Follow
Sencun Zhu
Sencun Zhu
Verified email at psu.edu - Homepage
Title
Cited by
Cited by
Year
LEAP+ Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
27792006
Detecting offensive language in social media to protect adolescent online safety
Y Chen, Y Zhou, S Zhu, H Xu
2012 international conference on privacy, security, risk and trust and 2012 …, 2012
8892012
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
8352004
Routing in socially selfish delay tolerant networks
Q Li, S Zhu, G Cao
2010 Proceedings IEEE Infocom, 1-9, 2010
7002010
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
Y Yang, X Wang, S Zhu, G Cao
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-43, 2008
6292008
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
Z Xu, K Bai, S Zhu
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
4972012
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4812003
Towards statistically strong source anonymity for sensor networks
Y Yang, M Shao, S Zhu, G Cao
ACM Transactions on Sensor Networks (TOSN) 9 (3), 1-23, 2013
3382013
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
2862014
SET: Detecting node clones in sensor networks
H Choi, S Zhu, TF La Porta
2007 Third International Conference on Security and Privacy in …, 2007
2842007
Towards event source unobservability with minimum network traffic in sensor networks
Y Yang, M Shao, S Zhu, B Urgaonkar, G Cao
Proceedings of the first ACM conference on Wireless network security, 77-88, 2008
2632008
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
2512014
Practical broadcast authentication in sensor networks
D Liu, P Ning, S Zhu, S Jajodia
The Second Annual International Conference on Mobile and Ubiquitous Systems …, 2005
2312005
Attack-resilient time synchronization for wireless sensor networks
H Song, S Zhu, G Cao
Ad Hoc Networks 5 (1), 112-125, 2007
2202007
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
S Zhu, S Xu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems Workshops …, 2003
2192003
Distributed software-based attestation for node compromise detection in sensor networks
Y Yang, X Wang, S Zhu, G Cao
2007 26th IEEE international symposium on reliable distributed systems (SRDS …, 2007
2102007
Backdoor embedding in convolutional neural network models via invisible perturbation
H Zhong, C Liao, AC Squicciarini, S Zhu, D Miller
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
2092020
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
2072008
pBMDS: a behavior-based malware detection system for cellphone devices
L Xie, X Zhang, JP Seifert, S Zhu
Proceedings of the third ACM conference on Wireless network security, 37-48, 2010
1812010
The sleep deprivation attack in sensor networks: Analysis and methods of defense
M Pirretti, S Zhu, N Vijaykrishnan, P McDaniel, M Kandemir, R Brooks
International Journal of Distributed Sensor Networks 2 (3), 267-287, 2006
1792006
The system can't perform the operation now. Try again later.
Articles 1–20