Login / Signup
Peng Zhou
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 6
Top Topics
Cumulative Sum
Internet Archive
Semi Fragile Watermarking
Anomaly Detection
Top Venues
IET Commun.
IEEE Trans. Netw. Serv. Manag.
Comput. Secur.
IEEE Trans. Dependable Secur. Comput.
</>
Publications
</>
Peng Zhou
,
Yuhan Gao
Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs.
Comput. Secur.
137 (2024)
Peng Zhou
,
Chengyuan Li
,
Chong Chen
,
Dakui Wu
,
Minrui Fei
AD: Privacy-Preserved Payload Anomaly Detection for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag.
20 (4) (2023)
Peng Zhou
,
Rocky K. C. Chang
,
Xiaojing Gu
,
Minrui Fei
,
Jianying Zhou
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Secur. Comput.
15 (1) (2018)
Peng Zhou
,
Xiaojing Gu
HTTPAS: active authentication against HTTPS man-in-the-middle attacks.
IET Commun.
10 (17) (2016)
Peng Zhou
,
Xiaojing Gu
,
Rocky K. C. Chang
Harvesting File Download Exploits in the Web: A Hacker's View.
Comput. J.
59 (4) (2016)
Peng Zhou
,
Xiaojing Gu
,
Jie Zhang
,
Minrui Fei
A priori trust inference with context-aware stereotypical deep learning.
Knowl. Based Syst.
88 (2015)
Peng Zhou
,
Xiapu Luo
,
Ang Chen
,
Rocky K. C. Chang
SGor: Trust graph based onion routing.
Comput. Networks
57 (17) (2013)
Peng Zhou
,
Xiapu Luo
,
Rocky K. C. Chang
Inference attacks against trust-based onion routing: Trust degree to the rescue.
Comput. Secur.
39 (2013)
Xiapu Luo
,
Edmond W. W. Chan
,
Peng Zhou
,
Rocky K. C. Chang
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics.
IEEE Trans. Dependable Secur. Comput.
9 (6) (2012)
Peng Zhou
,
Xiapu Luo
,
Rocky K. C. Chang
More Anonymity through Trust Degree in Trust-Based Onion Routing.
SecureComm
(2012)
Xiapu Luo
,
Peng Zhou
,
Edmond W. W. Chan
,
Wenke Lee
,
Rocky K. C. Chang
,
Roberto Perdisci
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
NDSS
(2011)
Xiapu Luo
,
Peng Zhou
,
Junjie Zhang
,
Roberto Perdisci
,
Wenke Lee
,
Rocky K. C. Chang
Exposing invisible timing-based traffic watermarks with BACKLIT.
ACSAC
(2011)
Peng Zhou
,
Xiapu Luo
,
Ang Chen
,
Rocky K. C. Chang
STor: Social Network based Anonymous Communication in Tor
CoRR
(2011)
Xiapu Luo
,
Peng Zhou
,
Edmond W. W. Chan
,
Rocky K. C. Chang
,
Wenke Lee
A combinatorial approach to network covert communications with applications in Web Leaks.
DSN
(2011)