A new cell counter based attack against tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 114 | 2009 |
Security vulnerabilities of internet of things: A case study of the smart plug system Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu IEEE Internet of Things Journal 4 (6), 1899-1909, 2017 | 113 | 2017 |
Fingerprint attack against touch-enabled devices Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 88 | 2012 |
Blind recognition of touched keys on mobile devices Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 73 | 2014 |
A New Cell-Counting-Based Attack Against Tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Networking, IEEE/ACM Transactions on, 1-1, 0 | 64 | |
Extensive analysis and large-scale empirical evaluation of tor bridge discovery Z Ling, J Luo, W Yu, M Yang, X Fu 2012 Proceedings IEEE INFOCOM, 2381-2389, 2012 | 56 | 2012 |
One cell is enough to break tor’s anonymity X Fu, Z Ling, J Luo, W Yu, W Jia, W Zhao Proceedings of Black Hat Technical Security Conference, 578-589, 2009 | 55 | 2009 |
Blind detection of spread spectrum flow watermarks W Jia, FP Tso, Z Ling, X Fu, D Xuan, W Yu Security and Communication Networks 6 (3), 257-274, 2013 | 51 | 2013 |
Protocol-level hidden server discovery Z Ling, J Luo, K Wu, X Fu 2013 Proceedings IEEE INFOCOM, 1043-1051, 2013 | 40 | 2013 |
Torward: Discovery, blocking, and traceback of malicious traffic over tor Z Ling, J Luo, K Wu, W Yu, X Fu IEEE Transactions on Information Forensics and Security 10 (12), 2515-2530, 2015 | 39 | 2015 |
TorWard: Discovery of malicious traffic over Tor Z Ling, J Luo, K Wu, W Yu, X Fu IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1402-1410, 2014 | 39 | 2014 |
Novel packet size-based covert channel attacks against anonymizer Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo IEEE Transactions on Computers 62 (12), 2411-2426, 2012 | 35 | 2012 |
SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications Y Lu, Z Ling, S Zhu, L Tang Sensors 17 (1), 109, 2017 | 33 | 2017 |
My google glass sees your passwords! Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao Proceedings of the Black Hat USA, 2014 | 31 | 2014 |
Cyber Crime Scene Investigations (C˛SI) through Cloud Computing X Fu, Z Ling, W Yu, J Luo 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 31 | 2010 |
A potential HTTP-based application-level attack against Tor X Wang, J Luo, M Yang, Z Ling Future Generation Computer Systems 27 (1), 67-77, 2011 | 27 | 2011 |
An end-to-end view of iot security and privacy Z Ling, K Liu, Y Xu, Y Jin, X Fu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 26 | 2017 |
On malware leveraging the Android accessibility framework J Kraunelis, Y Chen, Z Ling, X Fu, W Zhao International Conference on Mobile and Ubiquitous Systems: Computing …, 2013 | 26 | 2013 |
Protocol-level Attacks against Tor Z Ling, J Luo, W Yu, X Fu, W Jia, W Zhao Computer Networks, 2012 | 25 | 2012 |
Efficient fingerprinting-based android device identification with zero-permission identifiers W Wu, J Wu, Y Wang, Z Ling, M Yang IEEE Access 4, 8073-8083, 2016 | 22 | 2016 |