HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci ISOC/USENIX NDSS, 2011 | 231 | 2011 |
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs P Zhou, S Jiang, AA Irissappane, J Zhang, J Zhou, JCM Teo IEEE Transactions on Information Forensics and Security 10 (3), 613 - 625, 2015 | 98 | 2015 |
Exposing invisible timing-based traffic watermarks with BACKLIT X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang ACM ACSAC, 197-206, 2011 | 46 | 2011 |
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics X Luo, EWW Chan, P Zhou, RKC Chang IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012 | 39 | 2012 |
Malicious data deception attacks against power systems: A new case and its detection method D Du, R Chen, X Li, L Wu, P Zhou, M Fei Transactions of the Institute of Measurement and Control 41 (6), 1590-1599, 2019 | 38 | 2019 |
A priori trust inference with context-aware stereotypical deep learning P Zhou, X Gu, J Zhang, M Fei Knowledge-Based Systems 88, 97-106, 2015 | 35 | 2015 |
Botnets: Architectures, countermeasures, and challenges G Kambourakis, M Anagnostopoulos, W Meng, P Zhou CRC Press, 2019 | 25 | 2019 |
Detecting multi-stage attacks using sequence-to-sequence model P Zhou, G Zhou, D Wu, M Fei Computers & Security 105, 102203, 2021 | 23 | 2021 |
Intrusion detection in SCADA system: A survey P Zeng, P Zhou Intelligent Computing and Internet of Things: First International Conference …, 2018 | 22 | 2018 |
A combinatorial approach to network covert communications with applications in Web Leaks X Luo, P Zhou, EWW Chan, RKC Chang, W Lee IEEE/IFIP DSN, 474-485, 2011 | 21 | 2011 |
Detecting replay attacks in power systems: A data-driven approach M Ma, P Zhou, D Du, C Peng, M Fei, HM AlBuflasa Advanced Computational Methods in Energy, Power, Electric Vehicles, and …, 2017 | 15 | 2017 |
SGor: Trust graph based onion routing P Zhou, X Luo, A Chen, RKC Chang Computer Networks 57 (17), 3522-3544, 2013 | 15 | 2013 |
Modeling social worm propagation for advanced persistent threats P Zhou, X Gu, S Nepal, J Zhou Computers & Security 108, 102321, 2021 | 11 | 2021 |
Stor: Social network based anonymous communication in tor P Zhou, X Luo, A Chen, RKC Chang arXiv preprint arXiv:1110.5794, 2011 | 10 | 2011 |
Inference attacks against trust-based onion routing: Trust degree to the rescue P Zhou, X Luo, RKC Chang Computers & Security 39, 431-446, 2013 | 9 | 2013 |
Federated deep payload classification for industrial internet with cloud-edge architecture P Zhou 2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020 | 8 | 2020 |
Payload-based anomaly detection for Industrial Internet using encoder assisted GAN P Zhou 2020 IEEE 6th International Conference on Computer and Communications (ICCC …, 2020 | 5 | 2020 |
Feature Extraction for Payload Classification: A Byte Pair Encoding Algorithm T Xu, P Zhou 2022 IEEE 8th International Conference on Computer and Communications (ICCC …, 2022 | 4 | 2022 |
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks P Zhou, R Chang, X Gu, M Fei, J Zhou IEEE Transactions on Dependable and Secure Computing, 2018 | 4 | 2018 |
More anonymity through trust degree in trust-based onion routing P Zhou, X Luo, RKC Chang Security and Privacy in Communication Networks: 8th International ICST …, 2013 | 4 | 2013 |