Peng Liu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

118EEMoti Yung, Peng Liu, Dongdai Lin: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Springer 2009
117EEKun Bai, Peng Liu: A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. EDBT 2009: 720-731
116EEMeng Yu, Peng Liu, Wanyu Zang: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications 32(1): 158-183 (2009)
115EEYuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia: A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318
114EEKun Bai, Peng Liu: A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. CIKM 2008: 1403-1404
113EEPeng Liu, Lixin Tang: Two-Agent Scheduling with Linear Deteriorating Jobs on a Single Machine. COCOON 2008: 642-650
112EEKun Bai, Meng Yu, Peng Liu: TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176
111EEXiuyun Li, Jie Yang, Qing Wang, Jinjin Fan, Peng Liu: Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection. FSKD (1) 2008: 401-405
110EEJiaomin Liu, Li Li, Yaxuan Li, Peng Liu: Intelligent Circuit Breaker Forecasting and Prewarning System Research. FSKD (5) 2008: 631-634
109EEKun Bai, Peng Liu: A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. HASE 2008: 373-382
108EEPeng Liu, Guojun Dai: Computer Supported Collaborative Learning Framework for the Handicapped in Ubiquitous Computing Environment. ICNSC 2008: 1680-1682
107EEYongqiang Wang, Peng Liu, Qiang Huo: An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition. ICPR 2008: 1-4
106EEPeng Liu, Lei Ma, Frank K. Soong: Radical based fine trajectory HMMs of online handwritten characters. ICPR 2008: 1-4
105EEJianwen Feng, Guojun Dai, Peng Liu, Xingfa Shen: Research on Experimental Platform and Methods for the Course "Interface and Communication". ICYCS 2008: 2598-2603
104EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
103EEYang Zhang, Peng Liu, Deuk Hyoun Heo: A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping. ISCAS 2008: 1000-1003
102EEPeng Liu: Secure and Privacy-Preserving Information Brokering. Inscrypt 2008: 22
101EEFuxing Zhang, Rong Zhu, Peng Liu, Wei Xiong, Xudong Liu, Zhaoying Zhou: A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices. RAM 2008: 252-257
100EEXiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu: Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38
99EEKameswari Kotapati, Peng Liu, Thomas F. La Porta: EndSec: An end-to-end message security protocol for mobile telecommunication networks. WOWMOM 2008: 1-7
98EEXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140
97EEPeng Liu, J. T. Gene Hwang: Gene expression: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 24(1): 149 (2008)
96EEFengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu: Automaton segmentation: a new approach to preserve privacy in xml information brokering. ACM Conference on Computer and Communications Security 2007: 508-518
95EEMeng Yu, Wanyu Zang, Peng Liu: Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106
94EEPadmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee: Incremental adaptation of XPath access control views. ASIACCS 2007: 105-116
93EEYong-Jie Ni, Chan-Hyun Youn, Byoung-Jin Kim, Youngjoo Han, Peng Liu: A PQRM-based PACS System for Advanced Medical Services under Grid Environment. BIBE 2007: 1225-1229
92EEPeng Liu, Tingting Fu, Ming Cai, Huaidong Shi: An Improved Cooperative Model for Web Service Based Workflow Management. CSCWD 2007: 818-822
91EEBo Luo, Dongwon Lee, Peng Liu: Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71
90EEYujuan Sun, Yilei Wang, Tao Li, Peng Liu: A New BP Neural Network Model Based on the Random Fuzzy Theory. FSKD (1) 2007: 42-45
89EEFang Huang, Dingsheng Liu, Peng Liu, Shaogang Wang, Yi Zeng, Guoqing Li, Wenyang Yu, Jian Wang, Lingjun Zhao, Lv Pang: Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. GCC 2007: 642-649
88EEPeng Liu, Guojun Dai, Tingting Fu, Hong Zeng, Xiang Zhang: A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment. ICA3PP 2007: 49-59
87EEPeng Liu, Yu-ping Ma, Jianshe Dong: Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. IFSA (2) 2007: 495-503
86EEPeng Liu, Jianshe Dong, Wei Zhao: A Statistical Spam Filtering Scheme Based on Grid Platform. IFSA (2) 2007: 527-534
85EEPeng Liu, Dingsheng Liu, Fang Huang: MTF Measurement Based on Interactive Live-Wire Edge Extraction. International Conference on Computational Science (2) 2007: 523-530
84EEHuaidong Shi, Ming Cai, Jinxiang Dong, Peng Liu: A Rich Servants Service Model for Pervasive Computing. International Conference on Computational Science (2) 2007: 896-903
83EEPeng Liu, Ming Cai, Tingting Fu, Jinxiang Dong: An EDF Interrupt Handling Scheme for Real-Time Kernel: Design and Task Simulation. International Conference on Computational Science (4) 2007: 969-972
82EETingting Fu, Yigang Wang, Peng Liu, Yehua Du: Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. SNPD (1) 2007: 27-32
81EELuo Zhong, Shishi Huang, Peng Liu, Yi Yu: A Design for an Online RSS Reader Based On AJAX. SNPD (1) 2007: 794-798
80EEPeng Liu, Guojun Dai, Tingting Fu: A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. SNPD (2) 2007: 412-416
79EEHao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong: Research on RTOS-Integrated TMR for Fault Tolerant Systems. SNPD (3) 2007: 750-755
78EEJingqiang Lin, Jiwu Jing, Peng Liu: Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241
77EERuidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: An Objective Trust Management Framework for Mobile Ad Hoc Networks. VTC Spring 2007: 56-60
76EEMeng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94
75EEQijun Gu, Peng Liu, Chao-Hsien Chu: Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007)
74EEXiuwen Zheng, Hung-Chung Huang, Wenyuan Li, Peng Liu, Quan-Zhen Li, Ying Liu: Modeling nonlinearity in dilution design microarray data. Bioinformatics 23(11): 1339-1347 (2007)
73EEPeng Liu, J. T. Gene Hwang: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 23(6): 739-746 (2007)
72EEPeng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
71EEQijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007)
70EEPeng Liu: Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120. Inf. Process. Manage. 43(1): 296 (2007)
69EEKameswari Kotapati, Peng Liu, Thomas F. La Porta: Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Telecommunication Systems 35(3-4): 99-122 (2007)
68 Ernesto Damiani, Peng Liu: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings Springer 2006
67EEKun Bai, Peng Liu: Towards Database Firewall: Mining the Damage Spreading Patterns. ACSAC 2006: 449-462
66EEPeng Liu, Naijun Wu, Jiaxian Zhu, Junjie Yin, Wei Zhang: A Unified Strategy of Feature Selection. ADMA 2006: 457-464
65EEPrasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77
64EEHai Wang, Peng Liu: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. ESORICS 2006: 207-224
63EEPeng Liu, Frank K. Soong: Word graph based speech rcognition error correction by handwriting input. ICMI 2006: 339-346
62EEPeng Liu, Jian-Lai Zhou, Frank K. Soong: Non-uniform Kernel Allocation Based Parsimonious HMM. ISCSLP 2006: 294-302
61EEJun Du, Peng Liu, Frank K. Soong, Jian-Lai Zhou, Ren-Hua Wang: Noisy Speech Recognition Performance of Discriminative HMMs. ISCSLP 2006: 358-369
60EEXuefeng Zhang, Peng Liu, Jinjin Fan: The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection. ISDA (1) 2006: 377-384
59EEPeng Liu, Lei Lei: Missing Data Treatment Methods and NBI Model. ISDA (1) 2006: 633-638
58EEJianshe Dong, Haixia Cao, Peng Liu, Li Ren: Bayesian Chinese Spam Filter Based on Crossed N-gram. ISDA (3) 2006: 103-108
57EEChi-Chun Pan, Prasenjit Mitra, Peng Liu: Semantic access control for information interoperation. SACMAT 2006: 237-246
56EEKameswari Kotapati, Peng Liu, Thomas F. La Porta: CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. SEC 2006: 158-170
55EEFengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu: In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259
54EEHui Zhu, X. L. Tang, Peng Liu: An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition. IJDAR 8(1): 27-34 (2006)
53EEPeng Liu, Hai Wang, Lunquan Li: Real-time data attack isolation for commercial database applications. J. Network and Computer Applications 29(4): 294-320 (2006)
52EEPeng Liu, Yan Zhang, Zhigang Mao: A Restoration Algorithm for Images Contaminated by Impulse Noise. Journal of Computer Research and Development 43(11): 1939-1946 (2006)
51EERuidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen: On-demand public-key management for mobile ad hoc networks. Wireless Communications and Mobile Computing 6: 295-306 (2006)
50EEMeng Yu, Wanyu Zang, Peng Liu: Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526
49EEPeng Liu, Elia El-Darzi, Lei Lei, Christos Vasilakis, Panagiotis Chountas, Wei Huang: An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset. ADMA 2005: 583-590
48EEQingzhao Tan, Wang-Chien Lee, Baihua Zheng, Peng Liu, Dik Lun Lee: Balancing performance and confidentiality in air index. CIKM 2005: 800-807
47EEPeng Liu, Lei Lei, Naijun Wu: A Quantitative Study of the Effect of Missing Data in Classifiers. CIT 2005: 28-33
46EEKun Bai, Hai Wang, Peng Liu: Towards Database Firewalls. DBSec 2005: 178-192
45EEPeng Liu, Jiaxian Zhu, Lanjuan Liu, Yanhong Li, Xuefeng Zhang: Application of Feature Selection for Unsupervised Learning in Prosecutors' Office. FSKD (2) 2005: 35-38
44EEJiaJu Wu, Gang Liu, Peng Liu, ChuanYu Xi: The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005). GrC 2005: 284-287
43EEKameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta: A Taxonomy of Cyber Attacks on 3G Networks. ISI 2005: 631-633
42EEQijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu: KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501
41EEPeng Liu, Jian-bin Hu, Zhong Chen: A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769
40EEBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: Deep Set Operators for XQuery. XIME-P 2005
39EEPeng Liu, Wanyu Zang, Meng Yu: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005)
38EEPeng Liu, Amit Chetal: Trust-based secure information sharing between federal government agencies. JASIST 56(3): 283-298 (2005)
37EEMeng Yu, Peng Liu, Wanyu Zang: Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security 13(4): 623-658 (2005)
36EEBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552
35EEMeng Yu, Peng Liu, Wanyu Zang: Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425
34EEHai Wang, Peng Liu, Lunqun Li: Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. ISC 2004: 146-157
33EEMing Liu, Peng Liu, Donghua Zhou: Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay. ISNN (2) 2004: 91-96
32EEBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu: A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147
31EEPeng Liu, Zhong Chen: An Access Control Model for Web Services in Business Process. Web Intelligence 2004: 292-298
30EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
29EEPeng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang: The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004)
28EEPeng Liu, Wanyu Zang: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Conference on Computer and Communications Security 2003: 179-189
27EEMeng Yu, Peng Liu, Wanyu Zang: Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-151
26EEYu Chen, Zhenqiang Jiao, Jun Xie, Zhihui Du, Peng Liu, Ziyu Zhu: A High Performance Design and Implementation of the Virtual Interface Architecture. APPT 2003: 125-135
25 Jianyong Zhang, Peng Liu: Delivering Services with Integrity Guarantees in Survivable Database Systems. DBSec 2003: 33-46
24EEPeng Liu: ITDB: An Attack Self-Healing Database System Prototype. DISCEX (2) 2003: 131-133
23EEPeng Liu: Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. DISCEX (2) 2003: 284-289
22EEPeng Liu, Yao Shi, Sanli Li: Computing Pool: A Simplified and Practical Computational Grid Model. GCC (1) 2003: 661-668
21 Meng Yu, Peng Liu, Wanyu Zang: Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240
20EEDongwon Lee, Wang-Chien Lee, Peng Liu: Supporting XML Security Models Using Relational Databases: A Vision. Xsym 2003: 267-281
19EEPeng Liu: Architectures for Intrusion Tolerant Database Systems. ACSAC 2002: 311-320
18EEDongxiao Li, Qingdong Yao, Peng Liu, Li Zhou: A bus arbitration scheme for HDTV decoder SoC. APCCAS (2) 2002: 79-83
17 Peng Liu, Ying Wang: Multiphase Damage Confinement System for Databases. DBSec 2002: 75-87
16 Peng Liu, Qingdong Yao, Weijian Yang: Hardware/software codesign for HDTV source decoder on system level. VCIP 2002: 679-686
15EEPaul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)
14EEPeng Liu: DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. ACSAC 2001: 219-229
13EEPeng Liu, Zhihui Du: Cluster Trend: DataSpeaking. CLUSTER 2001: 168-171
12EEPeng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205
11 Pramote Luenam, Peng Liu: ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. DBSec 2001: 239-252
10 Peng Liu, Xu Hao: Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. DBSec 2001: 75-89
9EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
8EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
7EEDouglas M. Blough, Peng Liu: FIMD-MPI: A Tool for Injecting Faults into MPI Applications. IPDPS 2000: 241-
6EEPeng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
5 Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): (2000)
4 Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18
3EEPeng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423
2EESushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
1EEYasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda: Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. DASFAA 1989: 266-273

Coauthor Index

1Paul Ammann [3] [6] [15] [72]
2Vijayalakshmi Atluri (Vijay Atluri) [65]
3Padmapriya Ayyagari [94]
4Kun Bai [46] [67] [109] [112] [114] [117]
5Ruzena Bajcsy [30]
6Terry Benzel [30]
7Matt Bishop [30]
8Douglas M. Blough [7]
9Robert Braden [30]
10Carla E. Brodley [30]
11Ming Cai [79] [83] [84] [92]
12Haixia Cao [58]
13Hsiao-Hwa Chen [51] [77]
14Yu Chen [26]
15Zhong Chen [31] [41]
16Amit Chetal [38]
17Panagiotis Chountas [49]
18Chao-Hsien Chu [42] [55] [71] [75] [96]
19Guojun Dai [80] [88] [105] [108]
20Ernesto Damiani [68]
21Jianshe Dong [58] [86] [87]
22Jinxiang Dong [79] [83] [84]
23Jun Du [61]
24Yehua Du [82]
25Zhihui Du [13] [26]
26Elia El-Darzi [49]
27Sonia Fahmy [30]
28Jinjin Fan [60] [111]
29Liu Fang [79]
30Jianwen Feng [105]
31Sally Floyd [30]
32Hao Fu [79]
33Tingting Fu [80] [82] [83] [88] [92]
34Qijun Gu [42] [71] [75]
35Youngjoo Han [93]
36Xu Hao [10]
37W. Hardaker [30]
38Deuk Hyoun Heo [103]
39Jian-bin Hu [41]
40Fang Huang [85] [89]
41Hung-Chung Huang [74]
42Shishi Huang [81]
43Wei Huang [49]
44Qiang Huo [107]
45J. T. Gene Hwang [73] [97]
46Supawadee Ingsriswang [29]
47Sushil Jajodia [2] [3] [4] [5] [6] [8] [9] [12] [15] [72] [76]
48Yoon-chan Jhi [98]
49Xiaoqi Jia [100] [115]
50Zhenqiang Jiao [26]
51Jiwu Jing [29] [78] [100] [115]
52Anthony D. Joseph [30]
53Kazuhiko Kato [1]
54George Kesidis [30]
55Latifur Khan [104]
56Byoung-Jin Kim [93]
57Yasushi Kiyoki [1]
58Kameswari Kotapati [43] [56] [69] [99]
59Takahiro Kurosawa [1]
60Dik Lun Lee [48]
61Dongwon Lee [20] [32] [36] [40] [55] [91] [94] [96]
62Wang-Chien Lee [20] [32] [36] [40] [42] [48] [55] [94]
63Lei Lei [47] [49] [59]
64Karl N. Levitt [30]
65Dongxiao Li [18]
66Fengjun Li [55] [96]
67Guoqing Li [89]
68Jie Li [51] [72] [77]
69Li Li [110]
70Lunquan Li [29] [53]
71Lunqun Li [34]
72Quan-Zhen Li [74]
73Ruidong Li [51] [77]
74Sanli Li [22]
75Tao Li [90]
76Wenyuan Li [74]
77Xiuyun Li [111]
78Yanhong Li [45]
79Yaxuan Li [110]
80Dongdai Lin [118]
81Jingqiang Lin [78]
82Robert Lindell [30]
83Dingsheng Liu [85] [89]
84Gang Liu [44]
85Jiaomin Liu [110]
86Lanjuan Liu [45]
87Ming Liu [33]
88Xudong Liu [101]
89Ying Liu [74]
90Pramote Luenam [11] [29]
91Bo Luo [32] [36] [40] [55] [91] [96]
92Lei Ma [106]
93Yu-ping Ma [87]
94Zhigang Mao [52]
95Mohammad M. Masud [104]
96Takashi Masuda [1]
97Catherine D. McCollum [2] [4] [5]
98David Miller [30]
99Prasenjit Mitra [55] [57] [65] [94]
100Russ Mundy [30]
101Cliford Neuman [30]
102Yong-Jie Ni [93]
103Peng Ning [8] [9]
104Ron Ostrenga [30]
105Chi-Chun Pan [57] [65]
106Lv Pang [89]
107Vern Paxson [30]
108Phillip A. Porras [30]
109Thomas F. La Porta (Tom La Porta) [43] [56] [69] [99]
110Li Ren [58]
111Catherine Rosenberg [30]
112Shankar Sastry (Shankar S. Sastry) [30]
113Xingfa Shen [105]
114Huaidong Shi [84] [92]
115Yao Shi [22]
116Frank K. Soong [61] [62] [63] [106]
117Daniel F. Sterne [30]
118Yan Lindsay Sun (Yan Sun) [43]
119Yujuan Sun [90]
120Qingzhao Tan [48]
121Lixin Tang [113]
122X. L. Tang [54]
123Bhavani M. Thuraisingham [104]
124J. Doug Tygar (J. D. Tygar) [30]
125Christos Vasilakis [49]
126Hai Wang [34] [46] [53] [64]
127Jian Wang [89]
128Qing Wang [111]
129Ren-Hua Wang [61]
130Shaogang Wang [89]
131Xinran Wang [98] [104]
132Yigang Wang [82]
133Yilei Wang [90]
134Ying Wang [17] [29]
135Yongqiang Wang [107]
136Yuewu Wang [115]
137JiaJu Wu [44]
138Naijun Wu [47] [66]
139Shyhtsun Felix Wu [30]
140ChuanYu Xi [44]
141Jun Xie [26]
142Wei Xiong [101]
143Jie Yang [111]
144Weijian Yang [16]
145Qingdong Yao [16] [18]
146Junjie Yin [66]
147Chan-Hyun Youn [93]
148Meng Yu [21] [27] [35] [37] [39] [50] [76] [95] [112] [116]
149Wenyang Yu [89]
150Yi Yu [81]
151Moti Yung (Mordechai M. Yung) [118]
152Wanyu Zang [21] [27] [28] [35] [37] [39] [50] [76] [95] [116]
153Hong Zeng [88]
154Yi Zeng [89]
155Fuxing Zhang [101]
156Jianyong Zhang [25]
157Shengzhi Zhang [100]
158Wei Zhang [66]
159Xiang Zhang [88]
160Xuefeng Zhang [45] [60]
161Yan Zhang [52]
162Yang Zhang [103]
163Lingjun Zhao [89]
164Wei Zhao [86]
165Baihua Zheng [48]
166Xiuwen Zheng [74]
167Luo Zhong [81]
168Donghua Zhou [33]
169Jian-Lai Zhou [61] [62]
170Li Zhou [18]
171Zhaoying Zhou [101]
172Hui Zhu [54]
173Jiaxian Zhu [45] [66]
174Rong Zhu [101]
175Sencun Zhu [71] [98] [104]
176Ziyu Zhu [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)