Zhen Ling

Orcid: 0000-0001-9691-8702

According to our database1, Zhen Ling authored at least 103 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Harvest-Then-Transmit Scheduling for Throughput Maximization in Time-Varying RF Powered Systems.
IEEE J. Sel. Areas Commun., November, 2024

RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation.
ACM Trans. Sens. Networks, March, 2024

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification.
Comput. Networks, January, 2024

IdeNet: Making Neural Network Identify Camouflaged Objects Like Creatures.
IEEE Trans. Image Process., 2024

One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning.
CoRR, 2024

A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
Proceedings of the 33rd USENIX Security Symposium, 2024

Relation Mining Under Local Differential Privacy.
Proceedings of the 33rd USENIX Security Symposium, 2024

LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CQP-RFFI: Injecting a Communication-Quality Preserving RF Fingerprint for Wi-Fi Device Identification.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones.
Proceedings of the IEEE INFOCOM 2024, 2024

A De-anonymization Attack against Downloaders in Freenet.
Proceedings of the IEEE INFOCOM 2024, 2024

Samba: Detecting SSL/TLS API Misuses in IoT Binary Applications.
Proceedings of the IEEE INFOCOM 2024, 2024

WFGuard: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting.
Proceedings of the IEEE INFOCOM 2024, 2024

CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Unified View of IoT and CPS Security and Privacy.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A practical multi-tab website fingerprinting attack.
J. Inf. Secur. Appl., December, 2023

Strong Anonymous Communication System Based on Segment Routing Over SDN.
Comput. J., December, 2023

Mobile applications identification using autoencoder based electromagnetic side channel analysis.
J. Inf. Secur. Appl., June, 2023

Wi-Fi device identification based on multi-domain physical layer fingerprint.
Comput. Commun., April, 2023

Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks.
IEEE Trans. Netw. Serv. Manag., March, 2023

Sensor-based implicit authentication through learning user physiological and behavioral characteristics.
Comput. Commun., 2023

Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

A Comprehensive and Long-term Evaluation of Tor V3 Onion Services.
Proceedings of the IEEE INFOCOM 2023, 2023

TorDNS: A Novel Correlated Onion Address Generation Approach and Application.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems.
IEEE Internet Things J., 2022

Learning-aided client association control for high-density WLANs.
Comput. Networks, 2022

TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery.
Proceedings of the IEEE INFOCOM 2022, 2022

Towards an Efficient Defense against Deep Learning based Website Fingerprinting.
Proceedings of the IEEE INFOCOM 2022, 2022

Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things.
Proceedings of the IEEE INFOCOM 2022, 2022

Implication of Animation on Android Security.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes.
J. Syst. Archit., 2021

On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems.
IEEE Internet Things J., 2021

Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Prison Break of Android Reflection Restriction and Defense.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

802.11ac Device Identification based on MAC Frame Analysis.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Probe Request Based Device Identification Attack and Defense.
Sensors, 2020

A Novel IM Sync Message-Based Cross-Device Tracking.
Secur. Commun. Networks, 2020

STIR: A Smart and Trustworthy IoT System Interconnecting Legacy IR Devices.
IEEE Internet Things J., 2020

FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices.
Future Gener. Comput. Syst., 2020

BLESS: A BLE Application Security Scanning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data.
Multim. Tools Appl., 2019

Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

On Misconception of Hardware and Cost in IoT Security and Privacy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

I Know What You Enter on Gear VR.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs.
Wirel. Commun. Mob. Comput., 2018

On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Secur. Commun. Networks, 2018

On the limitations of existing notions of location privacy.
Future Gener. Comput. Syst., 2018

IoT Security: An End-to-End View and Case Study.
CoRR, 2018

Turning Legacy IR Devices into Smart IoT Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

SecT: A Lightweight Secure Thing-Centered IoT Communication System.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Research on an Improved Algorithm for Eliminating Gross Error in UAV Image Mosaic.
Proceedings of the 26th International Conference on Geoinformatics, 2018

2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wirel. Commun. Mob. Comput., 2017

Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting.
Wirel. Commun. Mob. Comput., 2017

SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications.
Sensors, 2017

Canoe: An Autonomous Infrastructure-Free Indoor Navigation System.
Sensors, 2017

Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet Things J., 2017

Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurr. Comput. Pract. Exp., 2017

A novel attack to track users based on the behavior patterns.
Concurr. Comput. Pract. Exp., 2017

Occupancy-aided energy disaggregation.
Comput. Networks, 2017

A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

An End-to-End View of IoT Security and Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Implicit authentication for mobile device based on 3D magnetic finger motion pattern.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

2016
Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Secur. Comput., 2016

Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016

Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Real-Time Detection of Malicious Behavior in Android Apps.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
On Malware Leveraging the Android Accessibility Framework.
EAI Endorsed Trans. Ubiquitous Environ., 2015

Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distributed Syst., 2015

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Inf. Forensics Secur., 2015

De-anonymizing and countermeasures in anonymous communication networks.
IEEE Commun. Mag., 2015

Blind Recognition of Text Input on Mobile Devices via Natural Language Processing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

A Novel Behavior-Based Tracking Attack for User Identification.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Blind Recognition of Touched Keys: Attack and Countermeasures.
CoRR, 2014

TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013

Blind detection of spread spectrum flow watermarks.
Secur. Commun. Networks, 2013

Protocol-level attacks against Tor.
Comput. Networks, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Protocol-level hidden server discovery.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012

A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Fingerprint attack against touch-enabled devices.
Proceedings of the SPSM'12, 2012

How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A potential HTTP-based application-level attack against Tor.
Future Gener. Comput. Syst., 2011

A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Proceedings of IEEE International Conference on Communications, 2011

2010
Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
A novel flow multiplication attack against Tor.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
An HMM Approach to Anonymity Analysis of Continuous Mixes.
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008


  Loading...