Follow
Peng Zhou
Title
Cited by
Cited by
Year
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
ISOC/USENIX NDSS, 2011
2172011
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo
IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015
922015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
ACM ACSAC, 197-206, 2011
452011
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
392012
Malicious data deception attacks against power systems: A new case and its detection method
D Du, R Chen, X Li, L Wu, P Zhou, M Fei
Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019
372019
A priori trust inference with context-aware stereotypical deep learning
P Zhou, X Gu, J Zhang, M Fei
Knowledge-Based Systems 88, 97-106, 2015
352015
Detecting multi-stage attacks using sequence-to-sequence model
P Zhou, G Zhou, D Wu, M Fei
Computers & Security 105, 102203, 2021
202021
A combinatorial approach to network covert communications with applications in Web Leaks
X Luo, P Zhou, EWW Chan, RKC Chang, W Lee
IEEE/IFIP DSN, 474-485, 2011
202011
Botnets: Architectures, countermeasures, and challenges
G Kambourakis, M Anagnostopoulos, W Meng, P Zhou
CRC Press, 2019
192019
Intrusion detection in SCADA system: A survey
P Zeng, P Zhou
Intelligent Computing and Internet of Things: First International Conference …, 2018
182018
SGor: Trust graph based onion routing
P Zhou, X Luo, A Chen, RKC Chang
Computer Networks 57 (17), 3522-3544, 2013
152013
Detecting replay attacks in power systems: A data-driven approach
M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa
Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017
132017
Modeling social worm propagation for advanced persistent threats
P Zhou, X Gu, S Nepal, J Zhou
Computers & Security 108, 102321, 2021
102021
Stor: Social network based anonymous communication in tor
P Zhou, X Luo, A Chen, RKC Chang
arXiv preprint arXiv:1110.5794, 2011
102011
Inference attacks against trust-based onion routing: Trust degree to the rescue
P Zhou, X Luo, RKC Chang
Computers & Security 39, 431-446, 2013
92013
Federated deep payload classification for industrial internet with cloud-edge architecture
P Zhou
2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020
62020
Payload-based anomaly detection for industrial internet using encoder assisted GAN
P Zhou
2020 IEEE 6th International Conference on Computer and Communications (ICCC …, 2020
52020
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
P Zhou, R Chang, X Gu, M Fei, J Zhou
IEEE Transactions on Dependable and Secure Computing, 2018
42018
More anonymity through trust degree in trust-based onion routing
P Zhou, X Luo, RKC Chang
Security and Privacy in Communication Networks: 8th International ICST …, 2013
42013
Feature Extraction for Payload Classification: A Byte Pair Encoding Algorithm
T Xu, P Zhou
2022 IEEE 8th International Conference on Computer and Communications (ICCC …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20