Follow
Zhen Ling
Zhen Ling
Verified email at seu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Security vulnerabilities of internet of things: A case study of the smart plug system
Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu
IEEE Internet of Things Journal 4 (6), 1899-1909, 2017
2562017
A new cell counter based attack against tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1282009
Blind recognition of touched keys on mobile devices
Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1152014
Fingerprint attack against touch-enabled devices
Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu
Proceedings of the second ACM workshop on Security and privacy in …, 2012
1072012
An end-to-end view of IoT security and privacy
Z Ling, K Liu, Y Xu, Y Jin, X Fu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
912017
A New Cell-Counting-Based Attack Against Tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Networking, IEEE/ACM Transactions on, 1-1, 0
88
SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications
Y Lu, Z Ling, S Zhu, L Tang
Sensors 17 (1), 109, 2017
702017
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Z Ling, J Luo, W Yu, M Yang, X Fu
2012 Proceedings IEEE INFOCOM, 2381-2389, 2012
702012
One cell is enough to break tor’s anonymity
X Fu, Z Ling, J Luo, W Yu, W Jia, W Zhao
Proceedings of Black Hat Technical Security Conference, 578-589, 2009
672009
Torward: Discovery, blocking, and traceback of malicious traffic over tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE Transactions on Information Forensics and Security 10 (12), 2515-2530, 2015
612015
Blind detection of spread spectrum flow watermarks
W Jia, FP Tso, Z Ling, X Fu, D Xuan, W Yu
Security and Communication Networks 6 (3), 257-274, 2013
582013
TorWard: Discovery of malicious traffic over Tor
Z Ling, J Luo, K Wu, W Yu, X Fu
IEEE INFOCOm 2014-IEEE conference on computer communications, 1402-1410, 2014
562014
Protocol-level hidden server discovery
Z Ling, J Luo, K Wu, X Fu
2013 Proceedings IEEE INFOCOM, 1043-1051, 2013
562013
Novel packet size-based covert channel attacks against anonymizer
Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo
IEEE Transactions on Computers 62 (12), 2411-2426, 2012
532012
On manually reverse engineering communication protocols of linux-based iot systems
K Liu, M Yang, Z Ling, H Yan, Y Zhang, X Fu, W Zhao
IEEE Internet of Things Journal 8 (8), 6815-6827, 2020
522020
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Z Ling, H Yan, X Shao, J Luo, Y Xu, B Pearson, X Fu
Journal of Systems Architecture 119, 102240, 2021
512021
On misconception of hardware and cost in IoT security and privacy
B Pearson, L Luo, Y Zhang, R Dey, Z Ling, M Bassiouni, X Fu
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
472019
I know what you enter on gear vr
Z Ling, Z Li, C Chen, J Luo, W Yu, X Fu
2019 IEEE Conference on Communications and Network Security (CNS), 241-249, 2019
442019
My google glass sees your passwords
Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao
Proceedings of the Black Hat USA, 2014
422014
Protocol-level Attacks against Tor
Z Ling, J Luo, W Yu, X Fu, W Jia, W Zhao
Computer Networks, 2012
422012
The system can't perform the operation now. Try again later.
Articles 1–20