default search action
Zhen Ling
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:
TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification. Comput. Networks 238: 110115 (2024) - [j41]Juwei Guan, Xiaolin Fang, Tongxin Zhu, Zhipeng Cai, Zhen Ling, Ming Yang, Junzhou Luo:
IdeNet: Making Neural Network Identify Camouflaged Objects Like Creatures. IEEE Trans. Image Process. 33: 4824-4839 (2024) - [j40]Xiaolin Gu, Wenjia Wu, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:
RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation. ACM Trans. Sens. Networks 20(2): 41:1-41:21 (2024) - [c57]Lan Luo, Christopher Morales-Gonzalez, Shan Wang, Zhen Ling, Xinwen Fu:
Unified View of IoT and CPS Security and Privacy. ICNC 2024: 495-499 - [c56]Shan Wang, Ming Yang, Jiannong Cao, Zhen Ling, Qiang Tang, Xinwen Fu:
CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains. ICDCS 2024: 322-332 - [c55]Yonghuan Xu, Ming Yang, Zhen Ling, Zixia Liu, Xiaodan Gu, Lan Luo:
A De-anonymization Attack against Downloaders in Freenet. INFOCOM 2024: 1-10 - [c54]Xiangyu Xu, Yu Chen, Zhen Ling, Li Lu, Junzhou Luo, Xinwen Fu:
mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones. INFOCOM 2024: 351-360 - [c53]Zhen Ling, Gui Xiao, Lan Luo, Rong Wang, Xiangyu Xu, Guangchi Liu:
WFGuard: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting. INFOCOM 2024: 441-450 - [c52]Kaizheng Liu, Ming Yang, Zhen Ling, Yuan Zhang, Chongqing Lei, Lan Luo, Xinwen Fu:
Samba: Detecting SSL/TLS API Misuses in IoT Binary Applications. INFOCOM 2024: 2029-2038 - [c51]Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:
CQP-RFFI: Injecting a Communication-Quality Preserving RF Fingerprint for Wi-Fi Device Identification. IWQoS 2024: 1-10 - [c50]Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu:
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems. NDSS 2024 - [c49]Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu:
Relation Mining Under Local Differential Privacy. USENIX Security Symposium 2024 - [c48]Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu:
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. USENIX Security Symposium 2024 - [i5]Haozhen Zhang, Xi Xiao, Le Yu, Qing Li, Zhen Ling, Ye Zhang:
One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning. CoRR abs/2402.07501 (2024) - 2023
- [j39]Li Feng, Xiaoling Ni, Zhen Ling, Liangmin Wang:
Strong Anonymous Communication System Based on Segment Routing Over SDN. Comput. J. 66(12): 3092-3106 (2023) - [j38]Jinghui Zhang, Zhengjia Xu, Junhe Li, Qiangsheng Dai, Zhen Ling, Ming Yang:
Wi-Fi device identification based on multi-domain physical layer fingerprint. Comput. Commun. 204: 118-129 (2023) - [j37]Jinghui Zhang, Zichao Li, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang:
Sensor-based implicit authentication through learning user physiological and behavioral characteristics. Comput. Commun. 208: 244-255 (2023) - [j36]Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang:
Mobile applications identification using autoencoder based electromagnetic side channel analysis. J. Inf. Secur. Appl. 75: 103481 (2023) - [j35]Xiaodan Gu, Ming Yang, Bingchen Song, Wei Lan, Zhen Ling:
A practical multi-tab website fingerprinting attack. J. Inf. Secur. Appl. 79: 103627 (2023) - [j34]Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue:
Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks. IEEE Trans. Netw. Serv. Manag. 20(1): 684-696 (2023) - [c47]Lifu Wang, Kai Dong, Xiaodan Gu, Zhen Ling, Ming Yang:
Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things. CSCWD 2023: 959-964 - [c46]Chunmian Wang, Junzhou Luo, Zhen Ling, Ming Yang, Xiaodan Gu, Yu Yao:
TorDNS: A Novel Correlated Onion Address Generation Approach and Application. CSCWD 2023: 1464-1469 - [c45]Chunmian Wang, Junzhou Luo, Zhen Ling, Lan Luo, Xinwen Fu:
A Comprehensive and Long-term Evaluation of Tor V3 Onion Services. INFOCOM 2023: 1-10 - [c44]Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu:
