default search action
Peng Zhou 0002
Person information
- affiliation: Shanghai University, School of Mechatronic Engineering and Automation, China
- affiliation (PhD 2014): Hong Kong Polytechnic University, Hong Kong
Other persons with the same name
- Peng Zhou — disambiguation page
- Peng Zhou 0001 — Tianjin University, Department of Biomedical Engineering, College of Precision Instruments and Optoelectronics Engineering, China
- Peng Zhou 0003 — University of Electronic Science and Technology of China, Center for Informational Biology, Chengdu, China (and 1 more)
- Peng Zhou 0004 — University of Science and Technology Beijing, Institute of Engineering Technology, China
- Peng Zhou 0005 — Harbin Institute of Technology, School of Computer Science and Technology, China (and 1 more)
- Peng Zhou 0006 — Anhui University, School of Computer Science and Technology, Hefei, China (and 1 more)
- Peng Zhou 0007 — Tsinghua University, Department of Foreign Languages and Literatures, Beijing, China (and 1 more)
- Peng Zhou 0008 — Hefei University of Technology, China
- Peng Zhou 0009 — University of Maryland, College Park, MD, USA
- Peng Zhou 0010 — Shanghai Jiaotong University, Department of Electrical Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Peng Zhou, Yuhan Gao:
Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs. Comput. Secur. 137: 103625 (2024) - 2023
- [j12]Peng Zhou, Chengyuan Li, Chong Chen, Dakui Wu, Minrui Fei:
P3 AD: Privacy-Preserved Payload Anomaly Detection for Industrial Internet of Things. IEEE Trans. Netw. Serv. Manag. 20(4): 5103-5114 (2023) - 2021
- [j11]Peng Zhou, Gongyan Zhou, Dakui Wu, Minrui Fei:
Detecting multi-stage attacks using sequence-to-sequence model. Comput. Secur. 105: 102203 (2021) - [j10]Peng Zhou, Xiaojing Gu, Surya Nepal, Jianying Zhou:
Modeling social worm propagation for advanced persistent threats. Comput. Secur. 108: 102321 (2021) - 2020
- [c7]Peng Zhou:
Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture. MSN 2020: 228-235
2010 – 2019
- 2019
- [j9]Dajun Du, Rui Chen, Xue Li, Lei Wu, Peng Zhou, Minrui Fei:
Malicious data deception attacks against power systems: A new case and its detection method. Trans. Inst. Meas. Control 41(6): 1590-1599 (2019) - 2018
- [j8]Peng Zhou, Rocky K. C. Chang, Xiaojing Gu, Minrui Fei, Jianying Zhou:
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks. IEEE Trans. Dependable Secur. Comput. 15(1): 98-111 (2018) - 2017
- [c6]Mingliang Ma, Peng Zhou, Dajun Du, Chen Peng, Minrui Fei, Hanan Mubarak AlBuflasa:
Detecting Replay Attacks in Power Systems: A Data-Driven Approach. LSMS/ICSEE (3) 2017: 450-457 - [c5]Yanbo Dong, Peng Zhou:
Jamming Attacks Against Control Systems: A Survey. LSMS/ICSEE (2) 2017: 566-574 - 2016
- [j7]Peng Zhou, Xiaojing Gu, Rocky K. C. Chang:
Harvesting File Download Exploits in the Web: A Hacker's View. Comput. J. 59(4): 522-540 (2016) - [j6]Peng Zhou, Xiaojing Gu:
HTTPAS: active authentication against HTTPS man-in-the-middle attacks. IET Commun. 10(17): 2308-2314 (2016) - 2015
- [j5]Peng Zhou, Xiaojing Gu, Jie Zhang, Minrui Fei:
A priori trust inference with context-aware stereotypical deep learning. Knowl. Based Syst. 88: 97-106 (2015) - [j4]Peng Zhou, Siwei Jiang, Athirai Aravazhi Irissappane, Jie Zhang, Jianying Zhou, Joseph Chee Ming Teo:
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 10(3): 613-625 (2015) - 2013
- [j3]Peng Zhou, Xiapu Luo, Ang Chen, Rocky K. C. Chang:
SGor: Trust graph based onion routing. Comput. Networks 57(17): 3522-3544 (2013) - [j2]Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
Inference attacks against trust-based onion routing: Trust degree to the rescue. Comput. Secur. 39: 431-446 (2013) - 2012
- [j1]Xiapu Luo, Edmond W. W. Chan, Peng Zhou, Rocky K. C. Chang:
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics. IEEE Trans. Dependable Secur. Comput. 9(6): 890-902 (2012) - [c4]Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
More Anonymity through Trust Degree in Trust-Based Onion Routing. SecureComm 2012: 273-291 - 2011
- [c3]Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206 - [c2]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. DSN 2011: 474-485 - [c1]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011 - [i1]Peng Zhou, Xiapu Luo, Ang Chen, Rocky K. C. Chang:
STor: Social Network based Anonymous Communication in Tor. CoRR abs/1110.5794 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint