Follow
Zhen Ling
Zhen Ling
Verified email at seu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Security vulnerabilities of internet of things: A case study of the smart plug system
Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu
IEEE Internet of Things Journal 4 (6), 1899-1909, 2017
2282017
A new cell counter based attack against tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1252009
Blind recognition of touched keys on mobile devices
Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1042014
Fingerprint attack against touch-enabled devices
Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu
Proceedings of the second ACM workshop on Security and privacy in …, 2012
1032012
A New Cell-Counting-Based Attack Against Tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Networking, IEEE/ACM Transactions on, 1-1, 0
85
An end-to-end view of IoT security and privacy
Z Ling, K Liu, Y Xu, Y Jin, X Fu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
802017
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Z Ling, J Luo, W Yu, M Yang, X Fu
2012 Proceedings IEEE INFOCOM, 2381-2389, 2012
672012
One cell is enough to break tor’s anonymity
X Fu, Z Ling, J Luo, W Yu, W Jia, W Zhao
Proceedings of Black Hat Technical Security Conference, 578-589, 2009
662009
SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications
Y Lu, Z Ling, S Zhu, L Tang
Sensors 17 (1), 109, 2017
562017
Blind detection of spread spectrum flow watermarks
W Jia, FP Tso, Z Ling, X Fu, D Xuan, W Yu
Security and Communication Networks 6 (3), 257-274, 2013
562013
Torward: Discovery, blocking, and traceback of malicious traffic over tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE Transactions on Information Forensics and Security 10 (12), 2515-2530, 2015
552015
TorWard: Discovery of malicious traffic over Tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE INFOCOm 2014-IEEE conference on computer communications, 1402-1410, 2014
522014
Protocol-level hidden server discovery
Z Ling, J Luo, K Wu, X Fu
2013 Proceedings IEEE INFOCOM, 1043-1051, 2013
502013
Novel packet size-based covert channel attacks against anonymizer
Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo
IEEE Transactions on Computers 62 (12), 2411-2426, 2012
482012
Cyber crime scene investigations (C²SI) through cloud computing
X Fu, Z Ling, W Yu, J Luo
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
392010
On misconception of hardware and cost in IoT security and privacy
B Pearson, L Luo, Y Zhang, R Dey, Z Ling, M Bassiouni, X Fu
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
382019
My google glass sees your passwords
Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao
Proceedings of the Black Hat USA, 2014
382014
Protocol-level Attacks against Tor
Z Ling, J Luo, W Yu, X Fu, W Jia, W Zhao
Computer Networks, 2012
382012
On malware leveraging the android accessibility framework
J Kraunelis, Y Chen, Z Ling, X Fu, W Zhao
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 10th …, 2014
362014
A potential HTTP-based application-level attack against Tor
X Wang, J Luo, M Yang, Z Ling
Future Generation Computer Systems 27 (1), 67-77, 2011
342011
The system can't perform the operation now. Try again later.
Articles 1–20