Zhen Ling
Zhen Ling
Verified email at seu.edu.cn - Homepage
Cited by
Cited by
A new cell counter based attack against tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Security vulnerabilities of internet of things: A case study of the smart plug system
Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu
IEEE Internet of Things Journal 4 (6), 1899-1909, 2017
Fingerprint attack against touch-enabled devices
Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu
Proceedings of the second ACM workshop on Security and privacy in …, 2012
Blind recognition of touched keys on mobile devices
Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
A New Cell-Counting-Based Attack Against Tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Networking, IEEE/ACM Transactions on, 1-1, 0
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Z Ling, J Luo, W Yu, M Yang, X Fu
2012 Proceedings IEEE INFOCOM, 2381-2389, 2012
One cell is enough to break tor’s anonymity
X Fu, Z Ling, J Luo, W Yu, W Jia, W Zhao
Proceedings of Black Hat Technical Security Conference, 578-589, 2009
Blind detection of spread spectrum flow watermarks
W Jia, FP Tso, Z Ling, X Fu, D Xuan, W Yu
Security and Communication Networks 6 (3), 257-274, 2013
Protocol-level hidden server discovery
Z Ling, J Luo, K Wu, X Fu
2013 Proceedings IEEE INFOCOM, 1043-1051, 2013
Torward: Discovery, blocking, and traceback of malicious traffic over tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE Transactions on Information Forensics and Security 10 (12), 2515-2530, 2015
TorWard: Discovery of malicious traffic over Tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1402-1410, 2014
Novel packet size-based covert channel attacks against anonymizer
Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo
IEEE Transactions on Computers 62 (12), 2411-2426, 2012
SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications
Y Lu, Z Ling, S Zhu, L Tang
Sensors 17 (1), 109, 2017
My google glass sees your passwords!
Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao
Proceedings of the Black Hat USA, 2014
Cyber Crime Scene Investigations (C˛SI) through Cloud Computing
X Fu, Z Ling, W Yu, J Luo
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
A potential HTTP-based application-level attack against Tor
X Wang, J Luo, M Yang, Z Ling
Future Generation Computer Systems 27 (1), 67-77, 2011
An end-to-end view of iot security and privacy
Z Ling, K Liu, Y Xu, Y Jin, X Fu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
On malware leveraging the Android accessibility framework
J Kraunelis, Y Chen, Z Ling, X Fu, W Zhao
International Conference on Mobile and Ubiquitous Systems: Computing …, 2013
Protocol-level Attacks against Tor
Z Ling, J Luo, W Yu, X Fu, W Jia, W Zhao
Computer Networks, 2012
Efficient fingerprinting-based android device identification with zero-permission identifiers
W Wu, J Wu, Y Wang, Z Ling, M Yang
IEEE Access 4, 8073-8083, 2016
The system can't perform the operation now. Try again later.
Articles 1–20