Peng Zhou

Orcid: 0000-0003-4371-6714

Affiliations:
  • Shanghai University, School of Mechatronic Engineering and Automation, China
  • Hong Kong Polytechnic University, Hong Kong (PhD 2014)


According to our database1, Peng Zhou authored at least 21 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs.
Comput. Secur., February, 2024

2023
P<sup>3</sup> AD: Privacy-Preserved Payload Anomaly Detection for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag., December, 2023

2021
Detecting multi-stage attacks using sequence-to-sequence model.
Comput. Secur., 2021

Modeling social worm propagation for advanced persistent threats.
Comput. Secur., 2021

2020
Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Malicious data deception attacks against power systems: A new case and its detection method.
Trans. Inst. Meas. Control, 2019

2018
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

2017
Detecting Replay Attacks in Power Systems: A Data-Driven Approach.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017

Jamming Attacks Against Control Systems: A Survey.
Proceedings of the Intelligent Computing, Networked Control, and Their Engineering Applications, 2017

2016
HTTPAS: active authentication against HTTPS man-in-the-middle attacks.
IET Commun., 2016

Harvesting File Download Exploits in the Web: A Hacker's View.
Comput. J., 2016

2015
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs.
IEEE Trans. Inf. Forensics Secur., 2015

A priori trust inference with context-aware stereotypical deep learning.
Knowl. Based Syst., 2015

2013
Inference attacks against trust-based onion routing: Trust degree to the rescue.
Comput. Secur., 2013

SGor: Trust graph based onion routing.
Comput. Networks, 2013

2012
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics.
IEEE Trans. Dependable Secur. Comput., 2012

More Anonymity through Trust Degree in Trust-Based Onion Routing.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
STor: Social Network based Anonymous Communication in Tor
CoRR, 2011

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...