Seguir
Peng Zhou
Título
Citado por
Citado por
Año
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
ISOC/USENIX NDSS, 2011
2182011
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo
IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015
942015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
ACM ACSAC, 197-206, 2011
462011
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
392012
Malicious data deception attacks against power systems: A new case and its detection method
D Du, R Chen, X Li, L Wu, P Zhou, M Fei
Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019
372019
A priori trust inference with context-aware stereotypical deep learning
P Zhou, X Gu, J Zhang, M Fei
Knowledge-Based Systems 88, 97-106, 2015
352015
Botnets: Architectures, countermeasures, and challenges
G Kambourakis, M Anagnostopoulos, W Meng, P Zhou
CRC Press, 2019
212019
Detecting multi-stage attacks using sequence-to-sequence model
P Zhou, G Zhou, D Wu, M Fei
Computers & Security 105, 102203, 2021
202021
A combinatorial approach to network covert communications with applications in Web Leaks
X Luo, P Zhou, EWW Chan, RKC Chang, W Lee
IEEE/IFIP DSN, 474-485, 2011
202011
Intrusion detection in SCADA system: A survey
P Zeng, P Zhou
Intelligent Computing and Internet of Things: First International Conference …, 2018
192018
SGor: Trust graph based onion routing
P Zhou, X Luo, A Chen, RKC Chang
Computer Networks 57 (17), 3522-3544, 2013
152013
Detecting replay attacks in power systems: A data-driven approach
M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa
Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017
132017
Modeling social worm propagation for advanced persistent threats
P Zhou, X Gu, S Nepal, J Zhou
Computers & Security 108, 102321, 2021
102021
Stor: Social network based anonymous communication in tor
P Zhou, X Luo, A Chen, RKC Chang
arXiv preprint arXiv:1110.5794, 2011
102011
Inference attacks against trust-based onion routing: Trust degree to the rescue
P Zhou, X Luo, RKC Chang
Computers & Security 39, 431-446, 2013
92013
Federated deep payload classification for industrial internet with cloud-edge architecture
P Zhou
2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020
62020
Payload-based anomaly detection for industrial internet using encoder assisted GAN
P Zhou
2020 IEEE 6th International Conference on Computer and Communications (ICCC …, 2020
52020
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
P Zhou, R Chang, X Gu, M Fei, J Zhou
IEEE Transactions on Dependable and Secure Computing, 2018
42018
More anonymity through trust degree in trust-based onion routing
P Zhou, X Luo, RKC Chang
Security and Privacy in Communication Networks: 8th International ICST …, 2013
42013
Feature Extraction for Payload Classification: A Byte Pair Encoding Algorithm
T Xu, P Zhou
2022 IEEE 8th International Conference on Computer and Communications (ICCC …, 2022
22022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20