Peng Liu
Penn State University
H-index: 58
North America-United States
Top articles of Peng Liu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A hybrid LLM workflow can help identify user privilege related variables in programs of any size | arXiv preprint arXiv:2403.15723 | Haizhou Wang Zhilong Wang Peng Liu | 2024/3/23 |
A survey on membership inference attacks and defenses in Machine Learning | Jun Niu Peng Liu Xiaoyan Zhu Kuo Shen Yuecong Wang | 2024/3/8 | |
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest | Pattern Recognition | Hui Liu Bo Zhao Jiabao Guo Kehuan Zhang Peng Liu | 2024/3/1 |
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks | IEEE Transactions on Computers | Wei Song Zihan Xue Jinchi Han Zhenzhen Li Peng Liu | 2024/1/8 |
Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware | IEEE Internet of Things Journal | Lingyun Situ Chi Zhang Le Guan Zhiqiang Zuo Linzhang Wang | 2023/8/9 |
Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload detection | Cybersecurity | Haizhou Wang Anoop Singhal Peng Liu | 2023/1/5 |
ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications | arXiv preprint arXiv:2307.12488 | Zhilong Wang Lan Zhang Peng Liu | 2023/7/24 |
Simulation of Core Physics Benchmark VERA Based on Monte Carlo Code JMCT | Atomic Energy Science and Technology | LIU Peng SHI Dunfu LI Rui FU Yuanguang DENG Li | 2023 |
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis | Kai Cheng Yaowen Zheng Tao Liu Le Guan Peng Liu | 2023/7/12 | |
The effectiveness of large language models (ChatGPT and CodeBERT) for security-oriented code analysis | Available at SSRN 4567887 | Zhilong Wang Lan Zhang Chen Cao Peng Liu | 2023 |
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark | arXiv preprint arXiv:2307.06123 | Jun Niu Xiaoyan Zhu Moxuan Zeng Ge Zhang Qingyang Zhao | 2023/7/12 |
Analysis of neural network detectors for network attacks | Journal of Computer Security | Qingtian Zou Lan Zhang Anoop Singhal Xiaoyan Sun Peng Liu | 2023 |
Advanced Persistent Threats | Yavuz Selim Özzengi̇n Fatih Sakiz Recep Benzer | 2016/5/16 | |
Enhanced Cyber-Attack Detection in Intelligent Motor Drives: A Transfer Learning Approach with Convolutional Neural Networks | IEEE Journal of Emerging and Selected Topics in Industrial Electronics | Bowen Yang Shushan Wu Kun Hu Jin Ye Wenzhan Song | 2023/12/25 |
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning | arXiv preprint arXiv:2301.08427 | Lan Zhang Chen Cao Zhilong Wang Peng Liu | 2023/1/20 |
Attacks on ML Systems: From Security Analysis to Attack Mitigation | Qingtian Zou Lan Zhang Anoop Singhal Xiaoyan Sun Peng Liu | 2022/12/11 | |
Hierarchical attention network for interpretable and fine-grained vulnerability detection | Mianxue Gu Hantao Feng Hongyu Sun Peng Liu Qiuling Yue | 2022/5/2 | |
Rssd: Defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis | Benjamin Reidys Peng Liu Jian Huang | 2022/2/28 | |
Exploring the Applications of Frequency Modulation to Secure CubeSats from Eavesdropping, Jamming, and Interference | Rajiv K Thummala Peng Liu | 2022 | |
Using honeypots to model botnet attacks on the internet of medical things | Computers and Electrical Engineering | Huanran Wang Hui He Weizhe Zhang Wenmao Liu Peng Liu | 2022/9/1 |