Zhen Ling
According to our database1,
Zhen Ling
authored at least 49 papers
between 2008 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs.
Wireless Communications and Mobile Computing, 2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Security and Communication Networks, 2018
On the limitations of existing notions of location privacy.
Future Generation Comp. Syst., 2018
Turning Legacy IR Devices into Smart IoT Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
SecT: A Lightweight Secure Thing-Centered IoT Communication System.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Research on an Improved Algorithm for Eliminating Gross Error in UAV Image Mosaic.
Proceedings of the 26th International Conference on Geoinformatics, 2018
2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wireless Communications and Mobile Computing, 2017
Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting.
Wireless Communications and Mobile Computing, 2017
SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications.
Sensors, 2017
Canoe: An Autonomous Infrastructure-Free Indoor Navigation System.
Sensors, 2017
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet of Things Journal, 2017
Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurrency and Computation: Practice and Experience, 2017
A novel attack to track users based on the behavior patterns.
Concurrency and Computation: Practice and Experience, 2017
Occupancy-aided energy disaggregation.
Computer Networks, 2017
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
An End-to-End View of IoT Security and Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Implicit authentication for mobile device based on 3D magnetic finger motion pattern.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017
2016
Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Sec. Comput., 2016
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016
Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Real-Time Detection of Malicious Behavior in Android Apps.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distrib. Syst., 2015
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Information Forensics and Security, 2015
De-anonymizing and countermeasures in anonymous communication networks.
IEEE Communications Magazine, 2015
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
A Novel Behavior-Based Tracking Attack for User Identification.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013
Protocol-level attacks against Tor.
Computer Networks, 2013
How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
On Malware Leveraging the Android Accessibility Framework.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Protocol-level hidden server discovery.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012
A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Fingerprint attack against touch-enabled devices.
Proceedings of the SPSM'12, 2012
How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
A potential HTTP-based application-level attack against Tor.
Future Generation Comp. Syst., 2011
A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Proceedings of IEEE International Conference on Communications, 2011
2010
Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
2009
Blind Detection of Spread Spectrum Flow Watermarks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
A novel flow multiplication attack against Tor.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009
A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
An HMM Approach to Anonymity Analysis of Continuous Mixes.
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008