Zhen Ling

According to our database1, Zhen Ling authored at least 49 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs.
Wireless Communications and Mobile Computing, 2018

On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Security and Communication Networks, 2018

On the limitations of existing notions of location privacy.
Future Generation Comp. Syst., 2018

Turning Legacy IR Devices into Smart IoT Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

SecT: A Lightweight Secure Thing-Centered IoT Communication System.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Research on an Improved Algorithm for Eliminating Gross Error in UAV Image Mosaic.
Proceedings of the 26th International Conference on Geoinformatics, 2018

2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wireless Communications and Mobile Computing, 2017

Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting.
Wireless Communications and Mobile Computing, 2017

SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications.
Sensors, 2017

Canoe: An Autonomous Infrastructure-Free Indoor Navigation System.
Sensors, 2017

Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet of Things Journal, 2017

Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurrency and Computation: Practice and Experience, 2017

A novel attack to track users based on the behavior patterns.
Concurrency and Computation: Practice and Experience, 2017

Occupancy-aided energy disaggregation.
Computer Networks, 2017

A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

An End-to-End View of IoT Security and Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Implicit authentication for mobile device based on 3D magnetic finger motion pattern.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

2016
Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Sec. Comput., 2016

Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016

Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Real-Time Detection of Malicious Behavior in Android Apps.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distrib. Syst., 2015

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Information Forensics and Security, 2015

De-anonymizing and countermeasures in anonymous communication networks.
IEEE Communications Magazine, 2015

Blind Recognition of Text Input on Mobile Devices via Natural Language Processing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

A Novel Behavior-Based Tracking Attack for User Identification.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013

Protocol-level attacks against Tor.
Computer Networks, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

On Malware Leveraging the Android Accessibility Framework.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Protocol-level hidden server discovery.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012

A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Fingerprint attack against touch-enabled devices.
Proceedings of the SPSM'12, 2012

How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A potential HTTP-based application-level attack against Tor.
Future Generation Comp. Syst., 2011

A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Proceedings of IEEE International Conference on Communications, 2011

2010
Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
Blind Detection of Spread Spectrum Flow Watermarks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A novel flow multiplication attack against Tor.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
An HMM Approach to Anonymity Analysis of Continuous Mixes.
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008


  Loading...