Sencun Zhu, Ph.D. - Publications

Affiliations: 
2004 George Mason University, Washington, DC 
Area:
Computer Science

28 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Khazbak Y, Fan J, Zhu S, Cao G. Preserving Personalized Location Privacy in Ride-Hailing Service Tsinghua Science & Technology. 25: 743-757. DOI: 10.26599/Tst.2020.9010010  0.327
2020 Fu H, Hu P, Zheng Z, Das A, Pathak P, Gu T, Zhu S, Mohapatra P. Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications Ieee Transactions On Mobile Computing. 1-1. DOI: 10.1109/Tmc.2020.2992253  0.377
2020 He D, Li S, Li C, Zhu S, Chan S, Min W, Guizani N. Security Analysis of Cryptocurrency Wallets in Android-based Applications Ieee Network. 1-6. DOI: 10.1109/Mnet.011.2000025  0.379
2020 He D, Liu X, Zheng J, Chan S, Zhu S, Min W, Guizani N. A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems Ieee Network. 34: 173-179. DOI: 10.1109/Mnet.001.1900480  0.37
2019 Nagothu D, Chen Y, Blasch E, Aved A, Zhu S. Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors (Basel, Switzerland). 19. PMID 31141880 DOI: 10.3390/S19112424  0.329
2018 Liu X, Liu J, Wang W, Zhu S. Android single sign-on security: Issues, taxonomy and directions Future Generation Computer Systems. 89: 402-420. DOI: 10.1016/J.Future.2018.06.049  0.416
2014 Cheng T, Li P, Zhu S, Torrieri D. M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks Integrated Computer-Aided Engineering. 21: 19-34. DOI: 10.3233/Ica-130445  0.322
2013 Yang Y, Shao M, Zhu S, Cao G. Towards statistically strong source anonymity for sensor networks Acm Transactions On Sensor Networks. 9: 34. DOI: 10.1145/2480730.2480737  0.487
2013 Li Q, Gao W, Zhu S, Cao G. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 10: 168-182. DOI: 10.1109/Tdsc.2012.84  0.486
2011 He D, Bu J, Zhu S, Chan S, Chen C. Distributed Access Control with Privacy Support in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 10: 3472-3481. DOI: 10.1109/Twc.2011.072511.102283  0.445
2011 Jiang X, Hu W, Zhu S, Cao G. Compromise-resilient anti-jamming communication in wireless sensor networks Wireless Networks. 17: 1513-1527. DOI: 10.1007/S11276-011-0361-8  0.494
2010 Wang X, Pan C, Liu P, Zhu S. SigFree: A Signature-Free Buffer Overflow Attack Blocker Ieee Transactions On Dependable and Secure Computing. 7: 65-79. DOI: 10.1109/Tdsc.2008.30  0.331
2009 Shao M, Zhu S, Zhang W, Cao G, Yang Y. pDCS: Security and Privacy Support for Data-Centric Sensor Networks Ieee Transactions On Mobile Computing. 8: 1023-1038. DOI: 10.1109/Tmc.2008.168  0.49
2008 Song H, Zhu S, Zhang W, Cao G. Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks Acm Transactions On Sensor Networks. 4: 23. DOI: 10.1145/1387663.1387669  0.478
2008 Yang Y, Wang X, Zhu S, Cao G. SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Acm Transactions On Information and System Security. 11: 18. DOI: 10.1145/1380564.1380568  0.458
2008 Xie L, Zhu S. Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification Acm Transactions On Information and System Security. 11: 15. DOI: 10.1145/1341731.1341736  0.514
2007 Hsu HY, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network International Journal of Security and Networks. 2: 202-215. DOI: 10.1504/Ijsn.2007.013174  0.502
2007 Gu Q, Liu P, Chu CH, Zhu S. Defence against packet injection in ad hoc networks International Journal of Security and Networks. 2: 154. DOI: 10.1504/Ijsn.2007.012832  0.479
2007 Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062  0.761
2007 Traynor P, Kumar R, Choi H, Cao G, Zhu S, Porta TL. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks Ieee Transactions On Mobile Computing. 6: 663-677. DOI: 10.1109/Tmc.2007.1020  0.528
2007 Zhu S, Yao C, Liu D, Setia S, Jajodia S. Efficient security mechanisms for overlay multicast based content delivery Computer Communications. 30: 793-806. DOI: 10.1016/J.Comcom.2006.10.003  0.769
2006 Zhu S, Setia S, Xu S, Jajodia S. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Journal of Computer Security. 14: 301-325. DOI: 10.3233/Jcs-2006-14401  0.767
2006 Gu Q, Chu C, Liu P, Zhu S. Slander-resistant forwarding isolation in ad hoc networks International Journal of Mobile Network Design and Innovation. 1: 162-174. DOI: 10.1504/Ijmndi.2006.012086  0.476
2006 Zhu S, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks Acm Transactions On Sensor Networks. 2: 500-528. DOI: 10.1145/1218556.1218559  0.756
2006 Pirretti M, Zhu S, Vijaykrishnan N, McDaniel P, Kandemir M, Brooks R. The sleep deprivation attack in sensor networks: Analysis and methods of defense International Journal of Distributed Sensor Networks. 2: 267-287. DOI: 10.1080/15501320600642718  0.397
2004 Zhu S, Jajodia S. Scalable Group Rekeying for Secure Multicast: A Survey Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2918: 1-10. DOI: 10.1007/978-3-540-24604-6_1  0.38
2003 Zhu S, Setia S, Jajodia S. Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast Lecture Notes in Computer Science. 107-118. DOI: 10.1007/978-3-540-39405-1_10  0.747
2002 Setia S, Zhu S, Jajodia S. A comparative performance analysis of reliable group rekey transport protocols for secure multicast Performance Evaluation. 49: 21-41. DOI: 10.1016/S0166-5316(02)00130-X  0.745
Show low-probability matches.