Peng Peng
Peng Peng
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces
X Wang, P Peng, C Wang, G Wang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
112018
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
62018
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
42019
Opening the blackbox of virustotal: Analyzing online phishing scan engines
P Peng, L Yang, L Song, G Wang
Proceedings of the Internet Measurement Conference, 478-485, 2019
22019
Towards the adoption of anti-spoofing protocols
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
22017
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
12019
A Measurement Approach to Understanding the Data Flow of Phishing from Attacker and Defender Perspectives
P Peng
Virginia Tech, 2020
2020
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
W Xiangwen, P Peng, C Wang, G Wang
The ACM Asia Conference on Computer and Communications Security (ASIA CCS’18), 2018
2018
Towards the Adoption of Anti-spoofing Protocols for Email Systems
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–9