Dr. Peng Ning

NCSU-CoE-CS

Home

Teaching
Research
Grants
My Group
Publications
Software
Curriculum Vitae
My Academic Lineage
My Erdös Number

 

 

 

Publications

Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

[By Year] [By Area] [By Type]

My Google Scholar Author Profile
My ACM author profile

  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999 and before
  • 2012

    • Barry Peddycord III, Peng Ning, Sushil Jajodia, "On the Accurate Identification of Network Service Dependencies in Distributed Systems," To appear in Proceedings of 26th USENIX Large Installation System Administration Conference (LISA '12), December 2012.

    • Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning, "Communication Efficiency of Anti-jamming Broadcast in Large-scale Multi-Channel Wireless Networks," To appear in IEEE Transactions on Signal Processing, 2012.

    • Xiaofan He, Huaiyu Dai, and Peng Ning, "A Byzantine Attack Defender: the Conditional Frequency Check," To appear in Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT '12), July 2012.

    • Jason Gionta, Peng Ning, and Xiaolan Zhang, "iHTTP: Efficient Authentication of Non-confidential HTTP Traffic," To appear in Proceedings of 10th International Conference on Applied Cryptography and Network Security (ACNS '12), June 2012.

    • Attila Yavuz, Peng Ning, Mike Reiter, “BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems,” To appear in ACM Transactions on Information and Systems Security (TISSEC), 2012.

    • Attila Yaviz, Peng Ning, “Self-Sustaining, Efficient and Forward-Secure Cryptographic Constructions for Unattended Wireless Sensor Networks,” To appear in Ad Hoc Networks, Elsevier, 2012.

    • Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning, "MrFair: Misbehavior-resistant Fair Scheduling in Wireless Mesh Networks," in Ad Hoc Networks, Vol. 10, Issue 3, Pages 299-316. Elsevier. May 2012.

    • Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E. Hutchinson, "NSDMiner: Automated Discovery of Network Service Dependencies," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Orlando, FL, March 2012.

    • Yao Liu, and Peng Ning, "BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Orlando, FL, March 2012

    • Yao Liu, and Peng Ning, "Enhanced Wireless Channel Authentication Using Time-Synched Link Signature," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Mini-Conference, Orlando, FL, March 2012.

    • Attila A. Yavuz, Peng Ning and Mike Reiter, "Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging," in Proceedings of 2012 Financial Cryptography and Data Security (FC 2012), February-March 2012.

    • Wu Zhou, Yajin Zhou, Xuxian Jiang and Peng Ning, "Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces," in Proceedings of 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012), February 2012. (Best paper award)

    • Liang Xiao, Huaiyu Dai, Peng Ning, "Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping," in IEEE Transactions on Information Forensics and Security (TIFS), Vol. 7, No. 1, pages 297--309, February 2012.

    2011

    • Sangwon Hyun and Peng Ning, “Secure Code Dissemination in Wireless Sensor Networks,” in Henk van Tilborg and Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Edition, pages 1099 – 1102, Springer, 2011.
    • Kun Sun and Peng Ning. “Secure Time Synchronization,” in Henk van Tilborg and Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Edition, pages 1139 – 1140, Springer, 2011.

    • Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning, "Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks," To appear in ACM Transactions on Sensor Networks (TOSN), 2011.

    • Ahmed Azab, Peng Ning, Xiaolan Zhang, “SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms,” in Proceedings of 18th ACM Conference on Computer and Communications Security (CCS ’11), October 2011.

    • Qian Wang, Kui Ren, Peng Ning, "Anti-jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics," in Proceedings of The 19th IEEE International Conference on Network Protocols (ICNP 2011), October 2011. (Best paper award)

    • Liang Xiao, Huaiyu Dai, Peng Ning. "Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part I: Singlehop Networks," in Proceedings of GLOBECOM 2011, December 2011.

    • Liang Xiao, Huaiyu Dai, Peng Ning. "Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks," in Proceedings of GLOBECOM 2011, December 2011.

    • Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, Peng Ning, "On the Expressiveness of Return-into-libc Attacks," Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), Menlo Park, California, September 2011.

    • Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing (Fran) Li, Fang Z. Peng, Peng Ning, Massoud Amin, "A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid," in IEEE Transactions on Smart Grid, Vol. 2, Issue 3, 2011.

    • Sangwon Hyun and Peng Ning, “Mitigating Wireless Jamming Attacks via Channel Migration,” in Proceedings of the 8th ICDCS Workshop on Wireless Ad Hoc and Sensor Networks (WWASN 2011), June 2011

    • Yao Liu, Peng Ning, Mike Reiter, "False Data Injection Attacks against State Estimation in Electric Power Grids" in ACM Transactions in Information and Systems Security (TISSEC), Vol. 14, No. 1, May 2011.

    • Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty, "P2DAP -- Detecting Sybil Attacks in Vehicular Ad Hoc Networks," in IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Communications and Networks, Vol. 29, No. 3, Pages 582--594, March 2011.

    • Mihui Kim and Peng Ning, "SeCA: A framework for Secure Channel Assignment in wireless mesh networks," in Computer Communications, Volume 34, Issue 4, Pages 567-576, April 2011.

    2010

    2009

    2008

    2007

    2006

    2005

    2004

    2003

    2002

    2001

    2000

    1999 and before

    • Dengguo Feng, Peng Ning, "The Relationship Among Nonlinear Criteria of S-box," (in Chinese), Journal of the China Institute of Communications, 19(4):71-75, 1998.

    • Peng Ning, "Fast Implementation of A Cryptographic Library for Elliptic Curves over GF(p) and GF(2^m)," Master Thesis, University of Science & Technology of China, July 1997.

    • Junhui Yang, Peng Ning, "Analysis of a Fast Public Key Cryptosystem," (in Chinese) Cryptography & Information, 2(3):1-17, 1996.

    • Peng Ning, Jiwu Jing, Yingxia Dai, "A Key Exchange Protocol based on Distributed Certficate Authorities," (in Chinese) in Proceedings of the Fifth Annual Conference of Information Security Professional Committee of Chinese Computer Federation, pages 233-237, 1995.


    Last Updated: August 31, 2012 .