Peng Zhou
TitoloCitata daAnno
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo
IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
ACM ACSAC, 197-206, 2011
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
Malicious data deception attacks against power systems: A new case and its detection method
D Du, R Chen, X Li, L Wu, P Zhou, M Fei
Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019
A priori trust inference with context-aware stereotypical deep learning
P Zhou, X Gu, J Zhang, M Fei
Knowledge-Based Systems 88, 97-106, 2015
A combinatorial approach to network covert communications with applications in Web Leaks
X Luo, P Zhou, EWW Chan, RKC Chang, W Lee
IEEE/IFIP DSN, 474-485, 2011
SGor: Trust graph based onion routing
P Zhou, X Luo, A Chen, RKC Chang
Computer networks 57 (17), 3522-3544, 2013
Kernel based color estimation for night vision imagery
X Gu, S Sun, P Zhou
Optics Communications 285 (7), 1697-1703, 2012
Detecting replay attacks in power systems: A data-driven approach
M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa
Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017
Jamming attacks against control systems: A survey
Y Dong, P Zhou
Intelligent Computing, Networked Control, and Their Engineering Applications …, 2017
Inference attacks against trust-based onion routing: Trust degree to the rescue
P Zhou, X Luo, RKC Chang
Computers & Security 39, 431-446, 2013
STor: Social Network based Anonymous Communication in Tor
P Zhou, X Luo, A Chen, RKC Chang
arXiv preprint arXiv:1110.5794, 2011
Thermal image colorization using Markov decision processes
X Gu, M He, X Gu
Memetic Computing 9 (1), 15-22, 2017
More anonymity through trust degree in trust-based onion routing
P Zhou, X Luo, RKC Chang
International Conference on Security and Privacy in Communication Systems …, 2012
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
P Zhou, R Chang, X Gu, M Fei, J Zhou
IEEE Transactions on Dependable and Secure Computing, 2018
Botnets: Architectures, Countermeasures, and Challenges
G Kambourakis, M Anagnostopoulos, W Meng, P Zhou
CRC Press, 2019
Intrusion Detection in SCADA System: A Survey
P Zeng, P Zhou
Intelligent Computing and Internet of Things, 342-351, 2018
HTTPAS: active authentication against HTTPS man-in-the-middle attacks
P Zhou, X Gu
IET Communications 10 (17), 2308-2314, 2016
Harvesting File Download Exploits in the Web: A Hacker's View
P Zhou, X Gu, RKC Chang
Computer Journal, 2015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20