default search action
Sencun Zhu
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. IEEE Trans. Dependable Secur. Comput. 21(2): 905-919 (2024) - [i17]Bin Wang, Tianjian Liu, Wenqi Wang, Yuan Weng, Chao Li, Guangquan Xu, Meng Shen, Sencun Zhu, Wei Wang:
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems. CoRR abs/2405.13380 (2024) - 2023
- [j53]Alem Fitwi, Yu Chen, Sencun Zhu:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. IEEE Trans. Serv. Comput. 16(1): 276-287 (2023) - [c122]Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. WISEC 2023: 49-59 - [i16]Henger Li, Chen Wu, Sencun Zhu, Zizhan Zheng:
Learning to Backdoor Federated Learning. CoRR abs/2303.03320 (2023) - [i15]Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. CoRR abs/2305.06430 (2023) - 2022
- [j52]Yuanyi Sun, Sencun Zhu, Yu Chen:
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings. Proc. Priv. Enhancing Technol. 2022(3): 630-649 (2022) - [c121]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. CNS 2022: 1-9 - [c120]Chongqi Guan, Xianda Chen, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video. CNS 2022: 82-90 - [c119]Yuanyi Sun, Sencun Zhu, Yan Zhao, Pengfei Sun:
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks. CNS 2022: 91-99 - [c118]Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra:
Toward Cleansing Backdoored Neural Networks in Federated Learning. ICDCS 2022: 820-830 - [i14]Chen Wu, Sencun Zhu, Prasenjit Mitra:
Federated Unlearning with Knowledge Distillation. CoRR abs/2201.09441 (2022) - [i13]Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick D. McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth V. Krishnamurthy:
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN. CoRR abs/2203.06694 (2022) - 2021
- [j51]Daojing He, Hongjie Gu, Tinghui Li, Yongliang Du, Xiaolei Wang, Sencun Zhu, Nadra Guizani:
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware. IEEE Netw. 35(2): 202-207 (2021) - [j50]Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique:
Toward A Network-Assisted Approach for Effective Ransomware Detection. EAI Endorsed Trans. Security Safety 7(24): e3 (2021) - [j49]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j48]Hao Fu, Pengfei Hu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Tianbo Gu, Sencun Zhu, Prasant Mohapatra:
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications. IEEE Trans. Mob. Comput. 20(10): 3066-3080 (2021) - [j47]Yaguang Lin, Xiaoming Wang, Fei Hao, Yichuan Jiang, Yulei Wu, Geyong Min, Daojing He, Sencun Zhu, Wei Zhao:
Dynamic Control of Fraud Information Spreading in Mobile Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(6): 3725-3738 (2021) - [c117]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c116]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. DSN 2021: 250-262 - [i12]Yuanyi Sun, Sencun Zhu, Yao Zhao, Pengfei Sun:
Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks. CoRR abs/2109.00132 (2021) - [i11]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang:
AppQ: Warm-starting App Recommendation Based on View Graphs. CoRR abs/2109.03798 (2021) - 2020
- [j46]Daojing He, Xiaoxia Liu, Jiajia Zheng, Sammy Chan, Sencun Zhu, Weidong Min, Nadra Guizani:
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems. IEEE Netw. 34(4): 173-179 (2020) - [j45]Daojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, Nadra Guizani:
Security Analysis of Cryptocurrency Wallets in Android-Based Applications. IEEE Netw. 34(6): 114-119 (2020) - [j44]David Mohaisen, Sencun Zhu:
Editorial. EAI Endorsed Trans. Security Safety 6(22): e1 (2020) - [j43]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j42]Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, Xiangliang Zhang:
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Trans. Mob. Comput. 19(5): 1184-1199 (2020) - [c115]Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, Yao Cheng:
Android-based Cryptocurrency Wallets: Attacks and Countermeasures. Blockchain 2020: 9-16 - [c114]Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CODASPY 2020: 97-108 - [c113]Alem Fitwi, Yu Chen, Sencun Zhu:
PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service. CIC 2020: 125-134 - [c112]Qi Qiao, Daojing He, Yun Gao, Sencun Zhu, Jiahao Gao, Sammy Chan:
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems. SECON 2020: 1-9 - [c111]Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan:
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems. SRDS 2020: 205-214 - [c110]Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen:
iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. WISEC 2020: 195-206 - [i10]Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Hassan-Shafique:
A Network-Assisted Approach for Ransomware Detection. CoRR abs/2008.12428 (2020) - [i9]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. CoRR abs/2010.10788 (2020) - [i8]Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra:
Mitigating Backdoor Attacks in Federated Learning. CoRR abs/2011.01767 (2020) - [i7]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users. CoRR abs/2012.13971 (2020) - [i6]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder. CoRR abs/2012.13972 (2020)
2010 – 2019
- 2019
- [j41]Xiaolei Wang, Andrea Continella, Yuexiang Yang, Yongzhong He, Sencun Zhu:
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1): 28:1-28:25 (2019) - [j40]Daojing He, Yinrong Qiao, Shiqing Chen, Xiao Du, Wenjie Chen, Sencun Zhu, Mohsen Guizani:
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles. IEEE Netw. 33(2): 146-151 (2019) - [j39]Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander J. Aved, Sencun Zhu:
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 19(11): 2424 (2019) - [j38]Yang Song, Chen Wu, Sencun Zhu, Haining Wang:
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. EAI Endorsed Trans. Security Safety 5(18): e3 (2019) - [j37]Xiaolei Wang, Yuexiang Yang, Sencun Zhu:
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution. IEEE Trans. Mob. Comput. 18(12): 2768-2782 (2019) - [c109]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge. Blockchain 2019: 552-555 - [c108]Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. Internet Measurement Conference 2019: 230-244 - [c107]Hao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra:
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. INFOCOM 2019: 2089-2097 - [c106]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. ISC2 2019: 199-204 - [c105]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c104]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [i5]Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, Sencun Zhu:
A Study on Smart Online Frame Forging Attacks against Video Surveillance System. CoRR abs/1903.03473 (2019) - [i4]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. CoRR abs/1908.09935 (2019) - [i3]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge. CoRR abs/1909.09845 (2019) - 2018
- [j36]Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. Future Gener. Comput. Syst. 89: 402-420 (2018) - [j35]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. EAI Endorsed Trans. Security Safety 4(13): e1 (2018) - [j34]Chu Huang, Sencun Zhu, Yi Yang:
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. EAI Endorsed Trans. Security Safety 4(13): e4 (2018) - [c103]Youssef Khazbak, Jingyao Fan, Sencun Zhu, Guohong Cao:
Preserving Location Privacy in Ride-Hailing Service. CNS 2018: 1-9 - [c102]Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini:
Server-Based Manipulation Attacks Against Machine Learning Models. CODASPY 2018: 24-34 - [c101]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c100]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. WISEC 2018: 248-259 - [e6]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8 [contents] - [e5]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018, ISBN 978-3-319-78815-9 [contents] - [e4]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e3]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i2]Cong Liao, Haoti Zhong, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CoRR abs/1808.10307 (2018) - 2017
- [j33]Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He:
A software assignment algorithm for minimizing worm damage in networked systems. J. Inf. Secur. Appl. 35: 55-67 (2017) - [j32]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. EAI Endorsed Trans. Security Safety 4(12): e1 (2017) - [j31]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [c99]Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang:
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. ACSAC 2017: 350-361 - [c98]Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang:
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. AsiaCCS 2017: 58-70 - [c97]Chuangang Ren, Peng Liu, Sencun Zhu:
WindowGuard: Systematic Protection of GUI Security in Android. NDSS 2017 - [c96]Xin Chen, Heqing Huang, Sencun Zhu, Qing Li, Quanlong Guan:
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS. WPES@CCS 2017: 75-86 - [e2]Giovanni Livraga, Sencun Zhu:
Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10359, Springer 2017, ISBN 978-3-319-61175-4 [contents] - [i1]Hao Fu, Zizhan Zheng, Sencun Zhu, Pransant Mohapatra:
INSPIRED: Intention-based Privacy-preserving Permission Model. CoRR abs/1709.06654 (2017) - 2016
- [j30]Yi Yang, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: A software diversity approach. Ad Hoc Networks 47: 26-40 (2016) - [j29]Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c95]Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang:
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. ACSAC 2016: 374-385 - [c94]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Suresh Chari, Ce Zhang:
Android malware development on public malware scanning platforms: A large-scale data-driven study. IEEE BigData 2016: 1090-1099 - [c93]Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. DSN 2016: 550-561 - [c92]Quanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu:
Semantics-Based Repackaging Detection for Mobile Apps. ESSoS 2016: 89-105 - [c91]Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu:
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. SecureComm 2016: 655-672 - 2015
- [j28]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c90]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c89]Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu:
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. CCS 2015: 1236-1247 - [c88]Chu Huang, Sencun Zhu, Quanlong Guan:
Multi-objective software assignment for active cyber defense. CNS 2015: 299-307 - [c87]Zhi Xu, Sencun Zhu:
SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. CODASPY 2015: 61-72 - [c86]Xin Chen, Sencun Zhu:
DroidJust: automated functionality-aware privacy leakage analysis for Android applications. WISEC 2015: 5:1-5:12 - [c85]Zhen Xie, Sencun Zhu:
AppWatcher: unveiling the underground market of trading mobile app reviews. WISEC 2015: 10:1-10:11 - 2014
- [j27]Tianzhen Cheng, Ping Li, Sencun Zhu, Don J. Torrieri:
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks. Integr. Comput. Aided Eng. 21(1): 19-34 (2014) - [c84]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c83]Chu Huang, Sencun Zhu, Robert F. Erbacher:
Toward Software Diversity in Heterogeneous Networked Systems. DBSec 2014: 114-129 - [c82]Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Program Logic Based Software Plagiarism Detection. ISSRE 2014: 66-77 - [c81]Xin Chen, Jin-Hee Cho, Sencun Zhu:
GlobalTrust: An attack-resilient reputation system for tactical networks. SECON 2014: 275-283 - [c80]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c79]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - [c78]Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - [c77]Zhen Xie, Sencun Zhu:
GroupTie: toward hidden collusion group discovery in app stores. WISEC 2014: 153-164 - 2013
- [j26]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 10(3): 168-182 (2013) - [j25]Yi Yang, Min Shao, Sencun Zhu, Guohong Cao:
Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Networks 9(3): 34:1-34:23 (2013) - [c76]Wei Xu, Fangfang Zhang, Sencun Zhu:
JStill: mostly static detection of obfuscated malicious JavaScript code. CODASPY 2013: 117-128 - [c75]Wei Xu, Fangfang Zhang, Sencun Zhu:
Permlyzer: Analyzing permission usage in Android applications. ISSRE 2013: 400-410 - [c74]Xin Chen, Harshal Patankar, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks. SECON 2013: 131-139 - [c73]Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou:
Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness. SocialCom 2013: 196-203 - [c72]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186 - [c71]Ying Chen, Heng Xu, Yilu Zhou, Sencun Zhu:
Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications. WWW 2013: 201-212 - [p1]Don J. Torrieri, Sencun Zhu, Sushil Jajodia:
Cyber Maneuver Against External Adversaries and Compromised Nodes. Moving Target Defense 2013: 87-96 - 2012
- [j24]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10(8): 1619-1632 (2012) - [j23]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [c70]Vivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks. AINA 2012: 376-383 - [c69]Tianzhen Cheng, Ping Li, Sencun Zhu:
An Algorithm for Jammer Localization in Wireless Sensor Networks. AINA 2012: 724-731 - [c68]Chu Huang, Sencun Zhu, Dinghao Wu:
Towards Trusted Services: Result Verification Schemes for MapReduce. CCGRID 2012: 41-48 - [c67]Vivek Natarajan, Yi Yang, Sencun Zhu:
Secure Trust Metadata Management for Mobile Ad-Hoc Networks. ICISS 2012: 164-180 - [c66]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu:
A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121 - [c65]Wei Xu, Fangfang Zhang, Sencun Zhu:
The power of obfuscation techniques in malicious JavaScript code: A measurement study. MALWARE 2012: 9-16 - [c64]Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson:
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. RAID 2012: 147-168 - [c63]Ying Chen, Yilu Zhou, Sencun Zhu, Heng Xu:
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. SocialCom/PASSAT 2012: 71-80 - [c62]Zhi Xu, Kun Bai, Sencun Zhu:
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. WISEC 2012: 113-124 - [c61]Zhi Xu, Sencun Zhu:
Abusing Notification Services on Smartphones for Phishing and Spamming. WOOT 2012: 1-11 - 2011
- [j22]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: semantics aware signature generation for polymorphic worm detection. Int. J. Inf. Sec. 10(5): 269-283 (2011) - [j21]Daojing He, Jiajun Bu, Sencun Zhu, Sammy Chan, Chun Chen:
Distributed Access Control with Privacy Support in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 10(10): 3472-3481 (2011) - [j20]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-resilient anti-jamming communication in wireless sensor networks. Wirel. Networks 17(6): 1513-1527 (2011) - [c60]Ashwin Chaugule, Zhi Xu, Sencun Zhu:
A Specification Based Intrusion Detection Framework for Mobile Phones. ACNS 2011: 19-37 - [c59]Tianzhen Cheng, Ping Li, Sencun Zhu:
Multi-jammer Localization in Wireless Sensor Networks. CIS 2011: 736-740 - [c58]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu:
Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765 - [c57]Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan, Chun Chen:
Distributed privacy-preserving access control in a single-owner multi-user sensor network. INFOCOM 2011: 331-335 - [c56]Vivek Natarajan, Yi Yang, Sencun Zhu:
Resource-misuse attack detection in delay-tolerant networks. IPCCC 2011: 1-8 - [c55]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16 - [c54]Zhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu, Randy Moulic:
Context-Related Access Control for Mobile Caching. SecureComm 2011: 389-408 - [r3]Yi Yang, Sencun Zhu:
Anonymous Routing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 39-40 - [r2]Yi Yang, Sencun Zhu:
Sensor Code Attestation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1178-1179 - [r1]Yi Yang, Sencun Zhu:
Sensor Key Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1179-1181 - 2010
- [j19]Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-Free Buffer Overflow Attack Blocker. IEEE Trans. Dependable Secur. Comput. 7(1): 65-79 (2010) - [c53]Wei Xu, Sencun Zhu, Heng Xu:
COP: A Step toward Children Online Privacy. ACNS 2010: 529-544 - [c52]Wei Xu, Fangfang Zhang, Sencun Zhu:
Toward worm detection in online social networks. ACSAC 2010: 11-20 - [c51]Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson:
A hotspot-based protocol for attack traceback in mobile ad hoc networks. AsiaCCS 2010: 333-336 - [c50]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-Resilient Anti-jamming for Wireless Sensor Networks. ICICS 2010: 140-154 - [c49]Qinghua Li, Sencun Zhu, Guohong Cao:
Routing in Socially Selfish Delay Tolerant Networks. INFOCOM 2010: 857-865 - [c48]Wenping Chen, Sencun Zhu, Deying Li:
VAN: Vehicle-assisted shortest-time path navigation. MASS 2010: 442-451 - [c47]Bo Zhao, Zhi Xu, Caixia Chi, Sencun Zhu, Guohong Cao:
Mirroring Smartphones for Good: A Feasibility Study. MobiQuitous 2010: 26-38 - [c46]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. SecureComm 2010: 1-19 - [c45]Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu:
pBMDS: a behavior-based malware detection system for cellphone devices. WISEC 2010: 37-48
2000 – 2009
- 2009
- [j18]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009) - [j17]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009) - [j16]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009) - [c44]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158 - [c43]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Behavior based software theft detection. CCS 2009: 280-290 - [c42]Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484 - [c41]Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao:
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. INFOCOM 2009: 2455-2463 - [c40]Min Shao, Wenhui Hu, Sencun Zhu, Guohong Cao, Srikanth V. Krishnamurthy, Tom La Porta:
Cross-layer Enhanced Source Location Privacy in Sensor Networks. SECON 2009: 1-9 - [c39]Yi Yang, Sencun Zhu, Guohong Cao, Thomas La Porta:
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. SecureComm 2009: 373-393 - [c38]Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu:
Designing System-Level Defenses against Cellphone Malware. SRDS 2009: 83-90 - 2008
- [j15]Liang Xie, Sencun Zhu:
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. ACM Trans. Inf. Syst. Secur. 11(3): 15:1-15:30 (2008) - [j14]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 18:1-18:43 (2008) - [j13]Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao:
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sens. Networks 4(4): 23:1-23:34 (2008) - [c37]Liang Xie, Hui Song, Sencun Zhu:
On the Effectiveness of Internal Patching Against File-Sharing Worms. ACNS 2008: 1-20 - [c36]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 - [c35]Heng Xu, Nazneen Irani, Sencun Zhu, Wei Xu:
Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation. ICIS 2008: 106 - [c34]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu:
Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 - [c33]Min Shao, Yi Yang, Sencun Zhu, Guohong Cao:
Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55 - [c32]Hui Song, Sencun Zhu, Guohong Cao:
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136 - [c31]Yi Yang, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158 - [c30]Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra:
A cross-layer dropping attack in video streaming over ad hoc networks. SecureComm 2008: 25 - [c29]Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao:
Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88 - [c28]Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu:
A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 - [c27]Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140 - 2007
- [j12]Hui Song, Sencun Zhu, Guohong Cao:
Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007) - [j11]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient security mechanisms for overlay multicast based content delivery. Comput. Commun. 30(4): 793-806 (2007) - [j10]Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks. Int. J. Secur. Networks 2(1/2): 154-169 (2007) - [j9]Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson:
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. Int. J. Secur. Networks 2(3/4): 202-215 (2007) - [j8]Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) - [j7]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sens. Networks 3(3): 14 (2007) - [c26]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306 - [c25]Hui Song, Liang Xie, Sencun Zhu, Guohong Cao:
Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247 - [c24]Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao:
A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99 - [c23]Liang Xie, Sencun Zhu:
A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Peer-to-Peer Computing 2007: 61-70 - [c22]Heesook Choi, Sencun Zhu, Thomas F. La Porta:
SET: Detecting node clones in sensor networks. SecureComm 2007: 341-350 - [c21]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230 - 2006
- [j6]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) - [j5]Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick D. McDaniel, Mahmut T. Kandemir, Richard R. Brooks:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distributed Sens. Networks 2(3): 267-287 (2006) - [j4]Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) - [j3]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. J. Comput. Secur. 14(4): 301-325 (2006) - [j2]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Networks 2(4): 500-528 (2006) - [c20]Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 - [c19]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367 - [c18]Liang Xie, Sencun Zhu:
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. SecureComm 2006: 1-10 - [c17]Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-free Buffer Overflow Attack Blocker. USENIX Security Symposium 2006 - [e1]Sencun Zhu, Donggang Liu:
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-554-1 [contents] - 2005
- [c16]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 - [c15]Qijun Gu, Peng Liu, Sencun Zhu, Chao-Hsien Chu:
Defending against packet injection attacks unreliable ad hoc networks. GLOBECOM 2005: 5 - [c14]Hui Song, Sencun Zhu, Guohong Cao:
Attack-resilient time synchronization for wireless sensor networks. MASS 2005 - [c13]Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao:
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389 - [c12]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 - 2004
- [c11]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 - [c10]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. S&P 2004: 259-271 - 2003
- [c9]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks. CCS 2003: 62-72 - [c8]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- - [c7]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- - [c6]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 - [c5]Sencun Zhu, Sushil Jajodia:
Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10 - [c4]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 - [c3]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 - 2002
- [j1]Sanjeev Setia, Sencun Zhu, Sushil Jajodia:
A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Evaluation 49(1/4): 21-41 (2002) - [c2]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
1990 – 1999
- 1996
- [c1]Huifang Dou, Ainishet Asres, Zhaoying Zhou, Sencun Zhu:
Stimulator for real time control of paralyzed muscles during functional electrical stimulation. ICECS 1996: 1096-1099
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint