Zhong, Ning (eds.) 2005 IEEE / WIC / ACM International Conference on Web Intelligence WI 2005 19-22 September, 2005, Compiegne, France. pp. 766-769. http://doi.ieeecomputersociety.org/10.1109/WI.2005.2

Liu, Peng, Chetal, Amit (2005): Trust-based secure information sharing between federal government agencies. In JASIST - Journal of the American Society for Information Science and Technology, 56 (3) pp. 283-298. http://dx.doi.org/10.1002/asi.20117

Luo, Bo, Lee, Dongwon, Lee, Wang-Chien, Liu, Peng (2004): QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Grossman, David A., Gravano, Luis, Zhai, Chengxiang, Herzog, Otthein, Evans, David A. (eds.) Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management November 8-13, 2004, Washington, DC, USA. pp. 543-552. http://doi.acm.org/10.1145/1031171.1031273

Liu, Peng, Chen, Zhong (2004): An Access Control Model for Web Services in Business Process. In: 2004 IEEE/WIC/ACM International Conference on Web Intelligence WI 2004 20-24 September, 2004, Beijing, China. pp. 292-298. http://doi.ieeecomputersociety.org/10.1109/WI.2004.20

Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. http://doi.acm.org/10.1145/971617.971646