凌振
发布人:凌振  发布时间:2019-02-18   浏览次数:722

i

Dr. Zhen Ling

Associate Professor
School of Computer Science and Engineering
Southeast University
2 Southeast University Road,
Jiangning District, Nanjing 211189, China

Office: 366, Computer Building, Jiulonghu Campus
Tel: +86-25-52091017
Fax: +86-25-52091016
E-mail: zhenling(at)seu(dot)edu(dot)cn



Refereed Journal Publications [DBLP][Google Scholar]

  1. Lan Luo, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, Xinwen Fu, 'On the Security and Data Integrity of Low-cost Sensor Networks for Air Quality Monitoring', in Sensors, November 2018. [DOI][PDF]


  2. Xiaodan Gu, Ming Yang, Yiting Zhang, Peilong Pan, Zhen Ling, 'Fingerprinting Network Entities Based on Traffic Analysis in High-speed Network Environment', in Security and Communication Networks (SCN), November 2018. [DOI][PDF]


  3. Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xinwen Fu, 'Your Clicks Reveal Your Secrets: A Novel User-device Linking Method Through Network and Visual Data', accepted to appear in Multimedia Tools and Applications (MTA), October 2018. [DOI]


  4. Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, Zhen Ling, 'On the Limitations of Existing Notions of Location Privacy', in Future Generation Computer System (FGCS), 86:1513-1522, September 2018. [DOI][PDF]


  5. Wenjia Wu, Junzhou Luo, Kai Dong, Ming Yang, Zhen Ling, 'Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs', in Wireless Communications and Mobile Computing (WCMC), 2018. [DOI][PDF]


  6. Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu, Xinwen Fu, 'Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System', in IEEE Internet of Things Journal (IoT-J), 4(6):1899-1909, December 2017. [DOI][PDF][Demo Video: This Smart Plug can 'twitter' by itself][Media Impact: Sina, GeekPwn, etc.]


  7. Ming Yang, Xiaodan Gu, Zhen Ling, Changxin Yin, Junzhou Luo, 'An Active De-anonymizing Attack against Tor Web Traffic', in Tsinghua Science and Technology, 22(6): 702-713, December 2017. [DOI][PDF]


  8. Yiting Zhang, Ming Yang, Zhen Ling, Yaowen Liu, Wenjia Wu, 'FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices', accepted to appear in Future Generation Computer System (FGCS), 2018. [DOI]


  9. Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao, 'Privacy Enhancing Keyboard (PEK): Design, Implementation and Usability Testing', in Wireless Communications and Mobile Computing (WCMC), November 2017. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  10. Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni, 'Detection of Malicious Behavior in Android Apps through API Calls and Permission Uses Analysis', in Concurrency and Computation: Practice and Experience (CCPE), 29(19):e4172, October 2017. [DOI][PDF]


  11. Kai Dong, Zhen Ling, Xiangyu Xia, Haibo Ye, Wenjia Wu, Ming Yang, 'Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting', in Wireless Communications and Mobile Computing (WCMC), August 2017. [DOI][PDF]


  12. Kai Dong, Wenjia Wu, Haibo Ye, Ming Yang, Zhen Ling, Wei Yu, 'Canoe: An Autonomous Infrastructure-Free Indoor Navigation System', in Sensors,  17(5):996, April 2017. [DOI][PDF]


  13. Guoming Tang, Zhen Ling, Fengyong Li, Daquan Tang, Jiuyang Tang, 'Occupancy-aided Energy Disaggregation', in  Elsevier Journal of Computer Networks (COMNET), 117:42-51, April 2017. [DOI][PDF]


  14. Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling, Junzhou Luo, 'A Novel Attack to Track Users Based on the Behavior Patterns', in Concurrency and Computation: Practice and Experience (CCPE), 29(6):e3891, March 2017. [DOI][PDF]


  15. Yifei Lu, Zhen Ling, Shuhong Zhu, Ling Tang, 'SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications', in Sensors,  17(1):109, January 2017. [DOI][PDF]


  16. Wenjia Wu, Jianan Wu, Yanhao Wang, Zhen Ling, Ming Yang, 'Efficient Fingerprinting-based Android Device Identification with Zero-permission Identifiers', in IEEE Access, 4:8073-8083, November 2016. [DOI][PDF]


  17. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu, 'Password Extraction via Reconstructed Wireless Mouse Trajectory', in IEEE Transactions on Dependable and Secure Computing (TDSC), 13(4):461-473, July/August 2016. [DOI][PDF]


  18. Junzhou Luo, Ming Yang, Zhen Ling, Wenjia Wu, Xiaodan Gu, 'Architecture and Key Technologies of Cyberspace Security', in SCIENTIA SINICA Informationis, 46(8):939-968, August 2016. [DOI][PDF]


  19. Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu, 'TorWard: Discovery, Blocking, and Traceback of Malicious Traffic over Tor', in IEEE Transactions on Information Forensics and Security (TIFS), 10(12):2515-2530, December 2015. [DOI][PDF]


  20. Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu, 'Tor Bridge Discovery: Extensive Analysis andLarge-scale Empirical Evaluation', in IEEE Transactions on Parallel and Distributed Systems (TPDS), 26(7): 1887-1899, July 2015. [DOI][PDF]


  21. Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao, 'On Malware Leveraging the Android Accessibility Framework', in EAI Endorsed Transactions on Ubiquitous Environments (UE), 15(4): e1, May 2015. [DOI][PDF]


  22. Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu, 'De-anonymizing and Countermeasures in Anonymous Communication Networks', in IEEE Communications Magazine (COMMAG), 53(4):60-66, April 2015. [DOI][PDF]


  23. Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo, 'Novel Packet Size Based Covert Channel Attacks against Anonymizer', in IEEE Transactions on Computers (TC), 62(12): 2411-2426, December 2013. [DOI][PDF]


  24. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao, 'Protocol-level Attacks against Tor', in  Elsevier Journal of Computer Networks (COMNET), 57(4): 869-886, March 2013. [DOI][PDF]


  25. Weijia Jia, Posco Tso, Zhen Ling, Xinwen Fu, Wei Yu, 'Blind Detection of Spread Spectrum Flow Watermarks', in  Elsevier Journal of Security and Communication Networks (SCN), 6(3): 257-274, March 2013. [DOI][PDF]


  26. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia, 'A New Cell-Counting-Based Attack Against Tor', in IEEE/ACM Transactions on Networking (ToN), 20(4): 1245-1261, August 2012. [DOI][PDF]


  27. Xian Pan, Junwei Huang, Zhen Ling, Bin Liu, Xinwen Fu, 'Long PN Code Based Traceback in Wireless Networks', in International Journal of Performability Engineering (IJPE): Special Issue on Dependability Wireless Systems and Networks, 8(2): 173-182, March 2012.


  28. Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling, 'A Potential HTTP-based Application-level Attack against Tor', in Future Generation Computer System (FGCS), 27(1): 67-77, January 2011. [DOI][PDF]


Refereed Conference Publications [DBLP][Google Scholar]

  1. Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu, 'I Know What You Enter on Gear VR', in Proceedings of the 7th IEEE Conference on Communications and Network Security (CNS'19), 10-12 June 2019, Washington, D.C., USA.


  2. Bryan Pearson, Lan Luo, Yue Zhang, Rajib Dey, Zhen Ling, Mostafa Bassiouni, Xinwen Fu. 'On Misconception of Hardware and Cost in IoT Security and Privacy', in Proceedings of the IEEE International Conference on Communications (ICC'19), 20-24 May 2019, Shanghai, China. [DOI][PDF]


  3. Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu, 'Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks', in Proceedings of the 38th IEEE International Conference on Computer Communications (INFOCOM'19), Paris, France, April 29-May 2, 2019, pp.1180-1188. Acceptance Rate: 19.7% (288 out of 1,464) [DOI][PDF]


  4.   Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao, 'SecT: A Lightweight Secure Thing-Centered IoT Communication System', in Proceedings of the 15th International Conference on Mobile Ad-hoc and Sensor Systems (MASS'18), Chengdu, China, Oct. 9-12, 2018. [DOI][PDF]


  5. Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu, 'Turning Legacy IR Devices into Smart IoT Devices', in Proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA'18), Tianjin, China, June 20-22, 2018. [DOI][PDF][Demo Video]


  6. Zhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu, 'SecTap: Secure Back of Device Input System for Mobile Devices', in Proceedings of the 37th IEEE International Conference on Computer Communications (INFOCOM'18), Honolulu, HI, USA, April 15-19, 2018, pp.1520-1528. Acceptance Rate: 19.2% (309 out of 1,606) [DOI][PDF][Demo Video]


  7. Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu, 'An End-to-End View of IoT Security and Privacy', in Proceedings of the 60th IEEE Global Communications Conference (Globecom'17), Singapore, December 4-8, 2017. [DOI][PDF]


  8. Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao, 'A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard', in Proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA'17), Guilin, China, June 19-21, 2017, pp. 716-728. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  9. Yaowen Liu, Ming Yang, Zhen Ling, Junzhou Luo, 'Implicit Authentication for Mobile Device based on 3D Magnetic Finger Motion Pattern', in Proceedings of the IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD'17), Wellington, New Zealand, April 26-28, 2017. [DOI][PDF] [Best Application Paper Award]


  10. Zhenyu Ni, Ming Yang, Zhen Ling, Jia-nan Wu, Junzhou Luo, 'Real-time Detection of Malicious Behavior in Android Apps', in Proceedings of the 4th International Conference on Advanced Cloud and Big Data (CBD'16), Chengdu, China, August 13-16, 2016, pp. 221-227. [DOI][PDF]


  11. Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, 'Secure Fingertip Mouse for Mobile Devices', in Proceedings of the 35th IEEE International Conference on Computer Communications (INFOCOM'16), San Francisco, CA, USA, April 10-15, 2016, pp. 343-351. Acceptance Rate: 18.25% (300 out of 1644) [DOI][PDF][Demo Video]


  12. Xiaodan Gu, Ming Yang, Jiaxuan Fei, Zhen Ling, Junzhou Luo, 'A Novel Behavior-based Tracking Attack For User identification', in Proceedings of the 3rd International Conference on Advanced Cloud and Big Data (CBD'15), Yangzhou, China, October 30-November 1, 2015, pp. 227-233. [DOI][PDF]


  13. Qinggang Yue, Zhen Ling, Wei Yu,  Benyuan Liu, Xinwen Fu, 'Blind Recognition of Text Input on Mobile Devices via Natural Language Processing', in Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing (PAMCO'15), Hangzhou, China, June 22, 2015, pp. 19-24. [DOI][PDF]


  14. Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao, 'Blind Recognition of Touched Keys on Mobile Devices', in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), Scottsdale, Arizona, USA, November 3-7, 2014, pp. 1403-1414. Acceptance Rate: 19.5% (114 out of 585) [DOI][PDF]


  15. Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu, 'TorWard: Discovery of Malicious Traffic over Tor', in Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM'14), Toronto, Canada, April 27-May 2, 2014, pp.1402-1410. Acceptance Rate: 19.4% (320 out of 1645) [DOI][PDF]


  16. Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao, 'On Malware Leveraging the Android Accessibility Framework', in Proceedings of the 10th International Conference on Mobile and Ubiquitous System: Computing , Networking and Services (MobiQuitous'13), Tokyo, Japan, December 2-4, 2013. [DOI][PDF]


  17. Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu, 'Protocol-level Hidden Server Discovery', in Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 14-19, 2013,  pp.1043-1051. Acceptance Rate: 17% (280 out of 1613) [DOI][PDF]


  18. Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, Xinwen Fu, 'Fingerprint Attack against Touch-enabled Devices', in Proceedings of the 2nd Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) conjunction with the 19th ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, USA, October 16-18, 2012, pp.57-68. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  19. Junwei Huang, Yinjie Chen, Zhen Ling, Kyungseok Choo, Xinwen Fu, 'A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation', in  Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12), Vancouver, Canada, September 28, 2012.


  20. Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu, 'When Digital Forensics Research Meets Laws', in Proceedings of Workshop on Network Forensics, Security and Privacy (NSFP) conjunction with the 32nd International Conference on Distributed Computing System (ICDCS'12), Macau, China, June 18-21, 2012, pp.542-551. [DOI][PDF]


  21. Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu, 'A Novel Network Delay based Side-Channel Attack: Modeling and Defense', in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, March 25-30, 2012, pp.2390-2398. Acceptance Rate: 18% (278 out of 1547)  [DOI][PDF]


  22. Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu, 'Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery', in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, March 25-30, 2012, pp.2381-2389. Acceptance Rate: 18% (278 out of 1547) [DOI][PDF][Tor Blog]


  23. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, 'Equal-sized Cells Mean Equal-sized Packets in Tor?', in Proceedings of IEEE International Conference on Communication - Communication and Information System Security Symposium (ICC'11), Kyoto, Japan, June 5-9, 2011. [DOI][PDF]


  24. Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, 'A Novel Packet Size Based Covert Channel Attack against Anonymizer', In Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'11) Mini-Conference, Shanghai, China, April 10-15, 2011, pp.186-190. Acceptance Rate: 23.42% (291+136 out of 1823) [DOI][PDF]


  25. Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo, 'Cyber Crime Scene (C2SI) through Cloud Computing', In Proceedings of Workshop on Security and Privacy in Cloud Computing (SPCC) conjunction with the 30th International Conference on Distributed Computing System (ICDCS'10), Genoa, Italy, June 21-25, 2010, pp. 26-31. [DOI][PDF]


  26. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia, 'A New Cell Counter Based Attack Against Tor', In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), Chicago, Illinois, USA, November 9-13, 2009, pp.578-589. Acceptance Rate: 18.4% (58 out of 315) [DOI][PDF]


  27. Weijia Jia, Posco Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu, 'Blind Detection of Spread Spectrum Flow Watermarks', In Proceedings of the 28th Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, pp.2195-2203, 2009, April 19-25. Acceptance Rate: 19.7% (282 out of 1435) [DOI][PDF]


  28. Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling, 'A Novel Flow Multiplication Attack against Tor', In Proceedings of the 13th International Conference on Computer Supported Cooperative Work in Design (CSCWD'09), Santiago, Chile, April 22-24, 2009, pp.686-691. [DOI]


  29. Zhen Ling, Junzhou Luo, Ming Yang, 'An HMM Approach to Anonymity Analysis of Continuous Mixes', In Proceedings of Asia-Pacific Web Conference (APWeb) 2008 Workshops, LNCS 4977, 2008, pp.232–243. [DOI]


  30. Zhen Ling, Junzhou Luo, Ming Yang, 'An Evidence Theory Based Anonymity Metrics', In Proceedings of IEEE International Conference on Ubi-Media Computing, Lanzhou, China, July 31- August 1, 2008, pp.82-87. [DOI]


Others

  1. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu, Short Talk: 'How Privacy Leaks from Bluetooth Mouse?', in Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS'13), San Diego, CA, USA, February 24-27, 2013.


  2. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, 'DEMO: How Privacy Leaks from Bluetooth Mouse?', in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, USA, October 16-18, 2012, pp.1013-1015. [DOI][PDF]