Year |
Citation |
Score |
2020 |
Khazbak Y, Fan J, Zhu S, Cao G. Preserving Personalized Location Privacy in Ride-Hailing Service Tsinghua Science & Technology. 25: 743-757. DOI: 10.26599/Tst.2020.9010010 |
0.327 |
|
2020 |
Fu H, Hu P, Zheng Z, Das A, Pathak P, Gu T, Zhu S, Mohapatra P. Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications Ieee Transactions On Mobile Computing. 1-1. DOI: 10.1109/Tmc.2020.2992253 |
0.377 |
|
2020 |
He D, Li S, Li C, Zhu S, Chan S, Min W, Guizani N. Security Analysis of Cryptocurrency Wallets in Android-based Applications Ieee Network. 1-6. DOI: 10.1109/Mnet.011.2000025 |
0.379 |
|
2020 |
He D, Liu X, Zheng J, Chan S, Zhu S, Min W, Guizani N. A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems Ieee Network. 34: 173-179. DOI: 10.1109/Mnet.001.1900480 |
0.37 |
|
2019 |
Nagothu D, Chen Y, Blasch E, Aved A, Zhu S. Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors (Basel, Switzerland). 19. PMID 31141880 DOI: 10.3390/S19112424 |
0.329 |
|
2018 |
Liu X, Liu J, Wang W, Zhu S. Android single sign-on security: Issues, taxonomy and directions Future Generation Computer Systems. 89: 402-420. DOI: 10.1016/J.Future.2018.06.049 |
0.416 |
|
2014 |
Cheng T, Li P, Zhu S, Torrieri D. M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks Integrated Computer-Aided Engineering. 21: 19-34. DOI: 10.3233/Ica-130445 |
0.322 |
|
2013 |
Yang Y, Shao M, Zhu S, Cao G. Towards statistically strong source anonymity for sensor networks Acm Transactions On Sensor Networks. 9: 34. DOI: 10.1145/2480730.2480737 |
0.487 |
|
2013 |
Li Q, Gao W, Zhu S, Cao G. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 10: 168-182. DOI: 10.1109/Tdsc.2012.84 |
0.486 |
|
2011 |
He D, Bu J, Zhu S, Chan S, Chen C. Distributed Access Control with Privacy Support in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 10: 3472-3481. DOI: 10.1109/Twc.2011.072511.102283 |
0.445 |
|
2011 |
Jiang X, Hu W, Zhu S, Cao G. Compromise-resilient anti-jamming communication in wireless sensor networks Wireless Networks. 17: 1513-1527. DOI: 10.1007/S11276-011-0361-8 |
0.494 |
|
2010 |
Wang X, Pan C, Liu P, Zhu S. SigFree: A Signature-Free Buffer Overflow Attack Blocker Ieee Transactions On Dependable and Secure Computing. 7: 65-79. DOI: 10.1109/Tdsc.2008.30 |
0.331 |
|
2009 |
Shao M, Zhu S, Zhang W, Cao G, Yang Y. pDCS: Security and Privacy Support for Data-Centric Sensor Networks Ieee Transactions On Mobile Computing. 8: 1023-1038. DOI: 10.1109/Tmc.2008.168 |
0.49 |
|
2008 |
Song H, Zhu S, Zhang W, Cao G. Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks Acm Transactions On Sensor Networks. 4: 23. DOI: 10.1145/1387663.1387669 |
0.478 |
|
2008 |
Yang Y, Wang X, Zhu S, Cao G. SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Acm Transactions On Information and System Security. 11: 18. DOI: 10.1145/1380564.1380568 |
0.458 |
|
2008 |
Xie L, Zhu S. Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification Acm Transactions On Information and System Security. 11: 15. DOI: 10.1145/1341731.1341736 |
0.514 |
|
2007 |
Hsu HY, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network International Journal of Security and Networks. 2: 202-215. DOI: 10.1504/Ijsn.2007.013174 |
0.502 |
|
2007 |
Gu Q, Liu P, Chu CH, Zhu S. Defence against packet injection in ad hoc networks International Journal of Security and Networks. 2: 154. DOI: 10.1504/Ijsn.2007.012832 |
0.479 |
|
2007 |
Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062 |
0.761 |
|
2007 |
Traynor P, Kumar R, Choi H, Cao G, Zhu S, Porta TL. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks Ieee Transactions On Mobile Computing. 6: 663-677. DOI: 10.1109/Tmc.2007.1020 |
0.528 |
|
2007 |
Zhu S, Yao C, Liu D, Setia S, Jajodia S. Efficient security mechanisms for overlay multicast based content delivery Computer Communications. 30: 793-806. DOI: 10.1016/J.Comcom.2006.10.003 |
0.769 |
|
2006 |
Zhu S, Setia S, Xu S, Jajodia S. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Journal of Computer Security. 14: 301-325. DOI: 10.3233/Jcs-2006-14401 |
0.767 |
|
2006 |
Gu Q, Chu C, Liu P, Zhu S. Slander-resistant forwarding isolation in ad hoc networks International Journal of Mobile Network Design and Innovation. 1: 162-174. DOI: 10.1504/Ijmndi.2006.012086 |
0.476 |
|
2006 |
Zhu S, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks Acm Transactions On Sensor Networks. 2: 500-528. DOI: 10.1145/1218556.1218559 |
0.756 |
|
2006 |
Pirretti M, Zhu S, Vijaykrishnan N, McDaniel P, Kandemir M, Brooks R. The sleep deprivation attack in sensor networks: Analysis and methods of defense International Journal of Distributed Sensor Networks. 2: 267-287. DOI: 10.1080/15501320600642718 |
0.397 |
|
2004 |
Zhu S, Jajodia S. Scalable Group Rekeying for Secure Multicast: A Survey Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2918: 1-10. DOI: 10.1007/978-3-540-24604-6_1 |
0.38 |
|
2003 |
Zhu S, Setia S, Jajodia S. Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast Lecture Notes in Computer Science. 107-118. DOI: 10.1007/978-3-540-39405-1_10 |
0.747 |
|
2002 |
Setia S, Zhu S, Jajodia S. A comparative performance analysis of reliable group rekey transport protocols for secure multicast Performance Evaluation. 49: 21-41. DOI: 10.1016/S0166-5316(02)00130-X |
0.745 |
|
Show low-probability matches. |