Secure information aggregation for smart grids using homomorphic encryption F Li, B Luo, P Liu 2010 first IEEE international conference on smart grid communications, 327-332, 2010 | 716 | 2010 |
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved W Zhou, Y Jia, A Peng, Y Zhang, P Liu IEEE Internet of things Journal 6 (2), 1606-1616, 2018 | 536 | 2018 |
Incentive-based modeling and inference of attacker intent, objectives, and strategies P Liu, W Zang, M Yu ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005 | 395 | 2005 |
Achieving accuracy and scalability simultaneously in detecting application clones on android markets K Chen, P Liu, Y Zhang Proceedings of the 36th International Conference on Software Engineering …, 2014 | 383 | 2014 |
Using Bayesian networks for cyber security analysis P Xie, JH Li, X Ou, P Liu, R Levy 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 368 | 2010 |
Proactive worm containment (PWC) for enterprise networks P Liu, YC Jhi, L Li US Patent 8,904,535, 2015 | 287 | 2015 |
Proactive Worm Containment (PWC) For Enterprise Networks PL Y. Jhi US Patent 8,904,535, 2015 | 287* | 2015 |
Proactive worm containment (PWC) for enterprise networks US Patent 20,090,031,423, 0 | 287* | |
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015 | 281 | 2015 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 264 | 2014 |
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection F Zhang, H Huang, S Zhu, D Wu, P Liu Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 247 | 2014 |
Recovery from malicious transactions P Ammann, S Jajodia, P Liu IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002 | 232 | 2002 |
Sigfree: A signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008 | 208 | 2008 |
Cyber situational awareness S Jajodia, P Liu, V Swarup, C Wang Springer US, 2009 | 199 | 2009 |
Cyber SA: Situational awareness for cyber defense P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ... Cyber Situational Awareness: Issues and Research, 3-13, 2010 | 195 | 2010 |
Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang 28th USENIX security symposium (USENIX security 19), 1133-1150, 2019 | 179 | 2019 |
Retrieval of relevant historical data triage operations in security operation centers T Lin, C Zhong, J Yen, P Liu From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 167 | 2018 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 167 | 2017 |
Cybersecurity for digital manufacturing D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu, J Terpenny Journal of manufacturing systems 48, 3-12, 2018 | 156 | 2018 |
Architectures for intrusion tolerant database systems P Liu 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 151 | 2002 |