Peng Zhou
Cited by
Cited by
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo
IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
ACM ACSAC, 197-206, 2011
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
A priori trust inference with context-aware stereotypical deep learning
P Zhou, X Gu, J Zhang, M Fei
Knowledge-Based Systems 88, 97-106, 2015
Malicious data deception attacks against power systems: A new case and its detection method
D Du, R Chen, X Li, L Wu, P Zhou, M Fei
Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019
A combinatorial approach to network covert communications with applications in Web Leaks
X Luo, P Zhou, EWW Chan, RKC Chang, W Lee
IEEE/IFIP DSN, 474-485, 2011
SGor: Trust graph based onion routing
P Zhou, X Luo, A Chen, RKC Chang
Computer Networks 57 (17), 3522-3544, 2013
Kernel based color estimation for night vision imagery
X Gu, S Sun, P Zhou
Optics Communications 285 (7), 1697-1703, 2012
STor: Social Network based Anonymous Communication in Tor
P Zhou, X Luo, A Chen, RKC Chang
arXiv preprint arXiv:1110.5794, 2011
Detecting replay attacks in power systems: A data-driven approach
M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa
Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017
Jamming attacks against control systems: A survey
Y Dong, P Zhou
Intelligent Computing, Networked Control, and Their Engineering Applications …, 2017
Inference attacks against trust-based onion routing: Trust degree to the rescue
P Zhou, X Luo, RKC Chang
Computers & Security 39, 431-446, 2013
Botnets: Architectures, Countermeasures, and Challenges
G Kambourakis, M Anagnostopoulos, W Meng, P Zhou
CRC Press, 2019
More anonymity through trust degree in trust-based onion routing
P Zhou, X Luo, RKC Chang
International Conference on Security and Privacy in Communication Systems …, 2012
Intrusion detection in SCADA system: a survey
P Zeng, P Zhou
Intelligent Computing and Internet of Things, 342-351, 2018
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
P Zhou, R Chang, X Gu, M Fei, J Zhou
IEEE Transactions on Dependable and Secure Computing, 2018
HTTPAS: active authentication against HTTPS man-in-the-middle attacks
P Zhou, X Gu
IET Communications 10 (17), 2308-2314, 2016
Harvesting File Download Exploits in the Web: A Hacker's View
P Zhou, X Gu, RKC Chang
Computer Journal, 2015
Detecting multi-stage attacks using sequence-to-sequence model
P Zhou, G Zhou, D Wu, M Fei
Computers & Security 105, 102203, 2021
The system can't perform the operation now. Try again later.
Articles 1–20