If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Peng Liu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 4 Similar Profiles
Servers Engineering & Materials Science
Cryptography Engineering & Materials Science
Access control Engineering & Materials Science
Attack Mathematics
Semantics Engineering & Materials Science
Recovery Engineering & Materials Science
Industry Engineering & Materials Science
Intrusion detection Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1998 2020

Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs

Kim, H., Guo, P., Zhu, M. & Liu, P., Jan 1 2020, In : Automatica. 111, 108588.

Research output: Contribution to journalArticle

State estimation
Error analysis
Nonlinear systems
Stochastic systems
Covariance matrix

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T. R., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

Energy distribution matters in greybox fuzzing

Situ, L., Wang, L., Li, X., Guan, L., Zhang, W. & Liu, P., May 1 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion, ICSE-Companion 2019. Institute of Electrical and Electronics Engineers Inc., p. 270-271 2 p. 8802844. (Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion, ICSE-Companion 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

distribution strategy
Semantics
Scheduling
energy
scheduling

Learning from experts' experience: Toward automated cyber security data triage

Zhong, C., Yen, J., Liu, P. & Erbacher, R. F., Mar 1 2019, In : IEEE Systems Journal. 13, 1, p. 603-614 12 p., 8360965.

Research output: Contribution to journalArticle

Finite automata
Processing

MimosafTL: Adding secure and practical ransomware defense strategy to flash translation layer

Wang, P., Jia, S., Chen, B., Xia, L. & Liu, P., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 327-338 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Flash memory
Malware
Mobile computing
Computer operating systems
Electronic money