Peng Ning He, X., Dai, H., Ning, P., & Dutta, R. (2017). A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627. https://doi.org/10.1109/jsac.2017.2659581 He, X. F., Dai, H., Ning, P., & Dutta, R. (2016). A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications. https://doi.org/10.1109/infocom.2016.7524350 He, X., Dai, H., & Ning, P. (2016). Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443. https://doi.org/10.1109/tsp.2016.2548987 Wang, Q., Ren, K., Ning, P., & Hu, S. (2016). Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65(10), 8331–8344. https://doi.org/10.1109/tvt.2015.2511071 He, X., Dai, H., Shen, W., Ning, P., & Dutta, R. (2016). Toward Proper Guard Zones for Link Signature. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117. https://doi.org/10.1109/twc.2015.2498621 Fang, S., Liu, Y., & Ning, P. (2016). Wireless Communications under Broadband Reactive Jamming Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 13(3), 394–408. https://doi.org/10.1109/tdsc.2015.2399304 Xiong, K., & Ning, P. (2015). Cost-Efficient and Attack-Resilient Approaches for State Estimation in Power Grids. 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, pp. 2192–2197. https://doi.org/10.1145/2695664.2695937 He, X., Dai, H., Ning, P., & Dutta, R. (2015). Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/glocom.2015.7417158 Yu, X. Q., Ning, P., & Vouk, M. A. (2015). Enhancing security of Hadoop in a public cloud. 2015 6th International Conference on Information and Communication Systems (ICICS), 38–43. https://doi.org/10.1109/iacs.2015.7103198 He, X. F., Dai, H. Y., & Ning, P. (2015). Improving learning and adaptation in security games by exploiting information asymmetry. 2015 ieee conference on computer communications (infocom). https://doi.org/10.1109/infocom.2015.7218560 Shen, W. B., Liu, Y., He, X. F., Dai, H. Y., & Ning, P. (2015). No time to demodulate - fast physical layer verification of friendly jamming. 2015 ieee military communications conference (milcom 2015), 653–658. https://doi.org/10.1109/milcom.2015.7357518 He, X., Dai, H., & Ning, P. (2014). Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388. https://doi.org/10.1109/twc.2014.2320973 Zhang, Y., Yang, M., Yang, Z., Gu, G., Ning, P., & Zang, B. (2014). Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(11), 1828–1842. https://doi.org/10.1109/tifs.2014.2347206 Shen, W., Ning, P., He, X., & Dai, H. (2013). Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188. https://doi.org/10.1109/sp.2013.22 He, X. F., Dai, H. Y., & Ning, P. (2013). Dynamic adaptive anti-jamming via controlled mobility. 2013 IEEE Conference on Communications and Network Security (CNS), 1–9. https://doi.org/10.1109/cns.2013.6682686 He, X., Dai, H., & Ning, P. (2013). HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing. IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208. https://doi.org/10.1109/jsac.2013.131119 Dong, Q., Liu, D. G., & Ning, P. (2013). Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Transactions on Embedded Computing Systems, 12(3). https://doi.org/10.1145/2442116.2442123 He, X. F., Dai, H. Y., & Ning, P. (2012). A Byzantine attack defender: The Conditional Frequency Check. 2012 ieee international symposium on information theory proceedings (isit). https://doi.org/10.1109/isit.2012.6284709 Yavuz, A. A., Ning, P., & Reiter, M. K. (2012). BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 15(2). https://doi.org/10.1145/2240276.2240280 Liu, Y., & Ning, P. (2012). BitTrickle: Defending against broadband and high-power reactive jamming attacks. 2012 Proceedings IEEE infocom, 909–917. https://doi.org/10.1109/infcom.2012.6195840 Xiong, K., Wang, R., Du, W., & Ning, P. (2012). Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 8(3). https://doi.org/10.1145/2240092.2240094 Liu, Y., & Ning, P. (2012). Enhanced wireless channel authentication using time-synched link signature. 2012 Proceedings IEEE infocom, 2636–2640. https://doi.org/10.1109/infcom.2012.6195669 Pyun, Y. J., Park, Y., Reeves, D. S., Wang, X., & Ning, P. (2012). Interval-based flow watermarking for tracing interactive traffic. COMPUTER NETWORKS, 56(5), 1646–1665. https://doi.org/10.1016/j.comnet.2012.01.017 Natarajan, A., Ning, P., Liu, Y., Jajodia, S., & Hutchinson, S. E. (2012). NSDMiner: Automated discovery of network service dependencies. 2012 Proceedings IEEE infocom, 2507–2515. https://doi.org/10.1109/infcom.2012.6195642 Yavuz, A. A., & Ning, P. (2012). Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. AD HOC NETWORKS, 10(7), 1204–1220. https://doi.org/10.1016/j.adhoc.2012.03.006 Liu, Y., Ning, P., & Reiter, M. K. (2011, May). False Data Injection Attacks against State Estimation in Electric Power Grids. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 14. https://doi.org/10.1145/1952982.1952995 Zhou, T., Roy, R., Ning, C. P., & Chakrabarty, K. (2011). P(2)DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 29(3), 582–594. https://doi.org/10.1109/jsac.2011.110308 Kim, M., & Ning, P. (2011). SeCA: A framework for Secure Channel Assignment in wireless mesh networks. COMPUTER COMMUNICATIONS, 34(4), 567–576. https://doi.org/10.1016/j.comcom.2010.05.008 Liu, Y., Ning, P., & Dai, H. (2010). Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301. https://doi.org/10.1109/sp.2010.24 Liu, Y., Ning, P., Dai, H. Y., & Liu, A. (2010). Randomized differential DSSS: Jamming-resistant wireless broadcast communication. 2010 proceedings ieee infocom. https://doi.org/10.1109/infcom.2010.5462156 Yavuz, A. A., & Ning, P. (2009). BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228. https://doi.org/10.1109/acsac.2009.28 Liu, Y., Ning, P., & Reiter, M. K. (2009). False data injection attacks against state estimation in electric power grids. CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32. https://doi.org/10.1145/1653662.1653666 Azab, A. M., Ning, P., Sezer, E. C., & Zhang, X. (2009). HIMA: A Hypervisor-Based Integrity Measurement Agent. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+. https://doi.org/10.1109/acsac.2009.50 Liu, A., Ning, P., & Wang, C. (2009). Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+. https://doi.org/10.1109/infcom.2009.5062038 Kil, C., Sezer, E. C., Azab, A. M., Ning, P., & Zhang, X. (2009). Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+. https://doi.org/10.1109/dsn.2009.5270348 Wang, R., Du, W., Liu, X., & Ning, P. (2009). ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1). https://doi.org/10.1145/1653760.1653769 Zhang, Q., Yu, T., & Ning, P. (2008, March). A framework for identifying compromised nodes in wireless sensor networks. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11. https://doi.org/10.1145/1341731.1341733 Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008). Attack-resistant location estimation in wireless sensor networks. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4). https://doi.org/10.1145/1380564.1380570 Liu, D., Ning, P., & Du, W. (2008). Group-based key predistribution for wireless sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 4(2). https://doi.org/10.1145/1340771.1340777 Ning, P., Liu, A., & Du, W. (2008). Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 4(1). https://doi.org/10.1145/1325651.1325652 Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 3(3). https://doi.org/10.1145/1267060.1267062 Liu, D.-G., & Ning, P. (2007). Security for wireless sensor networks. New York: Springer. Information and communications security 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings. (2006). Berlin ;|aNew York: Springer. Zhai, Y., Ning, P., & Xu, J. (2006). Integrating IDS alert correlation and OS-level dependency tracking. In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (Lecture notes in computer science; 3975) (Vol. 3975, pp. 272–284). https://doi.org/10.1007/11760146_24 Du, W., Fang, L., & Peng, N. (2006, July). LAD: Localization anomaly detection for wireless sensor networks. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 66, pp. 874–886. https://doi.org/10.1016/j.jpdc.2005.12.011 Sun, K., Ning, P., & Wang, C. (2006). Secure and resilient clock synchronization in wireless sensor networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 24(2), 395–408. https://doi.org/10.1109/JSAC.2005.861396 Sun, K., Ning, P., & Wang, C. (2005). Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2(3), 177–189. https://doi.org/10.1109/TDSC.2005.36 Wang, P., Ning, P., & Reeves, D. S. (2005). Network access control for mobile ad-hoc networks. Information and Communications Security, 3783, 350–362. Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Certificate recommendations to improve the robustness of web of trust. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303). https://doi.org/10.1007/978-3-540-30144-8_25 Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Improving robustness of PGP keyrings by conflict detection. In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207). https://doi.org/10.1007/978-3-540-24660-2_16 Ning, P., Jajodia, S., & Wang, S. (2004). Intrusion detection in distributed systems: An abstraction-based approach. Boston: Kluwer Academic Publishers. Wang, P., Ning, P., & Reeves, D. S. (2004). Storage-efficient stateless group key revocation. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38). https://doi.org/10.1007/978-3-540-30144-8_3 Li, Y. J., Ning, P., Wang, X. S., & Jajodia, S. (2003). Discovering calendar-based temporal association rules. DATA & KNOWLEDGE ENGINEERING, 44(2), 193–218. https://doi.org/10.1016/S0169-023X(02)00135-0 Ning, P., Wang, X. Y. S., & Jajodia, S. (2002, September). An algebraic representation of calendars. ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, Vol. 36, pp. 5–38. https://doi.org/10.1023/A:1015835418881 Ning, P., Cui, Y., & Reeves, D. S. (2002). Analyzing intensive intrusion alerts via correlation. In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94). https://doi.org/10.1007/3-540-36084-0_5 Ning, P., Jajodia, S., & Wang, X. Y. S. (2002). Design and implementation of a decentralized prototype system for detecting distributed attacks. COMPUTER COMMUNICATIONS, 25(15), 1374–1391. https://doi.org/10.1016/S0140-3664(02)00039-7