Follow
Peng Zhou
Title
Cited by
Cited by
Year
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
ISOC/USENIX NDSS, 2011
2032011
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo
IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015
892015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
ACM ACSAC, 197-206, 2011
432011
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
382012
Malicious data deception attacks against power systems: A new case and its detection method
D Du, R Chen, X Li, L Wu, P Zhou, M Fei
Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019
332019
A priori trust inference with context-aware stereotypical deep learning
P Zhou, X Gu, J Zhang, M Fei
Knowledge-Based Systems 88, 97-106, 2015
292015
A combinatorial approach to network covert communications with applications in Web Leaks
X Luo, P Zhou, EWW Chan, RKC Chang, W Lee
IEEE/IFIP DSN, 474-485, 2011
192011
SGor: Trust graph based onion routing
P Zhou, X Luo, A Chen, RKC Chang
Computer Networks 57 (17), 3522-3544, 2013
152013
Botnets: Architectures, countermeasures, and challenges
G Kambourakis, M Anagnostopoulos, W Meng, P Zhou
CRC Press, 2019
142019
Intrusion detection in scada system: a survey
P Zeng, P Zhou
Intelligent Computing and Internet of Things: First International Conference …, 2018
122018
Detecting replay attacks in power systems: A data-driven approach
M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa
Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017
112017
Stor: Social network based anonymous communication in tor
P Zhou, X Luo, A Chen, RKC Chang
arXiv preprint arXiv:1110.5794, 2011
102011
Detecting multi-stage attacks using sequence-to-sequence model
P Zhou, G Zhou, D Wu, M Fei
Computers & Security 105, 102203, 2021
92021
Inference attacks against trust-based onion routing: Trust degree to the rescue
P Zhou, X Luo, RKC Chang
Computers & Security 39, 431-446, 2013
72013
Modeling social worm propagation for advanced persistent threats
P Zhou, X Gu, S Nepal, J Zhou
Computers & Security 108, 102321, 2021
62021
Payload-based anomaly detection for industrial internet using encoder assisted GAN
P Zhou
2020 IEEE 6th International Conference on Computer and Communications (ICCC …, 2020
42020
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
P Zhou, R Chang, X Gu, M Fei, J Zhou
IEEE Transactions on Dependable and Secure Computing, 2018
42018
More Anonymity through Trust Degree in Trust-Based Onion Routing.
P Zhou, X Luo, RKC Chang
SecureComm, 273-291, 2012
42012
Federated deep payload classification for industrial internet with cloud-edge architecture
P Zhou
2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020
32020
HTTPAS: active authentication against HTTPS man‐in‐the‐middle attacks
P Zhou, X Gu
IET Communications 10 (17), 2308-2314, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20