Zhen Ling
Orcid: 0000-0001-9691-8702
According to our database1,
Zhen Ling
authored at least 101 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Optimal Harvest-Then-Transmit Scheduling for Throughput Maximization in Time-Varying RF Powered Systems.
IEEE J. Sel. Areas Commun., November, 2024
RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation.
ACM Trans. Sens. Networks, March, 2024
TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification.
Comput. Networks, January, 2024
IEEE Trans. Image Process., 2024
One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning.
CoRR, 2024
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CQP-RFFI: Injecting a Communication-Quality Preserving RF Fingerprint for Wi-Fi Device Identification.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
WFGuard: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
2023
J. Inf. Secur. Appl., December, 2023
Comput. J., December, 2023
Mobile applications identification using autoencoder based electromagnetic side channel analysis.
J. Inf. Secur. Appl., June, 2023
Comput. Commun., April, 2023
Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks.
IEEE Trans. Netw. Serv. Manag., March, 2023
Sensor-based implicit authentication through learning user physiological and behavioral characteristics.
Comput. Commun., 2023
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems.
IEEE Internet Things J., 2022
Comput. Networks, 2022
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
J. Syst. Archit., 2021
IEEE Internet Things J., 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
IEEE Internet Things J., 2020
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices.
Future Gener. Comput. Syst., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data.
Multim. Tools Appl., 2019
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs.
Wirel. Commun. Mob. Comput., 2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Secur. Commun. Networks, 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 26th International Conference on Geoinformatics, 2018
2017
Wirel. Commun. Mob. Comput., 2017
Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting.
Wirel. Commun. Mob. Comput., 2017
Sensors, 2017
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet Things J., 2017
Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Implicit authentication for mobile device based on 3D magnetic finger motion pattern.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
EAI Endorsed Trans. Ubiquitous Environ., 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Commun. Mag., 2015
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Computers, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Future Gener. Comput. Syst., 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
2009
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008