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks. NDSS 2023 - 2022
- [j33]Wenjia Wu, Yujing Liu, Jiazhi Yao, Xiaolin Fang, Feng Shan, Ming Yang, Zhen Ling, Junzhou Luo:
Learning-aided client association control for high-density WLANs. Comput. Networks 212: 109043 (2022) - [j32]Lan Luo, Yue Zhang, Clayton White, Brandon Keating, Bryan Pearson, Xinhui Shao, Zhen Ling, Haofei Yu, Cliff C. Zou, Xinwen Fu:
On Security of TrustZone-M-Based IoT Systems. IEEE Internet Things J. 9(12): 9683-9699 (2022) - [j31]Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu:
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems. IEEE Internet Things J. 9(18): 17120-17135 (2022) - [c43]Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu:
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. ESORICS (2) 2022: 531-548 - [c42]Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu:
Implication of Animation on Android Security. ICDCS 2022: 1122-1132 - [c41]Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang, Xinwen Fu:
Towards an Efficient Defense against Deep Learning based Website Fingerprinting. INFOCOM 2022: 310-319 - [c40]Kai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu:
Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things. INFOCOM 2022: 1489-1498 - [c39]Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang, Xinwen Fu:
Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery. INFOCOM 2022: 1709-1718 - [c38]Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:
TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones. SECON 2022: 127-135 - 2021
- [j30]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems. IEEE Internet Things J. 8(8): 6815-6827 (2021) - [j29]Zhen Ling, Huaiyu Yan, Xinhui Shao, Junzhou Luo, Yiling Xu, Bryan Pearson, Xinwen Fu:
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes. J. Syst. Archit. 119: 102240 (2021) - [c37]Xiaolin Gu, Wenjia Wu, Zhouguo Chen, Aibo Song, Zhen Ling, Ming Yang:
802.11ac Device Identification based on MAC Frame Analysis. CSCWD 2021: 366-371 - [c36]Zhen Ling, Ruizhao Liu, Yue Zhang, Kang Jia, Bryan Pearson, Xinwen Fu, Junzhou Luo:
Prison Break of Android Reflection Restriction and Defense. INFOCOM 2021: 1-10 - [c35]Wenjuan Shu, Fanping Zeng, Zhen Ling, Junyi Liu, Tingting Lu, Guozhu Chen:
Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model. MSN 2021: 428-437 - 2020
- [j28]Yiting Zhang, Ming Yang, Zhen Ling, Yaowen Liu, Wenjia Wu:
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. Future Gener. Comput. Syst. 108: 1324-1337 (2020) - [j27]Zhen Ling, Chao Gao, Chuta Sano, Chukpozohn Toe, Zupei Li, Xinwen Fu:
STIR: A Smart and Trustworthy IoT System Interconnecting Legacy IR Devices. IEEE Internet Things J. 7(5): 3958-3967 (2020) - [j26]Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xiaodan Gu:
A Novel IM Sync Message-Based Cross-Device Tracking. Secur. Commun. Networks 2020: 8891664:1-8891664:15 (2020) - [j25]Xiaolin Gu, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang, Aibo Song:
Probe Request Based Device Identification Attack and Defense. Sensors 20(16): 4620 (2020) - [c34]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M Based IoT Devices. GLOBECOM 2020: 1-7 - [c33]Bryan Pearson, Cliff C. Zou, Yue Zhang, Zhen Ling, Xinwen Fu:
SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors. ICPADS 2020: 372-381 - [c32]Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, Xinwen Fu:
BLESS: A BLE Application Security Scanning Framework. INFOCOM 2020: 636-645 - [i4]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M based IoT Devices. CoRR abs/2007.05876 (2020) - [i3]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems. CoRR abs/2007.11981 (2020)
2010 – 2019
- 2019
- [j24]Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xinwen Fu:
Your clicks reveal your secrets: a novel user-device linking method through network and visual data. Multim. Tools Appl. 78(7): 8337-8362 (2019) - [c31]Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu:
I Know What You Enter on Gear VR. CNS 2019: 241-249 - [c30]Bryan Pearson, Lan Luo, Yue Zhang, Rajib Dey, Zhen Ling, Mostafa A. Bassiouni, Xinwen Fu:
On Misconception of Hardware and Cost in IoT Security and Privacy. ICC 2019: 1-7 - [c29]Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu:
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks. INFOCOM 2019: 1180-1188 - 2018
- [j23]Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, Zhen Ling:
On the limitations of existing notions of location privacy. Future Gener. Comput. Syst. 86: 1513-1522 (2018) - [j22]Xiaodan Gu, Ming Yang, Yiting Zhang, Peilong Pan, Zhen Ling:
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment. Secur. Commun. Networks 2018: 6124160:1-6124160:15 (2018) - [j21]Lan Luo, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, Xinwen Fu:
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring. Sensors 18(12): 4451 (2018) - [j20]Wenjia Wu, Junzhou Luo, Kai Dong, Ming Yang, Zhen Ling:
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs. Wirel. Commun. Mob. Comput. 2018: 9596141:1-9596141:10 (2018) - [c28]Wenfei Xi, Dongsheng Li, Jingshan Li, Zhen Ling:
Research on an Improved Algorithm for Eliminating Gross Error in UAV Image Mosaic. Geoinformatics 2018: 1-5 - [c27]Zhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu:
SecTap: Secure Back of Device Input System for Mobile Devices. INFOCOM 2018: 1520-1528 - [c26]Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao:
SecT: A Lightweight Secure Thing-Centered IoT Communication System. MASS 2018: 46-54 - [c25]Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu:
Turning Legacy IR Devices into Smart IoT Devices. WASA 2018: 412-424 - [i2]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j19]Guoming Tang, Zhen Ling, Fengyong Li, Daquan Tang, Jiuyang Tang:
Occupancy-aided energy disaggregation. Comput. Networks 117: 42-51 (2017) - [j18]Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling, Junzhou Luo:
A novel attack to track users based on the behavior patterns. Concurr. Comput. Pract. Exp. 29(6) (2017) - [j17]Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni:
Detection of malicious behavior in android apps through API calls and permission uses analysis. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j16]Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu, Xinwen Fu:
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System. IEEE Internet Things J. 4(6): 1899-1909 (2017) - [j15]Yifei Lu, Zhen Ling, Shuhong Zhu, Ling Tang:
SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications. Sensors 17(1): 109 (2017) - [j14]Kai Dong, Wenjia Wu, Haibo Ye, Ming Yang, Zhen Ling, Wei Yu:
Canoe: An Autonomous Infrastructure-Free Indoor Navigation System. Sensors 17(5): 996 (2017) - [j13]Kai Dong, Zhen Ling, Xiangyu Xia, Haibo Ye, Wenjia Wu, Ming Yang:
Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting. Wirel. Commun. Mob. Comput. 2017 (2017) - [j12]Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c24]Yaowen Liu, Ming Yang, Zhen Ling, Junzhou Luo:
Implicit authentication for mobile device based on 3D magnetic finger motion pattern. CSCWD 2017: 325-330 - [c23]Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu:
An End-to-End View of IoT Security and Privacy. GLOBECOM 2017: 1-7 - [c22]Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. WASA 2017: 716-728 - 2016
- [j11]Wenjia Wu, Jianan Wu, Yanhao Wang, Zhen Ling, Ming Yang:
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers. IEEE Access 4: 8073-8083 (2016) - [j10]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, Xinwen Fu:
Password Extraction via Reconstructed Wireless Mouse Trajectory. IEEE Trans. Dependable Secur. Comput. 13(4): 461-473 (2016) - [c21]Zhenyu Ni, Ming Yang, Zhen Ling, Jianan Wu, Junzhou Luo:
Real-Time Detection of Malicious Behavior in Android Apps. CBD 2016: 221-227 - [c20]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu:
Secure fingertip mouse for mobile devices. INFOCOM 2016: 1-9 - 2015
- [j9]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu:
De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun. Mag. 53(4): 60-66 (2015) - [j8]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor. IEEE Trans. Inf. Forensics Secur. 10(12): 2515-2530 (2015) - [j7]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation. IEEE Trans. Parallel Distributed Syst. 26(7): 1887-1899 (2015) - [j6]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. EAI Endorsed Trans. Ubiquitous Environ. 1(4): e1 (2015) - [c19]Xiaodan Gu, Ming Yang, Jiaxuan Fei, Zhen Ling, Junzhou Luo:
A Novel Behavior-Based Tracking Attack for User Identification. CBD 2015: 227-233 - [c18]Qinggang Yue, Zhen Ling, Wei Yu, Benyuan Liu, Xinwen Fu:
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing. PAMCO@MobiHoc 2015: 19-24 - 2014
- [c17]Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao:
Blind Recognition of Touched Keys on Mobile Devices. CCS 2014: 1403-1414 - [c16]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery of malicious traffic over Tor. INFOCOM 2014: 1402-1410 - [i1]Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao:
Blind Recognition of Touched Keys: Attack and Countermeasures. CoRR abs/1403.4829 (2014) - 2013
- [j5]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. Comput. Networks 57(4): 869-886 (2013) - [j4]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind detection of spread spectrum flow watermarks. Secur. Commun. Networks 6(3): 257-274 (2013) - [j3]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. IEEE Trans. Computers 62(12): 2411-2426 (2013) - [c15]Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu:
Protocol-level hidden server discovery. INFOCOM 2013: 1043-1051 - [c14]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. MobiQuitous 2013: 512-523 - [c13]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu:
How Privacy Leaks From Bluetooth Mouse? NDSS 2013 - 2012
- [j2]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A New Cell-Counting-Based Attack Against Tor. IEEE/ACM Trans. Netw. 20(4): 1245-1261 (2012) - [c12]Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, Xinwen Fu:
Fingerprint attack against touch-enabled devices. SPSM@CCS 2012: 57-68 - [c11]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu:
How privacy leaks from bluetooth mouse? CCS 2012: 1013-1015 - [c10]Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu:
When Digital Forensic Research Meets Laws. ICDCS Workshops 2012: 542-551 - [c9]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Extensive analysis and large-scale empirical evaluation of tor bridge discovery. INFOCOM 2012: 2381-2389 - [c8]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu:
A novel network delay based side-channel attack: Modeling and defense. INFOCOM 2012: 2390-2398 - 2011
- [j1]Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling:
A potential HTTP-based application-level attack against Tor. Future Gener. Comput. Syst. 27(1): 67-77 (2011) - [c7]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu:
Equal-Sized Cells Mean Equal-Sized Packets in Tor? ICC 2011: 1-6 - [c6]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. INFOCOM 2011: 186-190 - 2010
- [c5]Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo:
Cyber Crime Scene Investigations (C²SI) through Cloud Computing. ICDCS Workshops 2010: 26-31
2000 – 2009
- 2009
- [c4]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A new cell counter based attack against tor. CCS 2009: 578-589 - [c3]Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling:
A novel flow multiplication attack against Tor. CSCWD 2009: 686-691 - [c2]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind Detection of Spread Spectrum Flow Watermarks. INFOCOM 2009: 2195-2203 - 2008
- [c1]Zhen Ling, Junzhou Luo, Ming Yang:
An HMM Approach to Anonymity Analysis of Continuous Mixes. APWeb Workshops 2008: 232-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint