BibTeX records: Sencun Zhu

download as .bib file

@article{DBLP:journals/tdsc/HeWZWZLY24,
  author       = {Yongzhong He and
                  Yiming Wang and
                  Sencun Zhu and
                  Wei Wang and
                  Yunjia Zhang and
                  Qiang Li and
                  Aimin Yu},
  title        = {Automatically Identifying {CVE} Affected Versions With Patches and
                  Developer Logs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {905--919},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264567},
  doi          = {10.1109/TDSC.2023.3264567},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/FitwiCZ23,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video
                  Frame Scrambling},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {276--287},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3135352},
  doi          = {10.1109/TSC.2021.3135352},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/FitwiCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GuanLCZP23,
  author       = {Chongqi Guan and
                  Heting Liu and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {49--59},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590195},
  doi          = {10.1145/3558482.3590195},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GuanLCZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-03320,
  author       = {Henger Li and
                  Chen Wu and
                  Sencun Zhu and
                  Zizhan Zheng},
  title        = {Learning to Backdoor Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2303.03320},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.03320},
  doi          = {10.48550/ARXIV.2303.03320},
  eprinttype    = {arXiv},
  eprint       = {2303.03320},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-03320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06430,
  author       = {Chongqi Guan and
                  Heting Liu and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through
                  Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2305.06430},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06430},
  doi          = {10.48550/ARXIV.2305.06430},
  eprinttype    = {arXiv},
  eprint       = {2305.06430},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SunZC22,
  author       = {Yuanyi Sun and
                  Sencun Zhu and
                  Yu Chen},
  title        = {ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {630--649},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0089},
  doi          = {10.56553/POPETS-2022-0089},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/SunZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuLZWW22,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {Alexa Skills: Security Vulnerabilities and Countermeasures},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10066153},
  doi          = {10.1109/CNS56114.2022.10066153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuLZWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuanCCZP22,
  author       = {Chongqi Guan and
                  Xianda Chen and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based
                  on 360-Degree Video},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947265},
  doi          = {10.1109/CNS56114.2022.9947265},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuanCCZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunZZS22,
  author       = {Yuanyi Sun and
                  Sencun Zhu and
                  Yan Zhao and
                  Pengfei Sun},
  title        = {A User-Friendly Two-Factor Authentication Method against Real-Time
                  Phishing Attacks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947253},
  doi          = {10.1109/CNS56114.2022.9947253},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SunZZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WuYZM22,
  author       = {Chen Wu and
                  Xian Yang and
                  Sencun Zhu and
                  Prasenjit Mitra},
  title        = {Toward Cleansing Backdoored Neural Networks in Federated Learning},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {820--830},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00084},
  doi          = {10.1109/ICDCS54860.2022.00084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/WuYZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-09441,
  author       = {Chen Wu and
                  Sencun Zhu and
                  Prasenjit Mitra},
  title        = {Federated Unlearning with Knowledge Distillation},
  journal      = {CoRR},
  volume       = {abs/2201.09441},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.09441},
  eprinttype    = {arXiv},
  eprint       = {2201.09441},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-09441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-06694,
  author       = {Bolor{-}Erdene Zolbayar and
                  Ryan Sheatsley and
                  Patrick D. McDaniel and
                  Michael J. Weisman and
                  Sencun Zhu and
                  Shitong Zhu and
                  Srikanth V. Krishnamurthy},
  title        = {Generating Practical Adversarial Network Traffic Flows Using {NIDSGAN}},
  journal      = {CoRR},
  volume       = {abs/2203.06694},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.06694},
  doi          = {10.48550/ARXIV.2203.06694},
  eprinttype    = {arXiv},
  eprint       = {2203.06694},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-06694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeGLD0ZG21,
  author       = {Daojing He and
                  Hongjie Gu and
                  Tinghui Li and
                  Yongliang Du and
                  Xiaolei Wang and
                  Sencun Zhu and
                  Nadra Guizani},
  title        = {Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {2},
  pages        = {202--207},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000450},
  doi          = {10.1109/MNET.011.2000450},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeGLD0ZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XiaSZRS21,
  author       = {Tianrou Xia and
                  Yuanyi Sun and
                  Sencun Zhu and
                  Zeeshan Rasheed and
                  Khurram Shafique},
  title        = {Toward {A} Network-Assisted Approach for Effective Ransomware Detection},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.28-1-2021.168506},
  doi          = {10.4108/EAI.28-1-2021.168506},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/XiaSZRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/HuangZZZZLMCZG21,
  author       = {Heqing Huang and
                  Cong Zheng and
                  Junyuan Zeng and
                  Wu Zhou and
                  Sencun Zhu and
                  Peng Liu and
                  Ian M. Molloy and
                  Suresh Chari and
                  Ce Zhang and
                  Quanlong Guan},
  title        = {A Large-Scale Study of Android Malware Development Phenomenon on Public
                  Malware Submission and Scanning Platform},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {7},
  number       = {2},
  pages        = {255--270},
  year         = {2021},
  url          = {https://doi.org/10.1109/TBDATA.2018.2790439},
  doi          = {10.1109/TBDATA.2018.2790439},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/HuangZZZZLMCZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FuHZDPGZM21,
  author       = {Hao Fu and
                  Pengfei Hu and
                  Zizhan Zheng and
                  Aveek K. Das and
                  Parth H. Pathak and
                  Tianbo Gu and
                  Sencun Zhu and
                  Prasant Mohapatra},
  title        = {Towards Automatic Detection of Nonfunctional Sensitive Transmissions
                  in Mobile Applications},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {10},
  pages        = {3066--3080},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2020.2992253},
  doi          = {10.1109/TMC.2020.2992253},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/FuHZDPGZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LinWHJWMHZZ21,
  author       = {Yaguang Lin and
                  Xiaoming Wang and
                  Fei Hao and
                  Yichuan Jiang and
                  Yulei Wu and
                  Geyong Min and
                  Daojing He and
                  Sencun Zhu and
                  Wei Zhao},
  title        = {Dynamic Control of Fraud Information Spreading in Mobile Social Networks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {51},
  number       = {6},
  pages        = {3725--3738},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSMC.2019.2930908},
  doi          = {10.1109/TSMC.2019.2930908},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/LinWHJWMHZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/YuanLZ21,
  author       = {Lun{-}Pin Yuan and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Recompose Event Sequences vs. Predict Next Events: {A} Novel Anomaly
                  Detection Approach for Discrete Event Logs},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {336--348},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453098},
  doi          = {10.1145/3433210.3453098},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/YuanLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/YuanCYKZ21,
  author       = {Lun{-}Pin Yuan and
                  Euijin Choo and
                  Ting Yu and
                  Issa Khalil and
                  Sencun Zhu},
  title        = {Time-Window Based Group-Behavior Supported Method for Accurate Detection
                  of Anomalous Users},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {250--262},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00038},
  doi          = {10.1109/DSN48987.2021.00038},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/YuanCYKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-00132,
  author       = {Yuanyi Sun and
                  Sencun Zhu and
                  Yao Zhao and
                  Pengfei Sun},
  title        = {Let Your Camera See for You: {A} Novel Two-Factor Authentication Method
                  against Real-Time Phishing Attacks},
  journal      = {CoRR},
  volume       = {abs/2109.00132},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.00132},
  eprinttype    = {arXiv},
  eprint       = {2109.00132},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-00132.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03798,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang and
                  Xiangliang Zhang},
  title        = {AppQ: Warm-starting App Recommendation Based on View Graphs},
  journal      = {CoRR},
  volume       = {abs/2109.03798},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03798},
  eprinttype    = {arXiv},
  eprint       = {2109.03798},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLZCZMG20,
  author       = {Daojing He and
                  Xiaoxia Liu and
                  Jiajia Zheng and
                  Sammy Chan and
                  Sencun Zhu and
                  Weidong Min and
                  Nadra Guizani},
  title        = {A Lightweight and Intelligent Intrusion Detection System for Integrated
                  Electronic Systems},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {4},
  pages        = {173--179},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900480},
  doi          = {10.1109/MNET.001.1900480},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeLZCZMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLLZCMG20,
  author       = {Daojing He and
                  Shihao Li and
                  Cong Li and
                  Sencun Zhu and
                  Sammy Chan and
                  Weidong Min and
                  Nadra Guizani},
  title        = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {6},
  pages        = {114--119},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.2000025},
  doi          = {10.1109/MNET.011.2000025},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MohaisenZ20,
  author       = {David Mohaisen and
                  Sencun Zhu},
  title        = {Editorial},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.18-5-2020.164587},
  doi          = {10.4108/EAI.18-5-2020.164587},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MohaisenZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXHWZJ20,
  author       = {Yubao Zhang and
                  Jidong Xiao and
                  Shuai Hao and
                  Haining Wang and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Understanding the Manipulation on Recommender Systems through Web
                  Injection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3807--3818},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954737},
  doi          = {10.1109/TIFS.2019.2954737},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiuLZWZ20,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Wei Wang and
                  Xiangliang Zhang},
  title        = {Privacy Risk Analysis and Mitigation of Analytics Libraries in the
                  Android Ecosystem},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {1184--1199},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2903186},
  doi          = {10.1109/TMC.2019.2903186},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiuLZWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LiHLZCC20,
  author       = {Cong Li and
                  Daojing He and
                  Shihao Li and
                  Sencun Zhu and
                  Sammy Chan and
                  Yao Cheng},
  title        = {Android-based Cryptocurrency Wallets: Attacks and Countermeasures},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00010},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00010},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LiHLZCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhongLSZ020,
  author       = {Haoti Zhong and
                  Cong Liao and
                  Anna Cinzia Squicciarini and
                  Sencun Zhu and
                  David J. Miller},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Backdoor Embedding in Convolutional Neural Network Models via Invisible
                  Perturbation},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375751},
  doi          = {10.1145/3374664.3375751},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhongLSZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/Fitwi0Z20,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service},
  booktitle    = {6th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020},
  pages        = {125--134},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CIC50333.2020.00024},
  doi          = {10.1109/CIC50333.2020.00024},
  timestamp    = {Fri, 27 May 2022 15:04:14 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/Fitwi0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/QiaoHGZGC20,
  author       = {Qi Qiao and
                  Daojing He and
                  Yun Gao and
                  Sencun Zhu and
                  Jiahao Gao and
                  Sammy Chan},
  title        = {Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems},
  booktitle    = {17th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2020, Virtual Event, Italy, June 22-25, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SECON48991.2020.9158421},
  doi          = {10.1109/SECON48991.2020.9158421},
  timestamp    = {Wed, 03 Feb 2021 13:40:37 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/QiaoHGZGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LiuHGZC20,
  author       = {Xiaoxia Liu and
                  Daojing He and
                  Yun Gao and
                  Sencun Zhu and
                  Sammy Chan},
  title        = {{TLP-IDS:} {A} Two-layer Intrusion Detection System for Integrated
                  Electronic Systems},
  booktitle    = {International Symposium on Reliable Distributed Systems, {SRDS} 2020,
                  Shanghai, China, September 21-24, 2020},
  pages        = {205--214},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SRDS51746.2020.00028},
  doi          = {10.1109/SRDS51746.2020.00028},
  timestamp    = {Thu, 19 Nov 2020 10:52:27 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LiuHGZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunCZ020,
  author       = {Yuanyi Sun and
                  Shiqing Chen and
                  Sencun Zhu and
                  Yu Chen},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {\emph{iRyP}: a purely edge-based visual privacy-respecting system
                  for mobile cameras},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399341},
  doi          = {10.1145/3395351.3399341},
  timestamp    = {Tue, 29 Dec 2020 18:27:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunCZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-12428,
  author       = {Tianrou Xia and
                  Yuanyi Sun and
                  Sencun Zhu and
                  Zeeshan Rasheed and
                  Khurram Hassan{-}Shafique},
  title        = {A Network-Assisted Approach for Ransomware Detection},
  journal      = {CoRR},
  volume       = {abs/2008.12428},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.12428},
  eprinttype    = {arXiv},
  eprint       = {2008.12428},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-12428.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-10788,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {"Are you home alone?" "Yes" Disclosing Security
                  and Privacy Vulnerabilities in Alexa Skills},
  journal      = {CoRR},
  volume       = {abs/2010.10788},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.10788},
  eprinttype    = {arXiv},
  eprint       = {2010.10788},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-10788.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-01767,
  author       = {Chen Wu and
                  Xian Yang and
                  Sencun Zhu and
                  Prasenjit Mitra},
  title        = {Mitigating Backdoor Attacks in Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2011.01767},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.01767},
  eprinttype    = {arXiv},
  eprint       = {2011.01767},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-01767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13971,
  author       = {Lun{-}Pin Yuan and
                  Euijin Choo and
                  Ting Yu and
                  Issa Khalil and
                  Sencun Zhu},
  title        = {Time-Window Group-Correlation Support vs. Individual Features: {A}
                  Detection of Abnormal Users},
  journal      = {CoRR},
  volume       = {abs/2012.13971},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13971},
  eprinttype    = {arXiv},
  eprint       = {2012.13971},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13971.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13972,
  author       = {Lun{-}Pin Yuan and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Recomposition vs. Prediction: {A} Novel Anomaly Detection for Discrete
                  Events Based On Autoencoder},
  journal      = {CoRR},
  volume       = {abs/2012.13972},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13972},
  eprinttype    = {arXiv},
  eprint       = {2012.13972},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WangCYHZ19,
  author       = {Xiaolei Wang and
                  Andrea Continella and
                  Yuexiang Yang and
                  Yongzhong He and
                  Sencun Zhu},
  title        = {LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile
                  Applications},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {3},
  number       = {1},
  pages        = {28:1--28:25},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314415},
  doi          = {10.1145/3314415},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/WangCYHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeQCDCZG19,
  author       = {Daojing He and
                  Yinrong Qiao and
                  Shiqing Chen and
                  Xiao Du and
                  Wenjie Chen and
                  Sencun Zhu and
                  Mohsen Guizani},
  title        = {A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian
                  Unmanned Aerial Vehicles},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {2},
  pages        = {146--151},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.2018.1800065},
  doi          = {10.1109/MNET.2018.1800065},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeQCDCZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NagothuCBAZ19,
  author       = {Deeraj Nagothu and
                  Yu Chen and
                  Erik Blasch and
                  Alexander J. Aved and
                  Sencun Zhu},
  title        = {Detecting Malicious False Frame Injection Attacks on Surveillance
                  Systems at the Edge Using Electrical Network Frequency Signals},
  journal      = {Sensors},
  volume       = {19},
  number       = {11},
  pages        = {2424},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19112424},
  doi          = {10.3390/S19112424},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/NagothuCBAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SongWZW19,
  author       = {Yang Song and
                  Chen Wu and
                  Sencun Zhu and
                  Haining Wang},
  title        = {A Machine Learning Based Approach for Mobile App Rating Manipulation
                  Detection},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157415},
  doi          = {10.4108/EAI.8-4-2019.157415},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SongWZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/WangYZ19,
  author       = {Xiaolei Wang and
                  Yuexiang Yang and
                  Sencun Zhu},
  title        = {Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing
                  with Forced Execution},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {12},
  pages        = {2768--2782},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2886881},
  doi          = {10.1109/TMC.2018.2886881},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/WangYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/Fitwi0Z19,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance
                  at the Edge},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {552--555},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00080},
  doi          = {10.1109/BLOCKCHAIN.2019.00080},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/Fitwi0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AlrizahZX019,
  author       = {Mshabab Alrizah and
                  Sencun Zhu and
                  Xinyu Xing and
                  Gang Wang},
  title        = {Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing
                  Process of Ad-blocking Systems},
  booktitle    = {Proceedings of the Internet Measurement Conference, {IMC} 2019, Amsterdam,
                  The Netherlands, October 21-23, 2019},
  pages        = {230--244},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3355369.3355588},
  doi          = {10.1145/3355369.3355588},
  timestamp    = {Fri, 25 Oct 2019 09:51:53 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/AlrizahZX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FuZZM19,
  author       = {Hao Fu and
                  Zizhan Zheng and
                  Sencun Zhu and
                  Prasant Mohapatra},
  title        = {Keeping Context In Mind: Automating Mobile App Access Control with
                  User Interface Inspection},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2089--2097},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737510},
  doi          = {10.1109/INFOCOM.2019.8737510},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/FuZZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/Fitwi0Z19,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {No Peeking through My Windows: Conserving Privacy in Personal Drones},
  booktitle    = {2019 {IEEE} International Smart Cities Conference, {ISC2} 2019, Casablanca,
                  Morocco, October 14-17, 2019},
  pages        = {199--204},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISC246665.2019.9071765},
  doi          = {10.1109/ISC246665.2019.9071765},
  timestamp    = {Tue, 05 May 2020 14:19:32 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/Fitwi0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuanHY0Z19,
  author       = {Lun{-}Pin Yuan and
                  Wenjun Hu and
                  Ting Yu and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Towards Large-Scale Hunting for Android Negative-Day Malware},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {533--545},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/yuan},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YuanHY0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GuanCZLLXL19,
  author       = {Le Guan and
                  Chen Cao and
                  Sencun Zhu and
                  Jingqiang Lin and
                  Peng Liu and
                  Yubin Xia and
                  Bo Luo},
  title        = {Protecting mobile devices from physical memory attacks with targeted
                  encryption},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {34--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319721},
  doi          = {10.1145/3317549.3319721},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GuanCZLLXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-03473,
  author       = {Deeraj Nagothu and
                  Jacob Schwell and
                  Yu Chen and
                  Erik Blasch and
                  Sencun Zhu},
  title        = {A Study on Smart Online Frame Forging Attacks against Video Surveillance
                  System},
  journal      = {CoRR},
  volume       = {abs/1903.03473},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.03473},
  eprinttype    = {arXiv},
  eprint       = {1903.03473},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-03473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-09935,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {No Peeking through My Windows: Conserving Privacy in Personal Drones},
  journal      = {CoRR},
  volume       = {abs/1908.09935},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.09935},
  eprinttype    = {arXiv},
  eprint       = {1908.09935},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-09935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-09845,
  author       = {Alem Fitwi and
                  Yu Chen and
                  Sencun Zhu},
  title        = {A Lightweight Blockchain-based Privacy Protection for Smart Surveillance
                  at the Edge},
  journal      = {CoRR},
  volume       = {abs/1909.09845},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.09845},
  eprinttype    = {arXiv},
  eprint       = {1909.09845},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-09845.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuLWZ18,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Wei Wang and
                  Sencun Zhu},
  title        = {Android single sign-on security: Issues, taxonomy and directions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {89},
  pages        = {402--420},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.06.049},
  doi          = {10.1016/J.FUTURE.2018.06.049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuLWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM18,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Defence Mechanisms for Public Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153524},
  doi          = {10.4108/EAI.4-1-2018.153524},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuangZY18,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Yi Yang},
  title        = {An Evaluation Framework for Moving Target Defense Based on Analytic
                  Hierarchy Process},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153527},
  doi          = {10.4108/EAI.4-1-2018.153527},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HuangZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhazbakFZC18,
  author       = {Youssef Khazbak and
                  Jingyao Fan and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Preserving Location Privacy in Ride-Hailing Service},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433221},
  doi          = {10.1109/CNS.2018.8433221},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KhazbakFZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiaoZZS18,
  author       = {Cong Liao and
                  Haoti Zhong and
                  Sencun Zhu and
                  Anna Cinzia Squicciarini},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Server-Based Manipulation Attacks Against Machine Learning Models},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {24--34},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176321},
  doi          = {10.1145/3176258.3176321},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiaoZZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CaoYSLSZ18,
  author       = {Chen Cao and
                  Lun{-}Pin Yuan and
                  Anoop Singhal and
                  Peng Liu and
                  Xiaoyan Sun and
                  Sencun Zhu},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Assessing Attack Impact on Business Processes by Interconnecting Attack
                  Graphs and Entity Dependency Graphs},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {330--348},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_21},
  doi          = {10.1007/978-3-319-95729-6\_21},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CaoYSLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Yuan0Z18,
  author       = {Lun{-}Pin Yuan and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Android {STAR:} An Efficient Interaction-Preserving Record-Replay
                  System For Messenger App Usage Surveillance},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {248--259},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212503},
  doi          = {10.1145/3212480.3212503},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Yuan0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2017,
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78813-5},
  doi          = {10.1007/978-3-319-78813-5},
  isbn         = {978-3-319-78812-8},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2017w,
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Security and Privacy in Communication Networks - SecureComm 2017 International
                  Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
                  22-25, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78816-6},
  doi          = {10.1007/978-3-319-78816-6},
  isbn         = {978-3-319-78815-9},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2017w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2018-1,
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9},
  doi          = {10.1007/978-3-030-01701-9},
  isbn         = {978-3-030-01700-2},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2018-2,
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0},
  doi          = {10.1007/978-3-030-01704-0},
  isbn         = {978-3-030-01703-3},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-10307,
  author       = {Cong Liao and
                  Haoti Zhong and
                  Anna Cinzia Squicciarini and
                  Sencun Zhu and
                  David J. Miller},
  title        = {Backdoor Embedding in Convolutional Neural Network Models via Invisible
                  Perturbation},
  journal      = {CoRR},
  volume       = {abs/1808.10307},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.10307},
  eprinttype    = {arXiv},
  eprint       = {1808.10307},
  timestamp    = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-10307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangZGH17,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Quanlong Guan and
                  Yongzhong He},
  title        = {A software assignment algorithm for minimizing worm damage in networked
                  systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {35},
  pages        = {55--67},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.05.004},
  doi          = {10.1016/J.JISA.2017.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangZGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM17,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation
                  of Modern Communication Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153514},
  doi          = {10.4108/EAI.28-12-2017.153514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/LuoMWLZ17,
  author       = {Lannan Luo and
                  Jiang Ming and
                  Dinghao Wu and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison
                  with Applications to Software and Algorithm Plagiarism Detection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {43},
  number       = {12},
  pages        = {1157--1177},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSE.2017.2655046},
  doi          = {10.1109/TSE.2017.2655046},
  timestamp    = {Wed, 23 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/LuoMWLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangZZY17,
  author       = {Xiaolei Wang and
                  Sencun Zhu and
                  Dehua Zhou and
                  Yuexiang Yang},
  title        = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated
                  Dynamic Analysis of Android Malware},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {350--361},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134601},
  doi          = {10.1145/3134600.3134601},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenHZY17,
  author       = {Hao Chen and
                  Daojing He and
                  Sencun Zhu and
                  Jingshun Yang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Toward Detecting Collusive Ranking Manipulation Attackers in Mobile
                  App Markets},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {58--70},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053022},
  doi          = {10.1145/3052973.3053022},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenHZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Ren0Z17,
  author       = {Chuangang Ren and
                  Peng Liu and
                  Sencun Zhu},
  title        = {WindowGuard: Systematic Protection of {GUI} Security in Android},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/windowguard-systematic-protection-gui-security-android/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Ren0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ChenHZLG17,
  author       = {Xin Chen and
                  Heqing Huang and
                  Sencun Zhu and
                  Qing Li and
                  Quanlong Guan},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement
                  Framework for Android {OS}},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139552},
  doi          = {10.1145/3139550.3139552},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ChenHZLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2017,
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1},
  doi          = {10.1007/978-3-319-61176-1},
  isbn         = {978-3-319-61175-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-06654,
  author       = {Hao Fu and
                  Zizhan Zheng and
                  Sencun Zhu and
                  Pransant Mohapatra},
  title        = {{INSPIRED:} Intention-based Privacy-preserving Permission Model},
  journal      = {CoRR},
  volume       = {abs/1709.06654},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.06654},
  eprinttype    = {arXiv},
  eprint       = {1709.06654},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-06654.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/YangZC16,
  author       = {Yi Yang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Improving sensor network immunity under worm attacks: {A} software
                  diversity approach},
  journal      = {Ad Hoc Networks},
  volume       = {47},
  pages        = {26--40},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2016.04.011},
  doi          = {10.1016/J.ADHOC.2016.04.011},
  timestamp    = {Fri, 26 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/YangZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/MingZWLZ16,
  author       = {Jiang Ming and
                  Fangfang Zhang and
                  Dinghao Wu and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Deviation-Based Obfuscation-Resilient Program Equivalence Checking
                  With Application to Software Plagiarism Detection},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {65},
  number       = {4},
  pages        = {1647--1664},
  year         = {2016},
  url          = {https://doi.org/10.1109/TR.2016.2570554},
  doi          = {10.1109/TR.2016.2570554},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/MingZWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieZLW16,
  author       = {Zhen Xie and
                  Sencun Zhu and
                  Qing Li and
                  Wenjing Wang},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {You can promote, but you can't hide: large-scale abused app detection
                  in mobile app stores},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {374--385},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991099},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HuangZZZZ0CZ16,
  author       = {Heqing Huang and
                  Cong Zheng and
                  Junyuan Zeng and
                  Wu Zhou and
                  Sencun Zhu and
                  Peng Liu and
                  Suresh Chari and
                  Ce Zhang},
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {Android malware development on public malware scanning platforms:
                  {A} large-scale data-driven study},
  booktitle    = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  pages        = {1090--1099},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigData.2016.7840712},
  doi          = {10.1109/BIGDATA.2016.7840712},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HuangZZZZ0CZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LuoFWZ016,
  author       = {Lannan Luo and
                  Yu Fu and
                  Dinghao Wu and
                  Sencun Zhu and
                  Peng Liu},
  title        = {Repackage-Proofing Android Apps},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {550--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.56},
  doi          = {10.1109/DSN.2016.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LuoFWZ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/GuanHLZ16,
  author       = {Quanlong Guan and
                  Heqing Huang and
                  Weiqi Luo and
                  Sencun Zhu},
  editor       = {Juan Caballero and
                  Eric Bodden and
                  Elias Athanasopoulos},
  title        = {Semantics-Based Repackaging Detection for Mobile Apps},
  booktitle    = {Engineering Secure Software and Systems - 8th International Symposium,
                  ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9639},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30806-7\_6},
  doi          = {10.1007/978-3-319-30806-7\_6},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/GuanHLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiuZWL16,
  author       = {Xing Liu and
                  Sencun Zhu and
                  Wei Wang and
                  Jiqiang Liu},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {Alde: Privacy Risk Analysis of Analytics Libraries in the Android
                  Ecosystem},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {655--672},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_36},
  doi          = {10.1007/978-3-319-59608-2\_36},
  timestamp    = {Tue, 12 May 2020 10:32:53 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiuZWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JhiJWZ0W15,
  author       = {Yoon{-}chan Jhi and
                  Xiaoqi Jia and
                  Xinran Wang and
                  Sencun Zhu and
                  Peng Liu and
                  Dinghao Wu},
  title        = {Program Characterization Using Runtime Values and Its Application
                  to Software Plagiarism Detection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {41},
  number       = {9},
  pages        = {925--943},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSE.2015.2418777},
  doi          = {10.1109/TSE.2015.2418777},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JhiJWZ0W15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangCR0ZW15,
  author       = {Heqing Huang and
                  Kai Chen and
                  Chuangang Ren and
                  Peng Liu and
                  Sencun Zhu and
                  Dinghao Wu},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Towards Discovering and Understanding Unexpected Hazards in Tailoring
                  Antivirus Software for Android},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {7--18},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714589},
  doi          = {10.1145/2714576.2714589},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangCR0ZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangZ0015,
  author       = {Heqing Huang and
                  Sencun Zhu and
                  Kai Chen and
                  Peng Liu},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {From System Services Freezing to System Server Shutdown in Android:
                  All You Need Is a Loop in an App},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1236--1247},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813606},
  doi          = {10.1145/2810103.2813606},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangZ0015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangZG15,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Quanlong Guan},
  title        = {Multi-objective software assignment for active cyber defense},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {299--307},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346840},
  doi          = {10.1109/CNS.2015.7346840},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XuZ15,
  author       = {Zhi Xu and
                  Sencun Zhu},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {SemaDroid: {A} Privacy-Aware Sensor Management Framework for Smartphones},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699114},
  doi          = {10.1145/2699026.2699114},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/XuZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenZ15,
  author       = {Xin Chen and
                  Sencun Zhu},
  title        = {DroidJust: automated functionality-aware privacy leakage analysis
                  for Android applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {5:1--5:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766507},
  doi          = {10.1145/2766498.2766507},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZ15,
  author       = {Zhen Xie and
                  Sencun Zhu},
  title        = {AppWatcher: unveiling the underground market of trading mobile app
                  reviews},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {10:1--10:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766510},
  doi          = {10.1145/2766498.2766510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icae/ChengLZT14,
  author       = {Tianzhen Cheng and
                  Ping Li and
                  Sencun Zhu and
                  Don J. Torrieri},
  title        = {M-cluster and X-ray: Two methods for multi-jammer localization in
                  wireless sensor networks},
  journal      = {Integr. Comput. Aided Eng.},
  volume       = {21},
  number       = {1},
  pages        = {19--34},
  year         = {2014},
  url          = {https://doi.org/10.3233/ICA-130445},
  doi          = {10.3233/ICA-130445},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icae/ChengLZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZTJ14,
  author       = {Longquan Li and
                  Sencun Zhu and
                  Don J. Torrieri and
                  Sushil Jajodia},
  title        = {Self-healing wireless networks under insider jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997489},
  doi          = {10.1109/CNS.2014.6997489},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuangZE14,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Robert F. Erbacher},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Toward Software Diversity in Heterogeneous Networked Systems},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_8},
  doi          = {10.1007/978-3-662-43936-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/ZhangW0Z14,
  author       = {Fangfang Zhang and
                  Dinghao Wu and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Program Logic Based Software Plagiarism Detection},
  booktitle    = {25th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2014, Naples, Italy, November 3-6, 2014},
  pages        = {66--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSRE.2014.18},
  doi          = {10.1109/ISSRE.2014.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/ZhangW0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ChenCZ14,
  author       = {Xin Chen and
                  Jin{-}Hee Cho and
                  Sencun Zhu},
  title        = {GlobalTrust: An attack-resilient reputation system for tactical networks},
  booktitle    = {Eleventh Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2014, Singapore, June 30 - July 3, 2014},
  pages        = {275--283},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SAHCN.2014.6990363},
  doi          = {10.1109/SAHCN.2014.6990363},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ChenCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Huang00ZW14,
  author       = {Heqing Huang and
                  Kai Chen and
                  Peng Liu and
                  Sencun Zhu and
                  Dinghao Wu},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile
                  Platforms},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {359--366},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_27},
  doi          = {10.1007/978-3-319-23802-9\_27},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Huang00ZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/LuoMW0Z14,
  author       = {Lannan Luo and
                  Jiang Ming and
                  Dinghao Wu and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Shing{-}Chi Cheung and
                  Alessandro Orso and
                  Margaret{-}Anne D. Storey},
  title        = {Semantics-based obfuscation-resilient binary code similarity comparison
                  with applications to software plagiarism detection},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, (FSE-22), Hong Kong, China, November
                  16 - 22, 2014},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2635868.2635900},
  doi          = {10.1145/2635868.2635900},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/LuoMW0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangHZW014,
  author       = {Fangfang Zhang and
                  Heqing Huang and
                  Sencun Zhu and
                  Dinghao Wu and
                  Peng Liu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {ViewDroid: towards obfuscation-resilient mobile application repackaging
                  detection},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627395},
  doi          = {10.1145/2627393.2627395},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangHZW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZ14,
  author       = {Zhen Xie and
                  Sencun Zhu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {GroupTie: toward hidden collusion group discovery in app stores},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {153--164},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627409},
  doi          = {10.1145/2627393.2627409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiGZC13,
  author       = {Qinghua Li and
                  Wei Gao and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {To Lie or to Comply: Defending against Flood Attacks in Disruption
                  Tolerant Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {168--182},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.84},
  doi          = {10.1109/TDSC.2012.84},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/YangSZC13,
  author       = {Yi Yang and
                  Min Shao and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Towards statistically strong source anonymity for sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {9},
  number       = {3},
  pages        = {34:1--34:23},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480730.2480737},
  doi          = {10.1145/2480730.2480737},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/YangSZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XuZZ13,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {JStill: mostly static detection of obfuscated malicious JavaScript
                  code},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435364},
  doi          = {10.1145/2435349.2435364},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/XuZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/XuZZ13,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  title        = {Permlyzer: Analyzing permission usage in Android applications},
  booktitle    = {{IEEE} 24th International Symposium on Software Reliability Engineering,
                  {ISSRE} 2013, Pasadena, CA, USA, November 4-7, 2013},
  pages        = {400--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSRE.2013.6698893},
  doi          = {10.1109/ISSRE.2013.6698893},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/XuZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ChenPZSO13,
  author       = {Xin Chen and
                  Harshal Patankar and
                  Sencun Zhu and
                  Mudhakar Srivatsa and
                  Jeff Opper},
  title        = {Zigzag: Partial mutual revocation based trust management in tactical
                  ad hoc networks},
  booktitle    = {10th Annual {IEEE} International Conference on Sensing, Communications
                  and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013},
  pages        = {131--139},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SAHCN.2013.6644971},
  doi          = {10.1109/SAHCN.2013.6644971},
  timestamp    = {Fri, 30 Apr 2021 18:08:41 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ChenPZSO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ChenZXZ13,
  author       = {Ying Chen and
                  Sencun Zhu and
                  Heng Xu and
                  Yilu Zhou},
  title        = {Children's Exposure to Mobile In-App Advertising: An Analysis of Content
                  Appropriateness},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {196--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.36},
  doi          = {10.1109/SOCIALCOM.2013.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ChenZXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuangZLW13,
  author       = {Heqing Huang and
                  Sencun Zhu and
                  Peng Liu and
                  Dinghao Wu},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {A Framework for Evaluating Mobile App Repackaging Detection Algorithms},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_13},
  doi          = {10.1007/978-3-642-38908-5\_13},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuangZLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ChenXZZ13,
  author       = {Ying Chen and
                  Heng Xu and
                  Yilu Zhou and
                  Sencun Zhu},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Is this app safe for children?: a comparison study of maturity ratings
                  on Android and iOS applications},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {201--212},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488407},
  doi          = {10.1145/2488388.2488407},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ChenXZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TorrieriZJ13,
  author       = {Don J. Torrieri and
                  Sencun Zhu and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Cyber Maneuver Against External Adversaries and Compromised Nodes},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_5},
  doi          = {10.1007/978-1-4614-5416-8\_5},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/LiGZC12,
  author       = {Qinghua Li and
                  Wei Gao and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {A routing protocol for socially selfish delay tolerant networks},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {8},
  pages        = {1619--1632},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2011.07.007},
  doi          = {10.1016/J.ADHOC.2011.07.007},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/LiGZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/XinCWLZMX12,
  author       = {Zhi Xin and
                  Huiyu Chen and
                  Xinche Wang and
                  Peng Liu and
                  Sencun Zhu and
                  Bing Mao and
                  Li Xie},
  title        = {Replacement attacks: automatically evading behavior-based software
                  birthmark},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {293--304},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0170-9},
  doi          = {10.1007/S10207-012-0170-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/XinCWLZMX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NatarajanZSO12,
  author       = {Vivek Natarajan and
                  Sencun Zhu and
                  Mudhakar Srivatsa and
                  Jeff Opper},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Semantics-Aware Storage and Replication of Trust Metadata in Mobile
                  Ad-hoc Networks},
  booktitle    = {{IEEE} 26th International Conference on Advanced Information Networking
                  and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012},
  pages        = {376--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AINA.2012.89},
  doi          = {10.1109/AINA.2012.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NatarajanZSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ChengLZ12,
  author       = {Tianzhen Cheng and
                  Ping Li and
                  Sencun Zhu},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {An Algorithm for Jammer Localization in Wireless Sensor Networks},
  booktitle    = {{IEEE} 26th International Conference on Advanced Information Networking
                  and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012},
  pages        = {724--731},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AINA.2012.11},
  doi          = {10.1109/AINA.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ChengLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/HuangZW12,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Dinghao Wu},
  title        = {Towards Trusted Services: Result Verification Schemes for MapReduce},
  booktitle    = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
                  Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCGrid.2012.77},
  doi          = {10.1109/CCGRID.2012.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/HuangZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NatarajanYZ12,
  author       = {Vivek Natarajan and
                  Yi Yang and
                  Sencun Zhu},
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {Secure Trust Metadata Management for Mobile Ad-Hoc Networks},
  booktitle    = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35130-3\_12},
  doi          = {10.1007/978-3-642-35130-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/NatarajanYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ZhangJWLZ12,
  author       = {Fangfang Zhang and
                  Yoon{-}chan Jhi and
                  Dinghao Wu and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Mats Per Erik Heimdahl and
                  Zhendong Su},
  title        = {A first step towards algorithm plagiarism detection},
  booktitle    = {International Symposium on Software Testing and Analysis, {ISSTA}
                  2012, Minneapolis, MN, USA, July 15-20, 2012},
  pages        = {111--121},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2338965.2336767},
  doi          = {10.1145/2338965.2336767},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/ZhangJWLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/XuZZ12,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  title        = {The power of obfuscation techniques in malicious JavaScript code:
                  {A} measurement study},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461002},
  doi          = {10.1109/MALWARE.2012.6461002},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/XuZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuHCZH12,
  author       = {Zhi Xu and
                  Hung{-}Yuan Hsu and
                  Xin Chen and
                  Sencun Zhu and
                  Ali R. Hurson},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{AK-PPM:} An Authenticated Packet Attribution Scheme for Mobile Ad
                  Hoc Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {147--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_8},
  doi          = {10.1007/978-3-642-33338-5\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuHCZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ChenZZX12,
  author       = {Ying Chen and
                  Yilu Zhou and
                  Sencun Zhu and
                  Heng Xu},
  title        = {Detecting Offensive Language in Social Media to Protect Adolescent
                  Online Safety},
  booktitle    = {2012 International Conference on Privacy, Security, Risk and Trust,
                  {PASSAT} 2012, and 2012 International Confernece on Social Computing,
                  SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages        = {71--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SocialCom-PASSAT.2012.55},
  doi          = {10.1109/SOCIALCOM-PASSAT.2012.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ChenZZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XuBZ12,
  author       = {Zhi Xu and
                  Kun Bai and
                  Sencun Zhu},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {TapLogger: inferring user inputs on smartphone touchscreens using
                  on-board motion sensors},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185465},
  doi          = {10.1145/2185448.2185465},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/XuBZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/XuZ12,
  author       = {Zhi Xu and
                  Sencun Zhu},
  editor       = {Elie Bursztein and
                  Thomas Dullien},
  title        = {Abusing Notification Services on Smartphones for Phishing and Spamming},
  booktitle    = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
                  2012, Bellevue, WA, USA, Proceedings},
  pages        = {1--11},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {http://www.usenix.org/conference/woot12/abusing-notification-services-smartphones-phishing-and-spamming},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/XuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KongJGZLX11,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  title        = {{SAS:} semantics aware signature generation for polymorphic worm detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {269--283},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0132-7},
  doi          = {10.1007/S10207-011-0132-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeBZCC11,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sencun Zhu and
                  Sammy Chan and
                  Chun Chen},
  title        = {Distributed Access Control with Privacy Support in Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {10},
  pages        = {3472--3481},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2011.072511.102283},
  doi          = {10.1109/TWC.2011.072511.102283},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeBZCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/JiangHZC11,
  author       = {Xuan Jiang and
                  Wenhui Hu and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Compromise-resilient anti-jamming communication in wireless sensor
                  networks},
  journal      = {Wirel. Networks},
  volume       = {17},
  number       = {6},
  pages        = {1513--1527},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11276-011-0361-8},
  doi          = {10.1007/S11276-011-0361-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/JiangHZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChauguleXZ11,
  author       = {Ashwin Chaugule and
                  Zhi Xu and
                  Sencun Zhu},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {A Specification Based Intrusion Detection Framework for Mobile Phones},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {19--37},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_2},
  doi          = {10.1007/978-3-642-21554-4\_2},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChauguleXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengLZ11,
  author       = {Tianzhen Cheng and
                  Ping Li and
                  Sencun Zhu},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {Multi-jammer Localization in Wireless Sensor Networks},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {736--740},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.167},
  doi          = {10.1109/CIS.2011.167},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChengLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/JhiWJZLW11,
  author       = {Yoon{-}chan Jhi and
                  Xinran Wang and
                  Xiaoqi Jia and
                  Sencun Zhu and
                  Peng Liu and
                  Dinghao Wu},
  editor       = {Richard N. Taylor and
                  Harald C. Gall and
                  Nenad Medvidovic},
  title        = {Value-based program characterization and its application to software
                  plagiarism detection},
  booktitle    = {Proceedings of the 33rd International Conference on Software Engineering,
                  {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages        = {756--765},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1985793.1985899},
  doi          = {10.1145/1985793.1985899},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/JhiWJZLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeBZYGWCC11,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sencun Zhu and
                  Mingjian Yin and
                  Yi Gao and
                  Haodong Wang and
                  Sammy Chan and
                  Chun Chen},
  title        = {Distributed privacy-preserving access control in a single-owner multi-user
                  sensor network},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {331--335},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935176},
  doi          = {10.1109/INFCOM.2011.5935176},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/HeBZYGWCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/NatarajanYZ11,
  author       = {Vivek Natarajan and
                  Yi Yang and
                  Sencun Zhu},
  editor       = {Sheng Zhong and
                  Dejing Dou and
                  Yu Wang},
  title        = {Resource-misuse attack detection in delay-tolerant networks},
  booktitle    = {30th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PCCC.2011.6108092},
  doi          = {10.1109/PCCC.2011.6108092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/NatarajanYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XinCWLZMX11,
  author       = {Zhi Xin and
                  Huiyu Chen and
                  Xinche Wang and
                  Peng Liu and
                  Sencun Zhu and
                  Bing Mao and
                  Li Xie},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Replacement Attacks on Behavior Based Software Birthmark},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_1},
  doi          = {10.1007/978-3-642-24861-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/XinCWLZMX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XuBZLM11,
  author       = {Zhi Xu and
                  Kun Bai and
                  Sencun Zhu and
                  Leslie S. Liu and
                  Randy Moulic},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Context-Related Access Control for Mobile Caching},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {389--408},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_22},
  doi          = {10.1007/978-3-642-31909-9\_22},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XuBZLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/YangZ11,
  author       = {Yi Yang and
                  Sencun Zhu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Anonymous Routing},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {39--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_628},
  doi          = {10.1007/978-1-4419-5906-5\_628},
  timestamp    = {Fri, 26 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/YangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/YangZ11a,
  author       = {Yi Yang and
                  Sencun Zhu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Sensor Code Attestation},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1178--1179},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_644},
  doi          = {10.1007/978-1-4419-5906-5\_644},
  timestamp    = {Fri, 26 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/YangZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/YangZ11b,
  author       = {Yi Yang and
                  Sencun Zhu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Sensor Key Management},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1179--1181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_633},
  doi          = {10.1007/978-1-4419-5906-5\_633},
  timestamp    = {Fri, 26 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/YangZ11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangPLZ10,
  author       = {Xinran Wang and
                  Chi{-}Chun Pan and
                  Peng Liu and
                  Sencun Zhu},
  title        = {SigFree: {A} Signature-Free Buffer Overflow Attack Blocker},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {65--79},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.30},
  doi          = {10.1109/TDSC.2008.30},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangPLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuZX10,
  author       = {Wei Xu and
                  Sencun Zhu and
                  Heng Xu},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {{COP:} {A} Step toward Children Online Privacy},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {529--544},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_31},
  doi          = {10.1007/978-3-642-13708-2\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuZZ10,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Toward worm detection in online social networks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920264},
  doi          = {10.1145/1920261.1920264},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HsuZH10,
  author       = {Hung{-}Yuan Hsu and
                  Sencun Zhu and
                  Ali R. Hurson},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {A hotspot-based protocol for attack traceback in mobile ad hoc networks},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {333--336},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755733},
  doi          = {10.1145/1755688.1755733},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HsuZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JiangHZC10,
  author       = {Xuan Jiang and
                  Wenhui Hu and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Compromise-Resilient Anti-jamming for Wireless Sensor Networks},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_11},
  doi          = {10.1007/978-3-642-17650-0\_11},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/JiangHZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiZC10,
  author       = {Qinghua Li and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Routing in Socially Selfish Delay Tolerant Networks},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {857--865},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462138},
  doi          = {10.1109/INFCOM.2010.5462138},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ChenZL10,
  author       = {Wenping Chen and
                  Sencun Zhu and
                  Deying Li},
  title        = {{VAN:} Vehicle-assisted shortest-time path navigation},
  booktitle    = {{IEEE} 7th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2010, 8-12 November 2010, San Francisco, CA, {USA}},
  pages        = {442--451},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MASS.2010.5663936},
  doi          = {10.1109/MASS.2010.5663936},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ChenZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhaoXCZC10,
  author       = {Bo Zhao and
                  Zhi Xu and
                  Caixia Chi and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Patrick S{\'{e}}nac and
                  Max Ott and
                  Aruna Seneviratne},
  title        = {Mirroring Smartphones for Good: {A} Feasibility Study},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
                  December 6-9, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {73},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29154-8\_3},
  doi          = {10.1007/978-3-642-29154-8\_3},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ZhaoXCZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KongJGZLX10,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_1},
  doi          = {10.1007/978-3-642-16161-2\_1},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZSZ10,
  author       = {Liang Xie and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Sencun Zhu},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {pBMDS: a behavior-based malware detection system for cellphone devices},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741874},
  doi          = {10.1145/1741866.1741874},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhangZC09,
  author       = {Wensheng Zhang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Predistribution and local collaboration-based group rekeying for wireless
                  sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {6},
  pages        = {1229--1242},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2008.11.004},
  doi          = {10.1016/J.ADHOC.2008.11.004},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhangZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhangZC09a,
  author       = {Wensheng Zhang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Editorial for special issue on privacy and security in wireless sensorand
                  ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1431--1433},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.05.001},
  doi          = {10.1016/J.ADHOC.2009.05.001},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhangZC09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ShaoZZCY09,
  author       = {Min Shao and
                  Sencun Zhu and
                  Wensheng Zhang and
                  Guohong Cao and
                  Yi Yang},
  title        = {pDCS: Security and Privacy Support for Data-Centric Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {8},
  number       = {8},
  pages        = {1023--1038},
  year         = {2009},
  url          = {https://doi.org/10.1109/TMC.2008.168},
  doi          = {10.1109/TMC.2008.168},
  timestamp    = {Fri, 26 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ShaoZZCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJZL09,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  title        = {Detecting Software Theft via System Call Based Birthmarks},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {149--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.24},
  doi          = {10.1109/ACSAC.2009.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangJZL09,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Behavior based software theft detection},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {280--290},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653696},
  doi          = {10.1145/1653662.1653696},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangJZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhuCZRN09,
  author       = {Zhichao Zhu and
                  Guohong Cao and
                  Sencun Zhu and
                  Supranamaya Ranjan and
                  Antonio Nucci},
  title        = {A Social Network Based Patching Scheme for Worm Containment in Cellular
                  Networks},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {1476--1484},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062064},
  doi          = {10.1109/INFCOM.2009.5062064},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhuCZRN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhaoCGZC09,
  author       = {Bo Zhao and
                  Caixia Chi and
                  Wei Gao and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {2455--2463},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062173},
  doi          = {10.1109/INFCOM.2009.5062173},
  timestamp    = {Tue, 12 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhaoCGZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ShaoHZCKP09,
  author       = {Min Shao and
                  Wenhui Hu and
                  Sencun Zhu and
                  Guohong Cao and
                  Srikanth V. Krishnamurthy and
                  Tom La Porta},
  title        = {Cross-layer Enhanced Source Location Privacy in Sensor Networks},
  booktitle    = {Proceedings of the Sixth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2009,
                  June 22-26, 2009, Rome, Italy},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/SAHCN.2009.5168923},
  doi          = {10.1109/SAHCN.2009.5168923},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/ShaoHZCKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangZCL09,
  author       = {Yi Yang and
                  Sencun Zhu and
                  Guohong Cao and
                  Thomas La Porta},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {An Active Global Attack Model for Sensor Source Location Privacy:
                  Analysis and Countermeasures},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {373--393},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_22},
  doi          = {10.1007/978-3-642-05284-2\_22},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XieZCJZ09,
  author       = {Liang Xie and
                  Xinwen Zhang and
                  Ashwin Chaugule and
                  Trent Jaeger and
                  Sencun Zhu},
  title        = {Designing System-Level Defenses against Cellphone Malware},
  booktitle    = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
                  Niagara Falls, New York, USA, September 27-30, 2009},
  pages        = {83--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SRDS.2009.21},
  doi          = {10.1109/SRDS.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XieZCJZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XieZ08,
  author       = {Liang Xie and
                  Sencun Zhu},
  title        = {Message Dropping Attacks in Overlay Networks: Attack Detection and
                  Attacker Identification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {15:1--15:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341736},
  doi          = {10.1145/1341731.1341736},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XieZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YangWZC08,
  author       = {Yi Yang and
                  Xinran Wang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {{SDAP:} {A} Secure Hop-by-Hop Data Aggregation Protocol for Sensor
                  Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {18:1--18:43},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380568},
  doi          = {10.1145/1380564.1380568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YangWZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/SongZZC08,
  author       = {Hui Song and
                  Sencun Zhu and
                  Wensheng Zhang and
                  Guohong Cao},
  title        = {Least privilege and privilege deprivation: Toward tolerating mobile
                  sink compromises in wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {4},
  number       = {4},
  pages        = {23:1--23:34},
  year         = {2008},
  url          = {https://doi.org/10.1145/1387663.1387669},
  doi          = {10.1145/1387663.1387669},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/SongZZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XieSZ08,
  author       = {Liang Xie and
                  Hui Song and
                  Sencun Zhu},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {On the Effectiveness of Internal Patching Against File-Sharing Worms},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {1--20},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_1},
  doi          = {10.1007/978-3-540-68914-0\_1},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/XieSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJZL08,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  title        = {{STILL:} Exploit Code Detection via Static Taint and Initialization
                  Analyses},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.37},
  doi          = {10.1109/ACSAC.2008.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/XuIZX08,
  author       = {Heng Xu and
                  Nazneen Irani and
                  Sencun Zhu and
                  Wei Xu},
  title        = {Alleviating Parental Concerns for Children's Online Privacy: {A} Value
                  Sensitive Design Investigation},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2008, Paris, France, December 14-17, 2008},
  pages        = {106},
  publisher    = {Association for Information Systems},
  year         = {2008},
  url          = {http://aisel.aisnet.org/icis2008/106},
  timestamp    = {Wed, 28 Dec 2011 12:50:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/XuIZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/MasudKTWLZ08,
  author       = {Mohammad M. Masud and
                  Latifur Khan and
                  Bhavani Thuraisingham and
                  Xinran Wang and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Detecting Remote Exploits Using Data Mining},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_15},
  doi          = {10.1007/978-0-387-84927-0\_15},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/MasudKTWLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShaoYZC08,
  author       = {Min Shao and
                  Yi Yang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Towards Statistically Strong Source Anonymity for Sensor Networks},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {51--55},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.19},
  doi          = {10.1109/INFOCOM.2008.19},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShaoYZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SongZC08,
  author       = {Hui Song and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {{SVATS:} {A} Sensor-Network-Based Vehicle Anti-Theft System},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {2128--2136},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.279},
  doi          = {10.1109/INFOCOM.2008.279},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SongZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/YangZC08,
  author       = {Yi Yang and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Xiaohua Jia and
                  Ness B. Shroff and
                  Peng{-}Jun Wan},
  title        = {Improving sensor network immunity under worm attacks: a software diversity
                  approach},
  booktitle    = {Proceedings of the 9th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30,
                  2008},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374618.1374640},
  doi          = {10.1145/1374618.1374640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/YangZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ShaoZCPM08,
  author       = {Min Shao and
                  Sencun Zhu and
                  Guohong Cao and
                  Tom La Porta and
                  Prasant Mohapatra},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {A cross-layer dropping attack in video streaming over ad hoc networks},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460909},
  doi          = {10.1145/1460877.1460909},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ShaoZCPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YangSZUC08,
  author       = {Yi Yang and
                  Min Shao and
                  Sencun Zhu and
                  Bhuvan Urgaonkar and
                  Guohong Cao},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Towards event source unobservability with minimum network traffic
                  in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {77--88},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352547},
  doi          = {10.1145/1352533.1352547},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YangSZUC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/XieSJZ08,
  author       = {Liang Xie and
                  Hui Song and
                  Trent Jaeger and
                  Sencun Zhu},
  editor       = {Jinpeng Huai and
                  Robin Chen and
                  Hsiao{-}Wuen Hon and
                  Yunhao Liu and
                  Wei{-}Ying Ma and
                  Andrew Tomkins and
                  Xiaodong Zhang},
  title        = {A systematic approach for cell-phone worm containment},
  booktitle    = {Proceedings of the 17th International Conference on World Wide Web,
                  {WWW} 2008, Beijing, China, April 21-25, 2008},
  pages        = {1083--1084},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1367497.1367667},
  doi          = {10.1145/1367497.1367667},
  timestamp    = {Tue, 20 Dec 2022 21:20:03 +0100},
  biburl       = {https://dblp.org/rec/conf/www/XieSJZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangJZL08,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  editor       = {Jinpeng Huai and
                  Robin Chen and
                  Hsiao{-}Wuen Hon and
                  Yunhao Liu and
                  Wei{-}Ying Ma and
                  Andrew Tomkins and
                  Xiaodong Zhang},
  title        = {Protecting web services from remote exploit code: a static analysis
                  approach},
  booktitle    = {Proceedings of the 17th International Conference on World Wide Web,
                  {WWW} 2008, Beijing, China, April 21-25, 2008},
  pages        = {1139--1140},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1367497.1367695},
  doi          = {10.1145/1367497.1367695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/WangJZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SongZC07,
  author       = {Hui Song and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Attack-resilient time synchronization for wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {5},
  number       = {1},
  pages        = {112--125},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.adhoc.2006.05.016},
  doi          = {10.1016/J.ADHOC.2006.05.016},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SongZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuYLSJ07,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Efficient security mechanisms for overlay multicast based content
                  delivery},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {4},
  pages        = {793--806},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2006.10.003},
  doi          = {10.1016/J.COMCOM.2006.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuLCZ07,
  author       = {Qijun Gu and
                  Peng Liu and
                  Chao{-}Hsien Chu and
                  Sencun Zhu},
  title        = {Defence against packet injection in ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {154--169},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012832},
  doi          = {10.1504/IJSN.2007.012832},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsuZH07,
  author       = {Hung{-}Yuan Hsu and
                  Sencun Zhu and
                  Ali R. Hurson},
  title        = {{LIP:} a lightweight interlayer protocol for preventing packet injection
                  attacks in mobile ad hoc network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {202--215},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013174},
  doi          = {10.1504/IJSN.2007.013174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/TraynorKCCZP07,
  author       = {Patrick Traynor and
                  Raju Kumar and
                  Heesook Choi and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {663--677},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMC.2007.1020},
  doi          = {10.1109/TMC.2007.1020},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJN07,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {Interleaved hop-by-hop authentication against false data injection
                  attacks in sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {3},
  number       = {3},
  pages        = {14},
  year         = {2007},
  url          = {https://doi.org/10.1145/1267060.1267062},
  doi          = {10.1145/1267060.1267062},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShaoZZC07,
  author       = {Min Shao and
                  Sencun Zhu and
                  Wensheng Zhang and
                  Guohong Cao},
  title        = {pDCS: Security and Privacy Support for Data-Centric Sensor Networks},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {1298--1306},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.154},
  doi          = {10.1109/INFCOM.2007.154},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShaoZZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/SongXZC07,
  author       = {Hui Song and
                  Liang Xie and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Mohsen Guizani and
                  Hsiao{-}Hwa Chen and
                  Xi Zhang},
  title        = {Sensor node compromise detection: the location perspective},
  booktitle    = {Proceedings of the International Conference on Wireless Communications
                  and Mobile Computing, {IWCMC} 2007, Honolulu, Hawaii, USA, August
                  12-16, 2007},
  pages        = {242--247},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1280940.1280993},
  doi          = {10.1145/1280940.1280993},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/SongXZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ZhangTZC07,
  author       = {Wensheng Zhang and
                  Minh Tran and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Evangelos Kranakis and
                  Elizabeth M. Belding and
                  Eytan H. Modiano},
  title        = {A random perturbation-based scheme for pairwise key establishment
                  in sensor networks},
  booktitle    = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada,
                  September 9-14, 2007},
  pages        = {90--99},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288107.1288120},
  doi          = {10.1145/1288107.1288120},
  timestamp    = {Mon, 22 Feb 2021 15:13:40 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/ZhangTZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/XieZ07,
  author       = {Liang Xie and
                  Sencun Zhu},
  editor       = {Manfred Hauswirth and
                  Adam Wierzbicki and
                  Klaus Wehrle and
                  Alberto Montresor and
                  Nahid Shahmehri},
  title        = {A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms},
  booktitle    = {Seventh {IEEE} International Conference on Peer-to-Peer Computing
                  {(P2P} 2007), September 2-5, 2007, Galway, Ireland},
  pages        = {61--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/P2P.2007.3},
  doi          = {10.1109/P2P.2007.3},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/XieZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChoiZP07,
  author       = {Heesook Choi and
                  Sencun Zhu and
                  Thomas F. La Porta},
  title        = {{SET:} Detecting node clones in sensor networks},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {341--350},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550353},
  doi          = {10.1109/SECCOM.2007.4550353},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChoiZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/YangWZC07,
  author       = {Yi Yang and
                  Xinran Wang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Distributed Software-based Attestation for Node Compromise Detection
                  in Sensor Networks},
  booktitle    = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007),
                  Beijing, China, October 10-12, 2007},
  pages        = {219--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SRDS.2007.31},
  doi          = {10.1109/SRDS.2007.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/YangWZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhuXSJ06,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LHAP:} {A} lightweight network access control protocol for ad hoc
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {4},
  number       = {5},
  pages        = {567--585},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.adhoc.2005.06.002},
  doi          = {10.1016/J.ADHOC.2005.06.002},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhuXSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/PirrettiZVMKB06,
  author       = {Matthew Pirretti and
                  Sencun Zhu and
                  Narayanan Vijaykrishnan and
                  Patrick D. McDaniel and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  title        = {The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods
                  of Defense},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2},
  number       = {3},
  pages        = {267--287},
  year         = {2006},
  url          = {https://doi.org/10.1080/15501320600642718},
  doi          = {10.1080/15501320600642718},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/PirrettiZVMKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZWJ06,
  author       = {Yingjiu Li and
                  Sencun Zhu and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Looking into the seeds of time: Discovering temporal patterns in large
                  transaction sets},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {8},
  pages        = {1003--1031},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2005.01.019},
  doi          = {10.1016/J.INS.2005.01.019},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiZWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhuSXJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Shouhuai Xu and
                  Sushil Jajodia},
  title        = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast
                  in Ad-Hoc Networks},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {301--325},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14401},
  doi          = {10.3233/JCS-2006-14401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LEAP+:} Efficient security mechanisms for large-scale distributed
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {2},
  number       = {4},
  pages        = {500--528},
  year         = {2006},
  url          = {https://doi.org/10.1145/1218556.1218559},
  doi          = {10.1145/1218556.1218559},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TraynorCCZP06,
  author       = {Patrick Traynor and
                  Heesook Choi and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {Establishing Pair-Wise Keys in Heterogeneous Sensor Networks},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.260},
  doi          = {10.1109/INFOCOM.2006.260},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/TraynorCCZP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/YangWZ06,
  author       = {Yi Yang and
                  Xinran Wang and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {Sergio Palazzo and
                  Marco Conti and
                  Raghupathy Sivakumar},
  title        = {{SDAP:} : a secure hop-by-Hop data aggregation protocol for sensor
                  networks},
  booktitle    = {Proceedings of the 7th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25,
                  2006},
  pages        = {356--367},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132905.1132944},
  doi          = {10.1145/1132905.1132944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/YangWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XieZ06,
  author       = {Liang Xie and
                  Sencun Zhu},
  title        = {Message Dropping Attacks in Overlay Networks: Attack Detection and
                  Attacker Identification},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359534},
  doi          = {10.1109/SECCOMW.2006.359534},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/XieZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangP06,
  author       = {Xinran Wang and
                  Chi{-}Chun Pan and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Angelos D. Keromytis},
  title        = {SigFree: {A} Signature-free Buffer Overflow Attack Blocker},
  booktitle    = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
                  Canada, July 31 - August 4, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/15th-usenix-security-symposium/sigfree-signature-free-buffer-overflow-attack-blocker},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sasn/2006,
  editor       = {Sencun Zhu and
                  Donggang Liu},
  title        = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-554-1},
  timestamp    = {Thu, 07 Dec 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhuYLSJ05,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Security Mechanisms for Overlay Multicast-Based Content
                  Distribution},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {40--55},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_4},
  doi          = {10.1007/11496137\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GuLZC05,
  author       = {Qijun Gu and
                  Peng Liu and
                  Sencun Zhu and
                  Chao{-}Hsien Chu},
  title        = {Defending against packet injection attacks unreliable ad hoc networks},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM}
                  '05, St. Louis, Missouri, USA, 28 November - 2 December 2005},
  pages        = {5},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/GLOCOM.2005.1577966},
  doi          = {10.1109/GLOCOM.2005.1577966},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/GuLZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/SongZC05,
  author       = {Hui Song and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Attack-resilient time synchronization for wireless sensor networks},
  booktitle    = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MAHSS.2005.1542869},
  doi          = {10.1109/MAHSS.2005.1542869},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/SongZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ZhangSZC05,
  author       = {Wensheng Zhang and
                  Hui Song and
                  Sencun Zhu and
                  Guohong Cao},
  editor       = {P. R. Kumar and
                  Andrew T. Campbell and
                  Roger Wattenhofer},
  title        = {Least privilege and privilege deprivation: towards tolerating mobile
                  sink compromises in wireless sensor networks},
  booktitle    = {Proceedings of the 6th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA,
                  May 25-27, 2005},
  pages        = {378--389},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1062689.1062737},
  doi          = {10.1145/1062689.1062737},
  timestamp    = {Thu, 08 Apr 2021 08:40:43 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/ZhangSZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Practical Broadcast Authentication in Sensor Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {118--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.49},
  doi          = {10.1109/MOBIQUITOUS.2005.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhuSXJ04,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Shouhuai Xu and
                  Sushil Jajodia},
  title        = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast
                  in Ad-Hoc Networks},
  booktitle    = {1st Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge,
                  MA, {USA}},
  pages        = {42--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MOBIQ.2004.1331709},
  doi          = {10.1109/MOBIQ.2004.1331709},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ZhuSXJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhuSJN04,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected
                  False Data in Sensor Networks},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {259--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301328},
  doi          = {10.1109/SECPRI.2004.1301328},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {{LEAP:} efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948120},
  doi          = {10.1145/948109.948120},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Performance Optimizations for Group Key Management Scheme},
  booktitle    = {23rd International Conference on Distributed Computing Systems {(ICDCS}
                  2003), 19-22 May 2003, Providence, RI, {USA}},
  pages        = {163},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICDCS.2003.1203463},
  doi          = {10.1109/ICDCS.2003.1203463},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhuXSJ03,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LHAP:} {A} Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc
                  Networks},
  booktitle    = {23rd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2003 Workshops), 19-22 May 2003, Providence, RI, {USA}},
  pages        = {749},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICDCSW.2003.1203642},
  doi          = {10.1109/ICDCSW.2003.1203642},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhuXSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhuXSJ03,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks:
                  {A} Probabilistic Approach},
  booktitle    = {11th {IEEE} International Conference on Network Protocols {(ICNP}
                  2003), 4-7 November 2003, Atlanta, GA, {USA}},
  pages        = {326--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICNP.2003.1249782},
  doi          = {10.1109/ICNP.2003.1249782},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ZhuXSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdc/ZhuJ03,
  author       = {Sencun Zhu and
                  Sushil Jajodia},
  editor       = {Samir R. Das and
                  Sajal K. Das},
  title        = {Scalable Group Rekeying for Secure Multicast: {A} Survey},
  booktitle    = {Distributed Computing - {IWDC} 2003, 5th International Workshop, Kolkata,
                  India, December 27-30, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2918},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24604-6\_1},
  doi          = {10.1007/978-3-540-24604-6\_1},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdc/ZhuJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngc/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Burkhard Stiller and
                  Georg Carle and
                  Martin Karsten and
                  Peter Reichl},
  title        = {Adding Reliable and Self-healing Key Distribution to the Subset Difference
                  Group Rekeying Method for Secure Multicast},
  booktitle    = {Group Communications and Charges; Technology and Business Models,
                  5th {COST264} International Workshop on Networked Group Communications,
                  {NGC} 2003, and 3rd International Workshop on Internet Charging and
                  QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2816},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39405-1\_10},
  doi          = {10.1007/978-3-540-39405-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ngc/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{LEAP} - efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958534},
  doi          = {10.1145/958491.958534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/SetiaZJ02,
  author       = {Sanjeev Setia and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {A comparative performance analysis of reliable group rekey transport
                  protocols for secure multicast},
  journal      = {Perform. Evaluation},
  volume       = {49},
  number       = {1/4},
  pages        = {21--41},
  year         = {2002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/SetiaZJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/foiks/LiZWJ02,
  author       = {Yingjiu Li and
                  Sencun Zhu and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Thomas Eiter and
                  Klaus{-}Dieter Schewe},
  title        = {A Privacy-Enhanced Microaggregation Method},
  booktitle    = {Foundations of Information and Knowledge Systems, Second International
                  Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2284},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45758-5\_10},
  doi          = {10.1007/3-540-45758-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/DouAZZ96,
  author       = {Huifang Dou and
                  Ainishet Asres and
                  Zhaoying Zhou and
                  Sencun Zhu},
  title        = {Stimulator for real time control of paralyzed muscles during functional
                  electrical stimulation},
  booktitle    = {Proceedings of Third International Conference on Electronics, Circuits,
                  and Systems, {ICECS} 1996, Rodos, Greece, October 13-16, 1996},
  pages        = {1096--1099},
  publisher    = {{IEEE}},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICECS.1996.584612},
  doi          = {10.1109/ICECS.1996.584612},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/DouAZZ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics