凌振

发布者:凌振发布时间:2020-04-02浏览次数:6293

Dr. Zhen Ling

Young Chair Professor of Southeast University
Professor of School of Computer Science and Engineering
School of Computer Science and Engineering
Southeast University
2 Southeast University Road,
Jiangning District, Nanjing 211189, China

Office: 210, Computer Building, Jiulonghu Campus
Tel: +86-25-52091023
E-mail: zhenling(at)seu(dot)edu(dot)cn




Book Chapter [DBLP][Google Scholar]

  1. Zhen Ling, Yiling Xu, Yier Jin, Cliff Zou, Xinwen Fu, 'New Variants of Mirai and Analysis', in Shen X., Lin X., Zhang K. (eds) Encyclopedia of Wireless Networks. Springer, Cham, 2020. [DOI][PDF]


Refereed Conference Publications [DBLP][Google Scholar]

  1. Chunmian Wang, Junzhou Luo, Zhen Ling, Lan Luo, Xinwen Fu, 'A Comprehensive and Long-term Evaluation of Tor V3 Onion Services', accepted to appear in in Proceedings of the 42nd IEEE International Conference on Computer Communications (INFOCOM'23), New York area, USA, May 17-20, 2023. Acceptance Rate: 19.2% (252 out of 1,312) [Technical Report]


  2. Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu, 'Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks', accepted to appear in Proceedings of the 30th Network and Distributed System Security (NDSS'23), San Diego, California, USA, February 27-March 3, 2023.


  3. Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo, 'TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones', in Proceedings of the 19th IEEE International Conference on Sensing, Communication, and Networking (SECON'22), Virtual Conference, September 20-23, 2022, pp. 127-135. [DOI][PDF]


  4. Xinhui Shao#, Lan Luo#, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu, 'fASLR: Function-Based ASLR for Resource-Constrained IoT Systems', in Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS'22), Copenhagen, Denmark, September 26-30, 2022, pp. 531-548. Acceptance Rate: 18.5% (104 out of 562). (# indicates equal contribtion) [DOI][PDF]


  5. Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu, 'Implication of Animation on Android Security', in Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems (ICDCS'22), Bologna, Italy, July 10-13, 2022, pp.1122-1132. Acceptance Rate: 19.9% (114 out of 573) [DOI][PDF][Demo Video]


  6. Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang, Xinwen Fu, 'Towards an Efficient Defense against Deep Learning based Website Fingerprinting', in Proceedings of the 41st IEEE International Conference on Computer Communications (INFOCOM'22), Virtual Conference, May 2-5, 2022. Acceptance Rate: 19.9% (225 out of 1,129) [DOI][PDF]


  7. Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang, Xinwen Fu, 'Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery', in Proceedings of the 41st IEEE International Conference on Computer Communications (INFOCOM'22), Virtual Conference, May 2-5, 2022. Acceptance Rate: 19.9% (225 out of 1,129) [DOI][PDF]


  8. Kai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu, 'Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things', in Proceedings of the 41st IEEE International Conference on Computer Communications (INFOCOM'22), Virtual Conference, May 2-5, 2022. Acceptance Rate: 19.9% (225 out of 1,129) [DOI][PDF]


  9. Zhen Ling, Ruizhao Liu, Yue Zhang, Kang Jia, Bryan Pearson, Xinwen Fu, Junzhou Luo, 'Prison Break of Android Reflection Restriction and Defense', in Proceedings of the 40th IEEE International Conference on Computer Communications (INFOCOM'21), Virtual Conference, May 10-13, 2021. Acceptance Rate: 19.9% (252 out of 1,266) [DOI][PDF]


  10. Lan Luo, Yue Zhang, Cliff Zou, Xinhui Shao, Zhen Ling, Xinwen Fu, 'On Runtime Software Security of TrustZone-M Based IoT Devices', in Proceedings of the 63rd IEEE Global Communications Conference (Globecom'20), Virtual Conference, December 7-11, 2020. [DOI][PDF]


  11. Bryan Pearson, Cliff Zou, Yue Zhang, Zhen Ling, Xinwen Fu, 'SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors', in Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems (ICPADS'20), Hong Kong, China, December 2-4, 2020. [DOI][PDF]


  12. Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, Xinwen Fu, 'BLESS: A BLE Application Security Scanning Framework', in Proceedings of the 39th IEEE International Conference on Computer Communications (INFOCOM'20), Beijing, China, April 27-30, 2020. Acceptance Rate: 19.8% (268 out of 1,354) [DOI][PDF]


  13. Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu, 'I Know What You Enter on Gear VR', in Proceedings of the 7th IEEE Conference on Communications and Network Security (CNS'19), Washington, D.C., USA, June 10-12, 2019. [DOI][PDF]


  14. Bryan Pearson, Lan Luo, Yue Zhang, Rajib Dey, Zhen Ling, Mostafa Bassiouni, Xinwen Fu. 'On Misconception of Hardware and Cost in IoT Security and Privacy', in Proceedings of the IEEE International Conference on Communications (ICC'19), Shanghai, China, May 20-24, 2019. [DOI][PDF]


  15. Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu, 'Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks', in Proceedings of the 38th IEEE International Conference on Computer Communications (INFOCOM'19), Paris, France, April 29-May 2, 2019, pp.1180-1188. Acceptance Rate: 19.7% (288 out of 1,464) [DOI][PDF]


  16. Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao, 'SecT: A Lightweight Secure Thing-Centered IoT Communication System', in Proceedings of the 15th International Conference on Mobile Ad-hoc and Sensor Systems (MASS'18), Chengdu, China, Oct. 9-12, 2018, pp.46-54. [DOI][PDF]


  17. Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu, 'Turning Legacy IR Devices into Smart IoT Devices', in Proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA'18), Tianjin, China, June 20-22, 2018, pp.412-424. [DOI][PDF][Demo Video]


  18. Zhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu, 'SecTap: Secure Back of Device Input System for Mobile Devices', in Proceedings of the 37th IEEE International Conference on Computer Communications (INFOCOM'18), Honolulu, HI, USA, April 15-19, 2018, pp.1520-1528. Acceptance Rate: 19.2% (309 out of 1,606) [DOI][PDF][Demo Video]


  19. Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu, 'An End-to-End View of IoT Security and Privacy', in Proceedings of the 60th IEEE Global Communications Conference (Globecom'17), Singapore, December 4-8, 2017. [DOI][PDF]


  20. Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao, 'A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard', in Proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA'17), Guilin, China, June 19-21, 2017, pp. 716-728. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  21. Yaowen Liu, Ming Yang, Zhen Ling, Junzhou Luo, 'Implicit Authentication for Mobile Device based on 3D Magnetic Finger Motion Pattern', in Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD'17), Wellington, New Zealand, April 26-28, 2017, pp.325-330. [DOI][PDF] [Best Application Paper Award]


  22. Zhenyu Ni, Ming Yang, Zhen Ling, Jia-nan Wu, Junzhou Luo, 'Real-time Detection of Malicious Behavior in Android Apps', in Proceedings of the 4th International Conference on Advanced Cloud and Big Data (CBD'16), Chengdu, China, August 13-16, 2016, pp. 221-227. [DOI][PDF]


  23. Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, 'Secure Fingertip Mouse for Mobile Devices', in Proceedings of the 35th IEEE International Conference on Computer Communications (INFOCOM'16), San Francisco, CA, USA, April 10-15, 2016, pp. 343-351. Acceptance Rate: 18.25% (300 out of 1644) [DOI][PDF][Demo Video]


  24. Xiaodan Gu, Ming Yang, Jiaxuan Fei, Zhen Ling, Junzhou Luo, 'A Novel Behavior-based Tracking Attack For User identification', in Proceedings of the 3rd International Conference on Advanced Cloud and Big Data (CBD'15), Yangzhou, China, October 30-November 1, 2015, pp. 227-233. [DOI][PDF]


  25. Qinggang Yue, Zhen Ling, Wei Yu,  Benyuan Liu, Xinwen Fu, 'Blind Recognition of Text Input on Mobile Devices via Natural Language Processing', in Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing (PAMCO'15), Hangzhou, China, June 22, 2015, pp. 19-24. [DOI][PDF]


  26. Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao, 'Blind Recognition of Touched Keys on Mobile Devices', in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), Scottsdale, Arizona, USA, November 3-7, 2014, pp. 1403-1414. Acceptance Rate: 19.5% (114 out of 585) [DOI][PDF]


  27. Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu, 'TorWard: Discovery of Malicious Traffic over Tor', in Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM'14), Toronto, Canada, April 27-May 2, 2014, pp.1402-1410. Acceptance Rate: 19.4% (320 out of 1645) [DOI][PDF]


  28. Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao, 'On Malware Leveraging the Android Accessibility Framework', in Proceedings of the 10th International Conference on Mobile and Ubiquitous System: Computing , Networking and Services (MobiQuitous'13), Tokyo, Japan, December 2-4, 2013, pp.512-523. [DOI][PDF]


  29. Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu, 'Protocol-level Hidden Server Discovery', in Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 14-19, 2013,  pp.1043-1051. Acceptance Rate: 17% (280 out of 1613) [DOI][PDF]


  30. Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, Xinwen Fu, 'Fingerprint Attack against Touch-enabled Devices', in Proceedings of the 2nd Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) conjunction with the 19th ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, USA, October 16-18, 2012, pp.57-68. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  31. Junwei Huang, Yinjie Chen, Zhen Ling, Kyungseok Choo, Xinwen Fu, 'A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation', in Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12), Vancouver, Canada, September 28, 2012.


  32. Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu, 'When Digital Forensics Research Meets Laws', in Proceedings of Workshop on Network Forensics, Security and Privacy (NSFP) conjunction with the 32nd International Conference on Distributed Computing System (ICDCS'12), Macau, China, June 18-21, 2012, pp.542-551. [DOI][PDF]


  33. Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu, 'A Novel Network Delay based Side-Channel Attack: Modeling and Defense', in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, March 25-30, 2012, pp.2390-2398. Acceptance Rate: 18% (278 out of 1547)  [DOI][PDF]


  34. Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu, 'Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery', in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, March 25-30, 2012, pp.2381-2389. Acceptance Rate: 18% (278 out of 1547) [DOI][PDF][Tor Blog]


  35. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, 'Equal-sized Cells Mean Equal-sized Packets in Tor?', in Proceedings of IEEE International Conference on Communication - Communication and Information System Security Symposium (ICC'11), Kyoto, Japan, June 5-9, 2011. [DOI][PDF]


  36. Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, 'A Novel Packet Size Based Covert Channel Attack against Anonymizer', In Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'11) Mini-Conference, Shanghai, China, April 10-15, 2011, pp.186-190. Acceptance Rate: 23.42% (291+136 out of 1823) [DOI][PDF]


  37. Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo, 'Cyber Crime Scene (C2SI) through Cloud Computing', In Proceedings of Workshop on Security and Privacy in Cloud Computing (SPCC) conjunction with the 30th International Conference on Distributed Computing System (ICDCS'10), Genoa, Italy, June 21-25, 2010, pp. 26-31. [DOI][PDF]


  38. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia, 'A New Cell Counter Based Attack Against Tor', In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), Chicago, Illinois, USA, November 9-13, 2009, pp.578-589. Acceptance Rate: 18.4% (58 out of 315) [DOI][PDF]


  39. Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu, 'Blind Detection of Spread Spectrum Flow Watermarks', In Proceedings of the 28th Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, pp.2195-2203, 2009, April 19-25. Acceptance Rate: 19.7% (282 out of 1435) [DOI][PDF]


  40. Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling, 'A Novel Flow Multiplication Attack against Tor', In Proceedings of the 13th International Conference on Computer Supported Cooperative Work in Design (CSCWD'09), Santiago, Chile, April 22-24, 2009, pp.686-691. [DOI]


  41. Zhen Ling, Junzhou Luo, Ming Yang, 'An HMM Approach to Anonymity Analysis of Continuous Mixes', In Proceedings of Asia-Pacific Web Conference (APWeb) 2008 Workshops, LNCS 4977, 2008, pp.232–243. [DOI]


  42. Zhen Ling, Junzhou Luo, Ming Yang, 'An Evidence Theory Based Anonymity Metrics', In Proceedings of IEEE International Conference on Ubi-Media Computing, Lanzhou, China, July 31- August 1, 2008, pp.82-87. [DOI]



Refereed Journal Publications [DBLP][Google Scholar]

  1. Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue, 'Flow Topology-based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks', accepted to appear in IEEE Transactions on Network and Service Management (TNSM), October 2022. [DOI]


  2. Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu, 'fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems', in IEEE Internet of Things Journal (IoT-J), September 2022. [DOI][PDF]


  3. Wenjia Wu, Yujing Liu, Jiazhi Yao, Xiaolin Fang, Feng Shan, Ming Yang, Zhen Ling, Junzhou Luo, 'Learning-aided Client Association Control for High-density WLANs', in Elsevier Journal of Computer Networks (COMNET), July 2022. [DOI][PDF]


  4. 凌振, 杨彦, 刘睿钊, 张悦, 贾康, 杨明, '基于Toast重复绘制机制的口令攻击技术', 软件学报, 33(6): 2047-2060, 2022. [DOI][PDF][Demo Video]


  5. Lan Luo, Yue Zhang, Clayton White, Brandon Keating, Bryan Pearson, Xinhui Shao, Zhen Ling, Haofei Yu, Cliff Zou, Xinwen Fu, 'On Security of TrustZone-M Based IoT Systems', in IEEE Internet of Things Journal (IoT-J), 9(12): 9683 - 9699, June 2022. [DOI][PDF]


  6. Zhen Ling, Huaiyu Yan, Xinhui Shao, Junzhou Luo, Yiling Xu, Bryan Pearson, Xinwen Fu, 'Secure Boot, Trusted Boot and Remote Attestation for ARM TrustZone-based IoT Nodes', in Journal of Systems Architecture (JSA), 119, October 2021. [DOI][PDF]


  7. Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao, 'On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems', in IEEE Internet of Things Journal (IoT-J), 8(8): 6815-6827, April 2021. [DOI][PDF]


  8. Zhen Ling, Chao Gao, Chuta Sano, Chukpozohn Toe, Zupei Li, Xinwen Fu, 'STIR: A Smart and Trustworthy IoT System Interconnecting Legacy IR Devices', in IEEE Internet of Things Journal (IoT-J), 7(5):3958-3967, May 2020. [DOI][PDF][Demo Video: My drone turns off your TV][Demo Video: Maximal IR distance][Demo Video: Maximal IR distance (II)]


  9. Yiting Zhang, Ming Yang, Zhen Ling, Yaowen Liu, Wenjia Wu, 'FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices', in Future Generation Computer System (FGCS), 108:1324-1337, July 2020. [DOI][PDF]


  10. Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xinwen Fu, 'Your Clicks Reveal Your Secrets: A Novel User-device Linking Method Through Network and Visual Data', in Multimedia Tools and Applications (MTA), 78(7):8337-8362, 2019. [DOI]


  11. Junzhou Luo, Ming Yang, Zhen Ling, Wenjia Wu, Xiaodan Gu, 'Anonymous Communication and Darknet: A Survey', in Journal of Computer Research and Development, 2019, 56(1): 103-130. [DOI]


  12. Lan Luo, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, Xinwen Fu, 'On the Security and Data Integrity of Low-cost Sensor Networks for Air Quality Monitoring', in Sensors, 18(12):4451, November 2018. [DOI][PDF]


  13. Xiaodan Gu, Ming Yang, Yiting Zhang, Peilong Pan, Zhen Ling, 'Fingerprinting Network Entities Based on Traffic Analysis in High-speed Network Environment', in Security and Communication Networks (SCN),  November 2018. [DOI][PDF]


  14. Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, Zhen Ling, 'On the Limitations of Existing Notions of Location Privacy', in Future Generation Computer System (FGCS), 86:1513-1522, September 2018. [DOI][PDF]


  15. Wenjia Wu, Junzhou Luo, Kai Dong, Ming Yang, Zhen Ling, 'Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs', in Wireless Communications and Mobile Computing (WCMC), 2018. [DOI][PDF]


  16. Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu, Xinwen Fu, 'Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System', in IEEE Internet of Things Journal (IoT-J), 4(6):1899-1909, December 2017. [DOI][PDF][Demo Video: This Smart Plug can 'twitter' by itself][Media Impact: Sina, GeekPwn, etc.]


  17. Ming Yang, Xiaodan Gu, Zhen Ling, Changxin Yin, Junzhou Luo, 'An Active De-anonymizing Attack against Tor Web Traffic', in Tsinghua Science and Technology, 22(6): 702-713, December 2017. [DOI][PDF]


  18. Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao, 'Privacy Enhancing Keyboard (PEK): Design, Implementation and Usability Testing', in Wireless Communications and Mobile Computing (WCMC), November 2017. [DOI][PDF][PEK: Privacy Enhanced Keyboard]


  19. Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni, 'Detection of Malicious Behavior in Android Apps through API Calls and Permission Uses Analysis', in Concurrency and Computation: Practice and Experience (CCPE), 29(19):e4172, October 2017. [DOI][PDF]


  20. Kai Dong, Zhen Ling, Xiangyu Xia, Haibo Ye, Wenjia Wu, Ming Yang, 'Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting', in Wireless Communications and Mobile Computing (WCMC), August 2017. [DOI][PDF]


  21. Kai Dong, Wenjia Wu, Haibo Ye, Ming Yang, Zhen Ling, Wei Yu, 'Canoe: An Autonomous Infrastructure-Free Indoor Navigation System', in Sensors, 17(5):996, April 2017. [DOI][PDF]


  22. Guoming Tang, Zhen Ling, Fengyong Li, Daquan Tang, Jiuyang Tang, 'Occupancy-aided Energy Disaggregation', in Elsevier Journal of Computer Networks (COMNET), 117:42-51, April 2017. [DOI][PDF]


  23. Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling, Junzhou Luo, 'A Novel Attack to Track Users Based on the Behavior Patterns', in Concurrency and Computation: Practice and Experience (CCPE), 29(6):e3891, March 2017. [DOI][PDF]


  24. Yifei Lu, Zhen Ling, Shuhong Zhu, Ling Tang, 'SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications', in Sensors,  17(1):109, January 2017. [DOI][PDF]


  25. Wenjia Wu, Jianan Wu, Yanhao Wang, Zhen Ling, Ming Yang, 'Efficient Fingerprinting-based Android Device Identification with Zero-permission Identifiers', in IEEE Access, 4:8073-8083, November 2016. [DOI][PDF]


  26. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu, 'Password Extraction via Reconstructed Wireless Mouse Trajectory', in IEEE Transactions on Dependable and Secure Computing (TDSC), 13(4):461-473, July/August 2016. [DOI][PDF]


  27. Junzhou Luo, Ming Yang, Zhen Ling, Wenjia Wu, Xiaodan Gu, 'Architecture and Key Technologies of Cyberspace Security', in SCIENTIA SINICA Informationis, 46(8):939-968, August 2016. [DOI][PDF]


  28. Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu, 'TorWard: Discovery, Blocking, and Traceback of Malicious Traffic over Tor', in IEEE Transactions on Information Forensics and Security (TIFS), 10(12):2515-2530, December 2015. [DOI][PDF]


  29. Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu, 'Tor Bridge Discovery: Extensive Analysis andLarge-scale Empirical Evaluation', in IEEE Transactions on Parallel and Distributed Systems (TPDS), 26(7): 1887-1899, July 2015. [DOI][PDF]


  30. Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao, 'On Malware Leveraging the Android Accessibility Framework', in EAI Endorsed Transactions on Ubiquitous Environments (UE), 15(4): e1, May 2015. [DOI][PDF]


  31. Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu, 'De-anonymizing and Countermeasures in Anonymous Communication Networks', in IEEE Communications Magazine (COMMAG), 53(4):60-66, April 2015. [DOI][PDF]


  32. Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo, 'Novel Packet Size Based Covert Channel Attacks against Anonymizer', in IEEE Transactions on Computers (TC), 62(12): 2411-2426, December 2013. [DOI][PDF]


  33. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao, 'Protocol-level Attacks against Tor', in  Elsevier Journal of Computer Networks (COMNET), 57(4): 869-886, March 2013. [DOI][PDF]


  34. Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Wei Yu, 'Blind Detection of Spread Spectrum Flow Watermarks', in  Elsevier Journal of Security and Communication Networks (SCN), 6(3): 257-274, March 2013. [DOI][PDF]


  35. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia, 'A New Cell-Counting-Based Attack Against Tor', in IEEE/ACM Transactions on Networking (ToN), 20(4): 1245-1261, August 2012. [DOI][PDF]


  36. Xian Pan, Junwei Huang, Zhen Ling, Bin Liu, Xinwen Fu, 'Long PN Code Based Traceback in Wireless Networks', in International Journal of Performability Engineering (IJPE): Special Issue on Dependability Wireless Systems and Networks, 8(2): 173-182, March 2012. [DOI][PDF]


  37. Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling, 'A Potential HTTP-based Application-level Attack against Tor', in Future Generation Computer System (FGCS), 27(1): 67-77, January 2011. [DOI][PDF]

Patents

  1. 凌振, 范群群, 吴文甲, 杨明, 付新文, 一种基于全景图像的虚拟现实安全认证方法, 国家发明专利, 专利号:ZL201910822378.2, 授权公告日:2022年11月18日


  2. 吴文甲, 杨明, 凌振, 师晓敏, 汪立鹤, 查付政, 一种面向大规模密集无线网络的分层式负载均衡方法, 国家发明专利, 专利号:ZL201910617334.6, 授权公告日: 2022年9月2日


  3. 凌振, 邵鑫慧, 罗澜, 闫怀宇, 张炜超, 付新文, 一种面向深度嵌入式系统的函数地址空间布局随机化方法, 国家发明专利, 专利号: ZL202210285035.9, 授权公告日: 2022年6月21日


  4. 罗军舟, 凌振, 党一菲, 师晓敏, 李永杰, 吉祥, 一种基于自省技术的虚拟机安全检测方法, 国家发明专利, 专利号: ZL201910930547.4, 授权公告日: 2022年4月5日


  5. 凌振, 邵鑫慧, 吴文甲, 杨明, 付新文, 一种基于TrustZone的安全和可信混合系统启动方法, 国家发明专利, 专利号:ZL201910828486.0, 授权公告日: 2022年1月25日


  6. 杨明, 王姗, 吴嘉楠, 吴文甲, 凌振, 一种基于第三方流量HTTP报文的移动应用识别方法, 国家发明专利, 专利号: ZL201810670461.8, 授权公告日: 2021年11月2日


  7. 杨明, 周佳欢, 罗军舟, 吴文甲, 凌振, 一种基于内容关联的Web追踪自动检测方法, 国家发明专利, 专利号: ZL201711282970.5, 授权公告日: 2021年3月26日


  8. 吴文甲, 罗军舟, 魏娜, 杨明, 凌振, 一种基于查询结果集敏感度的数据泄露检测方法, 国家发明专利, 专利号: ZL201710905803.5, 授权公告日: 2020年10月2日


  9. 吴文甲, 徐威鸿, 罗军舟, 杨明, 凌振, 李晓云, 基于OpenFlow协议的密集WLAN干扰控制方法, 国家发明专利, 专利号: ZL201711268709.X, 授权公告日: 2020年9月11日


  10. 杨明, 潘培龙, 罗军舟, 凌振, 一种基于应用程序流量分布式分析的主机实时识别方法, 国家发明专利, 专利号: ZL201710249904.1, 授权公告日: 2020年8月11日


  11. 杨明, 倪振宇, 罗军舟, 吴文甲, 凌振, 一种基于运行环境状态的Android权限细粒度访问控制方法, 专利号: ZL201410431653.5, 授权公告日: 2016年10月26日


  12. 杨明, 张珩, 顾晓丹, 凌振, 戴文轩, 一种基于比特币交易分析的Tor非法用户去匿名化方法, 国家发明专利, 申请号: 202210854915.3, 申请日: 2022年7月20日


  13. 罗军舟, 郭乃瑄, 凌振, 杨明, 顾啸林, 基于WiFi-BLE信号被动嗅探的跨智能可携带设备关联方法, 国家发明专利, 申请号: 202210103377.4, 申请日: 2022年1月27日


  14. 吴文甲, 马胜, 杨明, 凌振, 顾晓丹, 移动边缘计算中区域化层次化任务迁移方法, 国家发明专利, 申请号:202010378577.1, 申请日: 2020年5月7日


  15. 吴文甲, 孙声宇, 罗军舟, 单冯, 杨明, 凌振, 无线网络中时变需求驱动的可移动接入点调度方法, 国家发明专利, 申请号:201911183399.0, 申请日: 2019年11月27日


  16. 凌振, 闫怀宇, 吴文甲, 杨明, 付新文, 一种基于TrustZone的物联网终端进程完整性度量方法, 国家发明专利, 申请号:201910828465.9, 申请日:2019年9月3日


  17. 凌振, 周佳欢, 吴文甲, 杨明, 付新文, 一种抗侧信道攻击的智能终端安全输入方法, 国家发明专利, 申请号: 201710346787.0, 申请日: 2017年5月17日


Others

  1. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu, Short Talk: 'How Privacy Leaks from Bluetooth Mouse?', in Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS'13), San Diego, CA, USA, February 24-27, 2013.


  2. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, 'DEMO: How Privacy Leaks from Bluetooth Mouse?', in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, USA, October 16-18, 2012, pp.1013-1015. [DOI][PDF]