Security vulnerabilities of internet of things: A case study of the smart plug system Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu IEEE Internet of Things Journal 4 (6), 1899-1909, 2017 | 229 | 2017 |
A new cell counter based attack against tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 125 | 2009 |
Blind recognition of touched keys on mobile devices Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 104 | 2014 |
Fingerprint attack against touch-enabled devices Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 103 | 2012 |
A New Cell-Counting-Based Attack Against Tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Networking, IEEE/ACM Transactions on, 1-1, 0 | 85 | |
An end-to-end view of IoT security and privacy Z Ling, K Liu, Y Xu, Y Jin, X Fu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 82 | 2017 |
Extensive analysis and large-scale empirical evaluation of tor bridge discovery Z Ling, J Luo, W Yu, M Yang, X Fu 2012 Proceedings IEEE INFOCOM, 2381-2389, 2012 | 67 | 2012 |
One cell is enough to break tor’s anonymity X Fu, Z Ling, J Luo, W Yu, W Jia, W Zhao Proceedings of Black Hat Technical Security Conference, 578-589, 2009 | 66 | 2009 |
SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications Y Lu, Z Ling, S Zhu, L Tang Sensors 17 (1), 109, 2017 | 59 | 2017 |
Torward: Discovery, blocking, and traceback of malicious traffic over tor Z Ling, J Luo, K Wu, W Yu, X Fu IEEE Transactions on Information Forensics and Security 10 (12), 2515-2530, 2015 | 56 | 2015 |
Blind detection of spread spectrum flow watermarks W Jia, FP Tso, Z Ling, X Fu, D Xuan, W Yu Security and Communication Networks 6 (3), 257-274, 2013 | 56 | 2013 |
Protocol-level hidden server discovery Z Ling, J Luo, K Wu, X Fu 2013 Proceedings IEEE INFOCOM, 1043-1051, 2013 | 53 | 2013 |
TorWard: Discovery of malicious traffic over Tor Z Ling, J Luo, K Wu, W Yu, X Fu IEEE INFOCOm 2014-IEEE conference on computer communications, 1402-1410, 2014 | 52 | 2014 |
Novel packet size-based covert channel attacks against anonymizer Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo IEEE Transactions on Computers 62 (12), 2411-2426, 2012 | 48 | 2012 |
On misconception of hardware and cost in IoT security and privacy B Pearson, L Luo, Y Zhang, R Dey, Z Ling, M Bassiouni, X Fu ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019 | 40 | 2019 |
Cyber crime scene investigations (C²SI) through cloud computing X Fu, Z Ling, W Yu, J Luo 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 39 | 2010 |
My google glass sees your passwords Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao Proceedings of the Black Hat USA, 2014 | 38 | 2014 |
On malware leveraging the android accessibility framework J Kraunelis, Y Chen, Z Ling, X Fu, W Zhao Mobile and Ubiquitous Systems: Computing, Networking, and Services: 10th …, 2014 | 38 | 2014 |
Protocol-level Attacks against Tor Z Ling, J Luo, W Yu, X Fu, W Jia, W Zhao Computer Networks, 2012 | 38 | 2012 |
De-anonymizing and countermeasures in anonymous communication networks M Yang, J Luo, Z Ling, X Fu, W Yu IEEE Communications Magazine 53 (4), 60-66, 2015 | 34 | 2015 |