Follow
Peng Peng
Peng Peng
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Opening the blackbox of virustotal: Analyzing online phishing scan engines
P Peng, L Yang, L Song, G Wang
Proceedings of the Internet Measurement Conference, 478-485, 2019
1182019
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
512019
You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces
X Wang, P Peng, C Wang, G Wang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
362018
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
332018
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
272019
Towards the adoption of anti-spoofing protocols
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
32017
A Measurement Approach to Understanding the Data Flow of Phishing from Attacker and Defender Perspectives
P Peng
Virginia Tech, 2020
2020
What Happens After You Leak Your Password
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
2019
Towards the Adoption of Anti-spoofing Protocols for Email Systems.
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–9