D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 72 Citations 29,510 190 World Ranking 731 National Ranking 455

Research.com Recognitions

Awards & Achievements

2007 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Peng Ning focuses on Computer network, Wireless sensor network, Computer security, Key distribution in wireless sensor networks and Key. As a part of the same scientific study, Peng Ning usually deals with the Computer network, concentrating on Wireless and frequently concerns with Broadcast communication network and Code. His Wireless sensor network research incorporates themes from Security service, Distributed computing, Base station, Authentication and Intelligent Network.

He does research in Computer security, focusing on Intrusion detection system specifically. His work is dedicated to discovering how Key distribution in wireless sensor networks, Key management are connected with Software deployment, Distribution and Overhead and other disciplines. His Public-key cryptography research integrates issues from Merkle tree and Key space.

His most cited work include:

  • Establishing pairwise keys in distributed sensor networks (1291 citations)
  • False data injection attacks against state estimation in electric power grids (1182 citations)
  • TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks (806 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer network, Computer security, Wireless sensor network, Key distribution in wireless sensor networks and Distributed computing. His work carried out in the field of Computer network brings together such families of science as Wireless, Key and Cryptography. His work in the fields of Intrusion detection system, Public-key cryptography, Alert correlation and Trusted third party overlaps with other areas such as Set.

He has included themes like Key management, Software deployment, Digital signature, Sensor node and Key distribution in his Wireless sensor network study. His Key distribution in wireless sensor networks study incorporates themes from Scheme, Wi-Fi array and Real-time computing. In his study, Cloud computing is inextricably linked to Scalability, which falls within the broad field of Distributed computing.

He most often published in these fields:

  • Computer network (41.98%)
  • Computer security (33.74%)
  • Wireless sensor network (22.63%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer network (41.98%)
  • Agronomy (4.53%)
  • Grain yield (6.17%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer network, Agronomy, Grain yield, Horticulture and Starch. His work on Authentication as part of general Computer network research is often related to Resource, thus linking different fields of science. He usually deals with Authentication and limits it to topics linked to Signature and Computer security.

His Computer security study integrates concerns from other disciplines, such as Game theoretic and User device. In general Agronomy study, his work on Pesticide and Straw often relates to the realm of Bioavailability, Soil carbon and Biofortification, thereby connecting several areas of interest. His biological study spans a wide range of topics, including Network packet, Wireless sensor network, Forward error correction, Bandwidth and Erasure code.

Between 2015 and 2021, his most popular works were:

  • Wireless Communications under Broadband Reactive Jamming Attacks (40 citations)
  • SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. (38 citations)
  • Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Computer network, Sugar, Grain yield, Horticulture and Nitrogen deficiency are his primary areas of study. His specific area of interest is Computer network, where Peng Ning studies Guard. Sugar overlaps with fields such as Sink, Vascular bundle and Starch in his research.

Peng Ning combines subjects such as Adversary and Communications system with his study of Wireless.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Establishing pairwise keys in distributed sensor networks

Donggang Liu;Peng Ning;Rongfang Li.
ACM Transactions on Information and System Security (2005)

2503 Citations

False data injection attacks against state estimation in electric power grids

Yao Liu;Peng Ning;Michael K. Reiter.
ACM Transactions on Information and System Security (2011)

2239 Citations

Establishing pairwise keys in distributed sensor networks

Donggang Liu;Peng Ning.
computer and communications security (2003)

2040 Citations

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks

An Liu;Peng Ning.
information processing in sensor networks (2008)

1080 Citations

Constructing attack scenarios through correlation of intrusion alerts

Peng Ning;Yun Cui;Douglas S. Reeves.
computer and communications security (2002)

782 Citations

Location-based pairwise key establishments for static sensor networks

Donggang Liu;Peng Ning.
security of ad hoc and sensor networks (2003)

781 Citations

An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)

781 Citations

Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou;Yajin Zhou;Xuxian Jiang;Peng Ning.
conference on data and application security and privacy (2012)

728 Citations

Multilevel μTESLA: Broadcast authentication for distributed sensor networks

Donggang Liu;Peng Ning.
ACM Transactions in Embedded Computing Systems (2004)

514 Citations

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection

Zhemin Yang;Min Yang;Yuan Zhang;Guofei Gu.
computer and communications security (2013)

432 Citations

Best Scientists Citing Peng Ning

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 72

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 63

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 50

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 50

Wei Yu

Wei Yu

Towson University

Publications: 40

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 40

Karl Henrik Johansson

Karl Henrik Johansson

Royal Institute of Technology

Publications: 39

Henrik Sandberg

Henrik Sandberg

Royal Institute of Technology

Publications: 36

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 35

Mauro Conti

Mauro Conti

University of Padua

Publications: 34

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 34

H. Vincent Poor

H. Vincent Poor

Princeton University

Publications: 33

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 32

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 32

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 31

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.