Pengxiang Ning
#135,595
Most Influential Person Now
Pengxiang Ning's AcademicInfluence.com Rankings
Pengxiang Ningcomputer-science Degrees
Computer Science
#6198
World Rank
#6534
Historical Rank
Database
#3308
World Rank
#3446
Historical Rank

Download Badge
Computer Science
Why Is Pengxiang Ning Influential?
(Suggest an Edit or Addition)Pengxiang Ning's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Establishing pairwise keys in distributed sensor networks (2003) (1867)
- False data injection attacks against state estimation in electric power grids (2009) (1621)
- False data injection attacks against state estimation in electric power grids (2011) (1092)
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks (2008) (1048)
- An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks (2004) (706)
- Detecting repackaged smartphone applications in third-party android marketplaces (2012) (645)
- Location-based pairwise key establishments for static sensor networks (2003) (594)
- Constructing attack scenarios through correlation of intrusion alerts (2002) (569)
- AppIntent: analyzing sensitive data transmission in android for privacy leakage detection (2013) (400)
- Multilevel μTESLA: Broadcast authentication for distributed sensor networks (2004) (363)
- Attack-resistant location estimation in sensor networks (2005) (348)
- Vetting undesirable behaviors in android apps with permission use analysis (2013) (344)
- How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols (2003) (312)
- Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software (2006) (311)
- Managing security of virtual machine images in a cloud environment (2009) (292)
- Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks (2002) (287)
- HyperSentry: enabling stealthy in-context measurement of hypervisor integrity (2010) (287)
- Establishing pairwise keys in distributed sensor networks (2005) (282)
- Techniques and tools for analyzing intrusion alerts (2004) (273)
- Discovering calendar-based temporal association rules (2001) (271)
- Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World (2014) (256)
- Mitigating DoS attacks against broadcast authentication in wireless sensor networks (2008) (253)
- LAD: localization anomaly detection for wireless sensor networks (2005) (251)
- An efficient scheme for authenticating public keys in sensor networks (2005) (251)
- Countering kernel rootkits with lightweight hook protection (2009) (238)
- Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks (2005) (220)
- TinySeRSync: secure and resilient time synchronization in wireless sensor networks (2006) (220)
- Efficient self-healing group key distribution with revocation capability (2003) (219)
- Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication (2010) (217)
- Group-based key pre-distribution in wireless sensor networks (2005) (216)
- Improving key predistribution with deployment knowledge in static sensor networks (2005) (209)
- Learning attack strategies from intrusion alerts (2003) (201)
- Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures (2010) (197)
- Practical broadcast authentication in sensor networks (2005) (172)
- Building Attack Scenarios through Integration of Complementary Alert Correlation Method (2004) (168)
- Analyzing Intensive Intrusion Alerts via Correlation (2002) (161)
- On the secrecy of timing-based active watermarking trace-back techniques (2006) (159)
- Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings (2009) (152)
- On the Expressiveness of Return-into-libc Attacks (2011) (151)
- Group-based key predistribution for wireless sensor networks (2008) (149)
- P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks (2011) (148)
- Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks (2008) (145)
- Remote attestation to dynamic system properties: Towards providing complete system integrity evidence (2009) (144)
- Defending against Sybil attacks in sensor networks (2005) (144)
- A beacon-less location discovery scheme for wireless sensor networks (2005) (144)
- Secure and resilient clock synchronization in wireless sensor networks (2006) (141)
- Cyber SA: Situational Awareness for Cyber Defense (2010) (138)
- SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms (2011) (138)
- Attack-Resistant Location Estimation in Wireless Sensor Networks (2008) (137)
- Secure Distributed Cluster Formation in Wireless Sensor Networks (2006) (133)
- HIMA: A Hypervisor-Based Integrity Measurement Agent (2009) (113)
- Tracing Traffic through Intermediate Hosts that Repacketize Flows (2007) (113)
- Abstraction-based intrusion detection in distributed environments (2001) (111)
- BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems (2009) (109)
- Automatic diagnosis and response to memory corruption vulnerabilities (2005) (104)
- Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks (2004) (101)
- HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities (2015) (97)
- Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks (2007) (96)
- An Algebraic Representation of Calendars (2002) (85)
- Alert correlation through triggering events and common resources (2004) (82)
- A Framework for Identifying Compromised Nodes in Wireless Sensor Networks (2008) (81)
- Intrusion Detection Techniques (2004) (81)
- Interleaved hop-by-hop authentication against false data injection attacks in sensor networks (2007) (79)
- Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time (2013) (72)
- A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid (2011) (71)
- SKEE: A lightweight Secure Kernel-level Execution Environment for ARM (2016) (71)
- Fault-tolerant cluster-wise clock synchronization for wireless sensor networks (2005) (70)
- Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping (2012) (64)
- Reasoning about complementary intrusion evidence (2004) (64)
- Analyzing network traffic to detect self-decrypting exploit code (2007) (62)
- An Intrusion Alert Correlator Based on Prerequisites of Intrusions (2002) (61)
- A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check (2013) (59)
- EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning (2015) (59)
- NSDMiner: Automated discovery of Network Service Dependencies (2012) (58)
- HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing (2013) (57)
- Wireless Communications under Broadband Reactive Jamming Attacks (2016) (56)
- Anti-jamming communication in cognitive radio networks with unknown channel statistics (2011) (54)
- Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging (2012) (54)
- Proceedings of the 15th ACM conference on Computer and communications security (2008) (54)
- Correlating Alerts Using Prerequisites of Intrusions (2001) (53)
- Hypothesizing and reasoning about attacks missed by intrusion detection systems (2004) (53)
- A Framework for Identifying Compromised Nodes in Sensor Networks (2006) (52)
- Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks (2008) (52)
- Is link signature dependable for wireless security? (2013) (50)
- Privacy-preserving alert correlation: a concept hierarchy based approach (2005) (49)
- Efficient Software Implementation for Finite Field Multiplication in Normal Basis (2001) (48)
- Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure (2010) (48)
- Always up-to-date: scalable offline patching of VM images in a compute cloud (2010) (48)
- Containing denial-of-service attacks in broadcast authentication in sensor networks (2007) (46)
- USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure (2010) (45)
- Security for Wireless Sensor Networks (2006) (45)
- CARDS: A Distributed System for Detecting Coordinated Attacks (2000) (45)
- Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks (2003) (44)
- Secure address auto-configuration for mobile ad hoc networks (2005) (43)
- Active timing-based correlation of perturbed traffic flows with chaff packets (2005) (42)
- Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry (2016) (36)
- BitTrickle: Defending against broadband and high-power reactive jamming attacks (2012) (36)
- Correlation analysis of intrusion alerts (2006) (36)
- BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems (2012) (34)
- Securing network access in wireless sensor networks (2009) (33)
- Integrating IDS Alert Correlation and OS-Level Dependency Tracking (2006) (33)
- ShortPK: A short-term public key scheme for broadcast authentication in sensor networks (2009) (32)
- Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps (2014) (31)
- Enhanced wireless channel authentication using time-synched link signature (2012) (31)
- Improving learning and adaptation in security games by exploiting information asymmetry (2015) (30)
- Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks (2016) (30)
- A k-anonymous communication protocol for overlay networks (2007) (29)
- MCR Decoding: A MIMO approach for defending against wireless jamming attacks (2014) (28)
- SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android (2017) (28)
- Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks (2007) (27)
- Dynamic Adaptive Anti-Jamming via Controlled Mobility (2013) (27)
- Memsherlock: an automated debugger for unknown memory corruption vulnerabilities (2007) (27)
- On the Accurate Identification of Network Service Dependencies in Distributed Systems (2012) (26)
- Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ (2003) (25)
- Avoiding loss of fairness owing to process crashes in fair data exchange protocols (2000) (24)
- Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation (2002) (24)
- Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks (2012) (23)
- Toward Proper Guard Zones for Link Signature (2016) (22)
- Zero-determinant Strategies for Multi-player Multi-action Iterated Games (2016) (22)
- Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature (2016) (21)
- Improving Robustness of PGP Keyrings by Conflict Detection (2004) (20)
- Design and implementation of a decentralized prototype system for detecting distributed attacks (2002) (20)
- PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks (2017) (20)
- Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks (2009) (19)
- Enhancing security of Hadoop in a public cloud (2015) (19)
- Storage-Efficient Stateless Group Key Revocation (2004) (19)
- Modeling requests among cooperating intrusion detection systems (2000) (19)
- Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks (2009) (18)
- Interval-based flow watermarking for tracing interactive traffic (2012) (18)
- Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks (2012) (18)
- A Flexible Approach to Intrusion Alert Anonymization and Correlation (2006) (17)
- The security of link signature: A view from channel models (2014) (17)
- A Byzantine attack defender: The Conditional Frequency Check (2012) (17)
- Poster: mimicry attacks against wireless link signature (2011) (16)
- Avoiding loss of fairness owing to failures in fair data exchange systems (2001) (15)
- Security for Wireless Sensor Networks (Advances in Information Security) (2006) (15)
- Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (2003) (15)
- Secure distributed control in unreliable D-NCS (2012) (15)
- Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (2008) (14)
- Providing DoS resistance for signature-based broadcast authentication in sensor networks (2013) (14)
- Security mechanisms for wireless sensor networks (2005) (14)
- Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty (2014) (14)
- MAC Design of Uncoordinated FH-Based Collaborative Broadcast (2012) (13)
- MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis (2013) (13)
- SEER: practical memory virus scanning as a service (2014) (12)
- Learning Binary Representation for Automatic Patch Detection (2019) (12)
- Robust network-based attack attribution through probabilistic watermarking of packet flows (2005) (12)
- Computer-Aided Human Centric Cyber Situation Awareness (2017) (12)
- TIAA: A visual toolkit for intrusion alert analysis (2003) (11)
- A Query Facility for Common Intrusion Detection Framework (2000) (11)
- Mitigating Wireless Jamming Attacks via Channel Migration (2011) (11)
- Secure and Resilient Time Synchronization in Wireless Sensor Networks (2007) (11)
- A stochastic multi-channel spectrum access game with incomplete information (2015) (10)
- Detecting Sybil Attacks in Vehicular Ad Hoc Networks (2012) (9)
- Samsung KNOX and Enterprise Mobile Security (2014) (8)
- Guest Editorial Special Issue on Security for IoT: The State of the Art (2014) (8)
- Automated Security Debugging Using Program Structural Constraints (2007) (7)
- Analysis and optimization on jamming-resistant collaborative broadcast in large-scale networks (2010) (7)
- Intrusion Detection in Distributed Systems (2004) (7)
- No time to demodulate - fast physical layer verification of friendly jamming (2015) (7)
- A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks (2016) (6)
- Stuck-me-not: A deadlock detector on blockchain software in Rust (2020) (6)
- SeCA: A framework for Secure Channel Assignment in wireless mesh networks (2011) (6)
- MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks (2012) (6)
- Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks (2011) (6)
- Towards Automating Intrusion Alert Analysis ∗ (2003) (5)
- DACSA: A Decoupled Architecture for Cloud Security Analysis (2014) (5)
- A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks (2017) (5)
- Generating Market Basket Data with Temporal Information (2001) (5)
- Cost-efficient and attack-resilient approaches for state estimation in power grids (2015) (4)
- Toward Automated Intrusion Alert Analysis (2010) (4)
- Proceedings of the 2007 ACM workshop on Privacy in electronic society (2007) (4)
- Intrusion‐Detection Systems (2012) (4)
- Computer Security - 2009, 14th European Symposium on Research in Computer Security (2009) (3)
- Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys (2012) (3)
- Proceedings of the 2007 ACM workshop on Scalable trusted computing (2007) (3)
- Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks (2011) (3)
- Channel correlation modeling for link signature security assessment (2014) (3)
- A Tree-Based μ TESLA Broadcast Authentication for Sensor Networks (2005) (3)
- Containing bogus packet insertion attacks for broadcast authentication in sensor networks (2012) (3)
- Broadcast Authentication and Key Management for Secure Sensor Networks (2005) (3)
- Chapter 28. Security and Privacy for Sensor Networks (2010) (3)
- Certificate Recommendations to Improve the Robustness of Web of Trust (2004) (3)
- FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes (2017) (2)
- Efficient and Self-Healing Key Distribution with Revocation for Tactical Wireless Networks (2003) (2)
- Mechanisms for protecting software integrity in networked systems (2008) (2)
- Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach (2017) (2)
- Securing Hadoop in cloud (2014) (2)
- Secure Time Synchronization (2011) (2)
- Dynamic Adaptive Anti-Jamming via Mobility Control (2013) (2)
- Correlating Alerts Using Prerequisites of Intrusions: Towards Reducing False Alerts and Uncovering High Level Attack Strategies (2005) (2)
- Secure and reliable code dissemination for wireless sensor networks (2011) (2)
- Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 (2007) (2)
- Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 (2007) (2)
- iHTTP: Efficient Authentication of Non-confidential HTTP Traffic (2012) (2)
- Secure Code Dissemination in Wireless Sensor Networks (2011) (2)
- Authenticated data compression in delay tolerant wireless sensor networks (2009) (2)
- New system security mechanisms for the cloud computing infrastructure (2012) (2)
- Integrating multiple information resources to analyze intrusion alerts (2006) (2)
- Active timing based techniques for attack attribution through stepping stones (2006) (1)
- Adapting Query Optimization Techniques for Efficient Alert Correlation (2003) (1)
- Improving the robustness of webs of trust (2006) (1)
- Mitigating DOS attacks against signature-based broadcast authentication in wireless sensor networks (2005) (1)
- Toward interface customization in intrusion detection systems (1976) (1)
- Automatic Permission Check Analysis for Linux Kernel (2022) (1)
- Software-Based Attestation (2011) (1)
- Proceedings of the 14th European conference on Research in computer security (2009) (1)
- Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 (2007) (1)
- Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (2005) (1)
- Security mechanisms for protecting foundational services in wireless sensor networks (2010) (1)
- Proceedings of the ARO Planning Workshop on Embedded Systems and Network Security Held in Raleigh, North Carolina on February 22-23, 2007 (2007) (1)
- Extending Common Intrusion Detection Framework (CIDF) to Support Queries (2004) (1)
- Certificate recommendations to improve robustness of webs of trust (2004) (1)
- Efficient , Compromise Resilient and Append-only Cryptographic Constructions for Digital Forensics (2011) (1)
- Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (2007) (1)
- Network Access Control for Mobile Ad-Hoc Networks (2005) (1)
- Automated Software Vulnerability Analysis (2010) (1)
- Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 (2007) (0)
- IR-Seluge: Interference-resilient code dissemination in wireless sensor networks (2009) (0)
- Intrusion Detection Basics (2009) (0)
- Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (2008) (0)
- Subgroup Cryptosystems (2011) (0)
- Trustworthy and resilient time synchronization in wireless sensor networks (2006) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- 1 Securing the Power Grid with Collaborative Embedded Intelligence (2009) (0)
- L1 Thinking Phenomenon in L2 Acquisition (2004) (0)
- Wireless physical layer security (2012) (0)
- Facility for Common Intrusion Detection Framework (2000) (0)
- Key Pre-Distribution for Sensor Networks Using Group Deployment Knowledge (2009) (0)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- System View and Event History (2004) (0)
- From Database to Cyber Security (2018) (0)
- Program Chair's Message (2013) (0)
- Secure and Resilient Localization in Wireless Sensor Networks (2007) (0)
- Efficient, compromise resilient and compact cryptographic constructions for digital forensics (2011) (0)
- Session details: Emerging applications (2003) (0)
- Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 (2005) (0)
- SKM : Effective Secure Coverage for Wireless Sensor Networks (2014) (0)
- An Algebrai Representation of Calendars ( Extended Abstra t ) (2000) (0)
- An Overview of Related Research (2004) (0)
- Session details: Verification and integrity (2010) (0)
- Fundamental Limits of Passive Attacks on Wireless Link Signatures (2011) (0)
- Decentralized Detection of Distributed Attacks (2004) (0)
- Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005 (2005) (0)
- CARDS: An Experimental System for Detecting Distributed Attacks (2004) (0)
- Message from the Guest Editors (2007) (0)
- Speaker Biometrics (2009) (0)
- Session details: Sensor networks (2004) (0)
- A Hierarchical Model for Distributed Attacks (2004) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Pengxiang Ning?
Pengxiang Ning is affiliated with the following schools: