Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sencun Zhu
@article{DBLP:journals/tdsc/HeWZWZLY24, author = {Yongzhong He and Yiming Wang and Sencun Zhu and Wei Wang and Yunjia Zhang and Qiang Li and Aimin Yu}, title = {Automatically Identifying {CVE} Affected Versions With Patches and Developer Logs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {905--919}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264567}, doi = {10.1109/TDSC.2023.3264567}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/FitwiCZ23, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {276--287}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3135352}, doi = {10.1109/TSC.2021.3135352}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/FitwiCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GuanLCZP23, author = {Chongqi Guan and Heting Liu and Guohong Cao and Sencun Zhu and Thomas La Porta}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {49--59}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590195}, doi = {10.1145/3558482.3590195}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GuanLCZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-03320, author = {Henger Li and Chen Wu and Sencun Zhu and Zizhan Zheng}, title = {Learning to Backdoor Federated Learning}, journal = {CoRR}, volume = {abs/2303.03320}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.03320}, doi = {10.48550/ARXIV.2303.03320}, eprinttype = {arXiv}, eprint = {2303.03320}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-03320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06430, author = {Chongqi Guan and Heting Liu and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning}, journal = {CoRR}, volume = {abs/2305.06430}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06430}, doi = {10.48550/ARXIV.2305.06430}, eprinttype = {arXiv}, eprint = {2305.06430}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SunZC22, author = {Yuanyi Sun and Sencun Zhu and Yu Chen}, title = {ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {630--649}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0089}, doi = {10.56553/POPETS-2022-0089}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/SunZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuLZWW22, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang}, title = {Alexa Skills: Security Vulnerabilities and Countermeasures}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10066153}, doi = {10.1109/CNS56114.2022.10066153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuLZWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuanCCZP22, author = {Chongqi Guan and Xianda Chen and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {82--90}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947265}, doi = {10.1109/CNS56114.2022.9947265}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuanCCZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunZZS22, author = {Yuanyi Sun and Sencun Zhu and Yan Zhao and Pengfei Sun}, title = {A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {91--99}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947253}, doi = {10.1109/CNS56114.2022.9947253}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SunZZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WuYZM22, author = {Chen Wu and Xian Yang and Sencun Zhu and Prasenjit Mitra}, title = {Toward Cleansing Backdoored Neural Networks in Federated Learning}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {820--830}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00084}, doi = {10.1109/ICDCS54860.2022.00084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/WuYZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-09441, author = {Chen Wu and Sencun Zhu and Prasenjit Mitra}, title = {Federated Unlearning with Knowledge Distillation}, journal = {CoRR}, volume = {abs/2201.09441}, year = {2022}, url = {https://arxiv.org/abs/2201.09441}, eprinttype = {arXiv}, eprint = {2201.09441}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-09441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-06694, author = {Bolor{-}Erdene Zolbayar and Ryan Sheatsley and Patrick D. McDaniel and Michael J. Weisman and Sencun Zhu and Shitong Zhu and Srikanth V. Krishnamurthy}, title = {Generating Practical Adversarial Network Traffic Flows Using {NIDSGAN}}, journal = {CoRR}, volume = {abs/2203.06694}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.06694}, doi = {10.48550/ARXIV.2203.06694}, eprinttype = {arXiv}, eprint = {2203.06694}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-06694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeGLD0ZG21, author = {Daojing He and Hongjie Gu and Tinghui Li and Yongliang Du and Xiaolei Wang and Sencun Zhu and Nadra Guizani}, title = {Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware}, journal = {{IEEE} Netw.}, volume = {35}, number = {2}, pages = {202--207}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000450}, doi = {10.1109/MNET.011.2000450}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeGLD0ZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XiaSZRS21, author = {Tianrou Xia and Yuanyi Sun and Sencun Zhu and Zeeshan Rasheed and Khurram Shafique}, title = {Toward {A} Network-Assisted Approach for Effective Ransomware Detection}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.28-1-2021.168506}, doi = {10.4108/EAI.28-1-2021.168506}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/XiaSZRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/HuangZZZZLMCZG21, author = {Heqing Huang and Cong Zheng and Junyuan Zeng and Wu Zhou and Sencun Zhu and Peng Liu and Ian M. Molloy and Suresh Chari and Ce Zhang and Quanlong Guan}, title = {A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform}, journal = {{IEEE} Trans. Big Data}, volume = {7}, number = {2}, pages = {255--270}, year = {2021}, url = {https://doi.org/10.1109/TBDATA.2018.2790439}, doi = {10.1109/TBDATA.2018.2790439}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/HuangZZZZLMCZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/FuHZDPGZM21, author = {Hao Fu and Pengfei Hu and Zizhan Zheng and Aveek K. Das and Parth H. Pathak and Tianbo Gu and Sencun Zhu and Prasant Mohapatra}, title = {Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {10}, pages = {3066--3080}, year = {2021}, url = {https://doi.org/10.1109/TMC.2020.2992253}, doi = {10.1109/TMC.2020.2992253}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/FuHZDPGZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LinWHJWMHZZ21, author = {Yaguang Lin and Xiaoming Wang and Fei Hao and Yichuan Jiang and Yulei Wu and Geyong Min and Daojing He and Sencun Zhu and Wei Zhao}, title = {Dynamic Control of Fraud Information Spreading in Mobile Social Networks}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {51}, number = {6}, pages = {3725--3738}, year = {2021}, url = {https://doi.org/10.1109/TSMC.2019.2930908}, doi = {10.1109/TSMC.2019.2930908}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/LinWHJWMHZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/YuanLZ21, author = {Lun{-}Pin Yuan and Peng Liu and Sencun Zhu}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Recompose Event Sequences vs. Predict Next Events: {A} Novel Anomaly Detection Approach for Discrete Event Logs}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {336--348}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453098}, doi = {10.1145/3433210.3453098}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/YuanLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/YuanCYKZ21, author = {Lun{-}Pin Yuan and Euijin Choo and Ting Yu and Issa Khalil and Sencun Zhu}, title = {Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {250--262}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00038}, doi = {10.1109/DSN48987.2021.00038}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/YuanCYKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-00132, author = {Yuanyi Sun and Sencun Zhu and Yao Zhao and Pengfei Sun}, title = {Let Your Camera See for You: {A} Novel Two-Factor Authentication Method against Real-Time Phishing Attacks}, journal = {CoRR}, volume = {abs/2109.00132}, year = {2021}, url = {https://arxiv.org/abs/2109.00132}, eprinttype = {arXiv}, eprint = {2109.00132}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-00132.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03798, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang and Xiangliang Zhang}, title = {AppQ: Warm-starting App Recommendation Based on View Graphs}, journal = {CoRR}, volume = {abs/2109.03798}, year = {2021}, url = {https://arxiv.org/abs/2109.03798}, eprinttype = {arXiv}, eprint = {2109.03798}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLZCZMG20, author = {Daojing He and Xiaoxia Liu and Jiajia Zheng and Sammy Chan and Sencun Zhu and Weidong Min and Nadra Guizani}, title = {A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems}, journal = {{IEEE} Netw.}, volume = {34}, number = {4}, pages = {173--179}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900480}, doi = {10.1109/MNET.001.1900480}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeLZCZMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLLZCMG20, author = {Daojing He and Shihao Li and Cong Li and Sencun Zhu and Sammy Chan and Weidong Min and Nadra Guizani}, title = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications}, journal = {{IEEE} Netw.}, volume = {34}, number = {6}, pages = {114--119}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.2000025}, doi = {10.1109/MNET.011.2000025}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MohaisenZ20, author = {David Mohaisen and Sencun Zhu}, title = {Editorial}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.18-5-2020.164587}, doi = {10.4108/EAI.18-5-2020.164587}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MohaisenZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXHWZJ20, author = {Yubao Zhang and Jidong Xiao and Shuai Hao and Haining Wang and Sencun Zhu and Sushil Jajodia}, title = {Understanding the Manipulation on Recommender Systems through Web Injection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3807--3818}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954737}, doi = {10.1109/TIFS.2019.2954737}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiuLZWZ20, author = {Xing Liu and Jiqiang Liu and Sencun Zhu and Wei Wang and Xiangliang Zhang}, title = {Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {5}, pages = {1184--1199}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2903186}, doi = {10.1109/TMC.2019.2903186}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LiuLZWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/LiHLZCC20, author = {Cong Li and Daojing He and Shihao Li and Sencun Zhu and Sammy Chan and Yao Cheng}, title = {Android-based Cryptocurrency Wallets: Attacks and Countermeasures}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {9--16}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00010}, doi = {10.1109/BLOCKCHAIN50366.2020.00010}, timestamp = {Fri, 30 Apr 2021 12:35:39 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/LiHLZCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhongLSZ020, author = {Haoti Zhong and Cong Liao and Anna Cinzia Squicciarini and Sencun Zhu and David J. Miller}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {97--108}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375751}, doi = {10.1145/3374664.3375751}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhongLSZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/Fitwi0Z20, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service}, booktitle = {6th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020}, pages = {125--134}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CIC50333.2020.00024}, doi = {10.1109/CIC50333.2020.00024}, timestamp = {Fri, 27 May 2022 15:04:14 +0200}, biburl = {https://dblp.org/rec/conf/coinco/Fitwi0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/QiaoHGZGC20, author = {Qi Qiao and Daojing He and Yun Gao and Sencun Zhu and Jiahao Gao and Sammy Chan}, title = {Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems}, booktitle = {17th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2020, Virtual Event, Italy, June 22-25, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SECON48991.2020.9158421}, doi = {10.1109/SECON48991.2020.9158421}, timestamp = {Wed, 03 Feb 2021 13:40:37 +0100}, biburl = {https://dblp.org/rec/conf/secon/QiaoHGZGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LiuHGZC20, author = {Xiaoxia Liu and Daojing He and Yun Gao and Sencun Zhu and Sammy Chan}, title = {{TLP-IDS:} {A} Two-layer Intrusion Detection System for Integrated Electronic Systems}, booktitle = {International Symposium on Reliable Distributed Systems, {SRDS} 2020, Shanghai, China, September 21-24, 2020}, pages = {205--214}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SRDS51746.2020.00028}, doi = {10.1109/SRDS51746.2020.00028}, timestamp = {Thu, 19 Nov 2020 10:52:27 +0100}, biburl = {https://dblp.org/rec/conf/srds/LiuHGZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunCZ020, author = {Yuanyi Sun and Shiqing Chen and Sencun Zhu and Yu Chen}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {\emph{iRyP}: a purely edge-based visual privacy-respecting system for mobile cameras}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {195--206}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399341}, doi = {10.1145/3395351.3399341}, timestamp = {Tue, 29 Dec 2020 18:27:47 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunCZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-12428, author = {Tianrou Xia and Yuanyi Sun and Sencun Zhu and Zeeshan Rasheed and Khurram Hassan{-}Shafique}, title = {A Network-Assisted Approach for Ransomware Detection}, journal = {CoRR}, volume = {abs/2008.12428}, year = {2020}, url = {https://arxiv.org/abs/2008.12428}, eprinttype = {arXiv}, eprint = {2008.12428}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-12428.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10788, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang}, title = {"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills}, journal = {CoRR}, volume = {abs/2010.10788}, year = {2020}, url = {https://arxiv.org/abs/2010.10788}, eprinttype = {arXiv}, eprint = {2010.10788}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10788.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-01767, author = {Chen Wu and Xian Yang and Sencun Zhu and Prasenjit Mitra}, title = {Mitigating Backdoor Attacks in Federated Learning}, journal = {CoRR}, volume = {abs/2011.01767}, year = {2020}, url = {https://arxiv.org/abs/2011.01767}, eprinttype = {arXiv}, eprint = {2011.01767}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-01767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13971, author = {Lun{-}Pin Yuan and Euijin Choo and Ting Yu and Issa Khalil and Sencun Zhu}, title = {Time-Window Group-Correlation Support vs. Individual Features: {A} Detection of Abnormal Users}, journal = {CoRR}, volume = {abs/2012.13971}, year = {2020}, url = {https://arxiv.org/abs/2012.13971}, eprinttype = {arXiv}, eprint = {2012.13971}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13971.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13972, author = {Lun{-}Pin Yuan and Peng Liu and Sencun Zhu}, title = {Recomposition vs. Prediction: {A} Novel Anomaly Detection for Discrete Events Based On Autoencoder}, journal = {CoRR}, volume = {abs/2012.13972}, year = {2020}, url = {https://arxiv.org/abs/2012.13972}, eprinttype = {arXiv}, eprint = {2012.13972}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/WangCYHZ19, author = {Xiaolei Wang and Andrea Continella and Yuexiang Yang and Yongzhong He and Sencun Zhu}, title = {LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {3}, number = {1}, pages = {28:1--28:25}, year = {2019}, url = {https://doi.org/10.1145/3314415}, doi = {10.1145/3314415}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/WangCYHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeQCDCZG19, author = {Daojing He and Yinrong Qiao and Shiqing Chen and Xiao Du and Wenjie Chen and Sencun Zhu and Mohsen Guizani}, title = {A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles}, journal = {{IEEE} Netw.}, volume = {33}, number = {2}, pages = {146--151}, year = {2019}, url = {https://doi.org/10.1109/MNET.2018.1800065}, doi = {10.1109/MNET.2018.1800065}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeQCDCZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NagothuCBAZ19, author = {Deeraj Nagothu and Yu Chen and Erik Blasch and Alexander J. Aved and Sencun Zhu}, title = {Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals}, journal = {Sensors}, volume = {19}, number = {11}, pages = {2424}, year = {2019}, url = {https://doi.org/10.3390/s19112424}, doi = {10.3390/S19112424}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NagothuCBAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SongWZW19, author = {Yang Song and Chen Wu and Sencun Zhu and Haining Wang}, title = {A Machine Learning Based Approach for Mobile App Rating Manipulation Detection}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157415}, doi = {10.4108/EAI.8-4-2019.157415}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SongWZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/WangYZ19, author = {Xiaolei Wang and Yuexiang Yang and Sencun Zhu}, title = {Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {12}, pages = {2768--2782}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2886881}, doi = {10.1109/TMC.2018.2886881}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/WangYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/Fitwi0Z19, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {552--555}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00080}, doi = {10.1109/BLOCKCHAIN.2019.00080}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/Fitwi0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AlrizahZX019, author = {Mshabab Alrizah and Sencun Zhu and Xinyu Xing and Gang Wang}, title = {Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems}, booktitle = {Proceedings of the Internet Measurement Conference, {IMC} 2019, Amsterdam, The Netherlands, October 21-23, 2019}, pages = {230--244}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3355369.3355588}, doi = {10.1145/3355369.3355588}, timestamp = {Fri, 25 Oct 2019 09:51:53 +0200}, biburl = {https://dblp.org/rec/conf/imc/AlrizahZX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FuZZM19, author = {Hao Fu and Zizhan Zheng and Sencun Zhu and Prasant Mohapatra}, title = {Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2089--2097}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737510}, doi = {10.1109/INFOCOM.2019.8737510}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/FuZZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/Fitwi0Z19, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {No Peeking through My Windows: Conserving Privacy in Personal Drones}, booktitle = {2019 {IEEE} International Smart Cities Conference, {ISC2} 2019, Casablanca, Morocco, October 14-17, 2019}, pages = {199--204}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISC246665.2019.9071765}, doi = {10.1109/ISC246665.2019.9071765}, timestamp = {Tue, 05 May 2020 14:19:32 +0200}, biburl = {https://dblp.org/rec/conf/isc2/Fitwi0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuanHY0Z19, author = {Lun{-}Pin Yuan and Wenjun Hu and Ting Yu and Peng Liu and Sencun Zhu}, title = {Towards Large-Scale Hunting for Android Negative-Day Malware}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {533--545}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/yuan}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YuanHY0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GuanCZLLXL19, author = {Le Guan and Chen Cao and Sencun Zhu and Jingqiang Lin and Peng Liu and Yubin Xia and Bo Luo}, title = {Protecting mobile devices from physical memory attacks with targeted encryption}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {34--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319721}, doi = {10.1145/3317549.3319721}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GuanCZLLXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-03473, author = {Deeraj Nagothu and Jacob Schwell and Yu Chen and Erik Blasch and Sencun Zhu}, title = {A Study on Smart Online Frame Forging Attacks against Video Surveillance System}, journal = {CoRR}, volume = {abs/1903.03473}, year = {2019}, url = {http://arxiv.org/abs/1903.03473}, eprinttype = {arXiv}, eprint = {1903.03473}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-03473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-09935, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {No Peeking through My Windows: Conserving Privacy in Personal Drones}, journal = {CoRR}, volume = {abs/1908.09935}, year = {2019}, url = {http://arxiv.org/abs/1908.09935}, eprinttype = {arXiv}, eprint = {1908.09935}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-09935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-09845, author = {Alem Fitwi and Yu Chen and Sencun Zhu}, title = {A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge}, journal = {CoRR}, volume = {abs/1909.09845}, year = {2019}, url = {http://arxiv.org/abs/1909.09845}, eprinttype = {arXiv}, eprint = {1909.09845}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-09845.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuLWZ18, author = {Xing Liu and Jiqiang Liu and Wei Wang and Sencun Zhu}, title = {Android single sign-on security: Issues, taxonomy and directions}, journal = {Future Gener. Comput. Syst.}, volume = {89}, pages = {402--420}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.06.049}, doi = {10.1016/J.FUTURE.2018.06.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuLWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM18, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Defence Mechanisms for Public Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153524}, doi = {10.4108/EAI.4-1-2018.153524}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuangZY18, author = {Chu Huang and Sencun Zhu and Yi Yang}, title = {An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153527}, doi = {10.4108/EAI.4-1-2018.153527}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HuangZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhazbakFZC18, author = {Youssef Khazbak and Jingyao Fan and Sencun Zhu and Guohong Cao}, title = {Preserving Location Privacy in Ride-Hailing Service}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433221}, doi = {10.1109/CNS.2018.8433221}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/KhazbakFZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiaoZZS18, author = {Cong Liao and Haoti Zhong and Sencun Zhu and Anna Cinzia Squicciarini}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Server-Based Manipulation Attacks Against Machine Learning Models}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {24--34}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176321}, doi = {10.1145/3176258.3176321}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiaoZZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CaoYSLSZ18, author = {Chen Cao and Lun{-}Pin Yuan and Anoop Singhal and Peng Liu and Xiaoyan Sun and Sencun Zhu}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {330--348}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_21}, doi = {10.1007/978-3-319-95729-6\_21}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CaoYSLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Yuan0Z18, author = {Lun{-}Pin Yuan and Peng Liu and Sencun Zhu}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Android {STAR:} An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {248--259}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212503}, doi = {10.1145/3212480.3212503}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Yuan0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2017, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78813-5}, doi = {10.1007/978-3-319-78813-5}, isbn = {978-3-319-78812-8}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2017w, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78816-6}, doi = {10.1007/978-3-319-78816-6}, isbn = {978-3-319-78815-9}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2018-1, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9}, doi = {10.1007/978-3-030-01701-9}, isbn = {978-3-030-01700-2}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2018-2, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0}, doi = {10.1007/978-3-030-01704-0}, isbn = {978-3-030-01703-3}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-10307, author = {Cong Liao and Haoti Zhong and Anna Cinzia Squicciarini and Sencun Zhu and David J. Miller}, title = {Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation}, journal = {CoRR}, volume = {abs/1808.10307}, year = {2018}, url = {http://arxiv.org/abs/1808.10307}, eprinttype = {arXiv}, eprint = {1808.10307}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-10307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangZGH17, author = {Chu Huang and Sencun Zhu and Quanlong Guan and Yongzhong He}, title = {A software assignment algorithm for minimizing worm damage in networked systems}, journal = {J. Inf. Secur. Appl.}, volume = {35}, pages = {55--67}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.05.004}, doi = {10.1016/J.JISA.2017.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangZGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM17, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153514}, doi = {10.4108/EAI.28-12-2017.153514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/LuoMWLZ17, author = {Lannan Luo and Jiang Ming and Dinghao Wu and Peng Liu and Sencun Zhu}, title = {Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection}, journal = {{IEEE} Trans. Software Eng.}, volume = {43}, number = {12}, pages = {1157--1177}, year = {2017}, url = {https://doi.org/10.1109/TSE.2017.2655046}, doi = {10.1109/TSE.2017.2655046}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/LuoMWLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangZZY17, author = {Xiaolei Wang and Sencun Zhu and Dehua Zhou and Yuexiang Yang}, title = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {350--361}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134601}, doi = {10.1145/3134600.3134601}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenHZY17, author = {Hao Chen and Daojing He and Sencun Zhu and Jingshun Yang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {58--70}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053022}, doi = {10.1145/3052973.3053022}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenHZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Ren0Z17, author = {Chuangang Ren and Peng Liu and Sencun Zhu}, title = {WindowGuard: Systematic Protection of {GUI} Security in Android}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/windowguard-systematic-protection-gui-security-android/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Ren0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ChenHZLG17, author = {Xin Chen and Heqing Huang and Sencun Zhu and Qing Li and Quanlong Guan}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android {OS}}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {75--86}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139552}, doi = {10.1145/3139550.3139552}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ChenHZLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2017, editor = {Giovanni Livraga and Sencun Zhu}, title = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1}, doi = {10.1007/978-3-319-61176-1}, isbn = {978-3-319-61175-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-06654, author = {Hao Fu and Zizhan Zheng and Sencun Zhu and Pransant Mohapatra}, title = {{INSPIRED:} Intention-based Privacy-preserving Permission Model}, journal = {CoRR}, volume = {abs/1709.06654}, year = {2017}, url = {http://arxiv.org/abs/1709.06654}, eprinttype = {arXiv}, eprint = {1709.06654}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-06654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/YangZC16, author = {Yi Yang and Sencun Zhu and Guohong Cao}, title = {Improving sensor network immunity under worm attacks: {A} software diversity approach}, journal = {Ad Hoc Networks}, volume = {47}, pages = {26--40}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2016.04.011}, doi = {10.1016/J.ADHOC.2016.04.011}, timestamp = {Fri, 26 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/YangZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/MingZWLZ16, author = {Jiang Ming and Fangfang Zhang and Dinghao Wu and Peng Liu and Sencun Zhu}, title = {Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection}, journal = {{IEEE} Trans. Reliab.}, volume = {65}, number = {4}, pages = {1647--1664}, year = {2016}, url = {https://doi.org/10.1109/TR.2016.2570554}, doi = {10.1109/TR.2016.2570554}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/MingZWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieZLW16, author = {Zhen Xie and Sencun Zhu and Qing Li and Wenjing Wang}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {You can promote, but you can't hide: large-scale abused app detection in mobile app stores}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {374--385}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991099}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HuangZZZZ0CZ16, author = {Heqing Huang and Cong Zheng and Junyuan Zeng and Wu Zhou and Sencun Zhu and Peng Liu and Suresh Chari and Ce Zhang}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {Android malware development on public malware scanning platforms: {A} large-scale data-driven study}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {1090--1099}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7840712}, doi = {10.1109/BIGDATA.2016.7840712}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/HuangZZZZ0CZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LuoFWZ016, author = {Lannan Luo and Yu Fu and Dinghao Wu and Sencun Zhu and Peng Liu}, title = {Repackage-Proofing Android Apps}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {550--561}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.56}, doi = {10.1109/DSN.2016.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LuoFWZ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/GuanHLZ16, author = {Quanlong Guan and Heqing Huang and Weiqi Luo and Sencun Zhu}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {Semantics-Based Repackaging Detection for Mobile Apps}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {89--105}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_6}, doi = {10.1007/978-3-319-30806-7\_6}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/GuanHLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiuZWL16, author = {Xing Liu and Sencun Zhu and Wei Wang and Jiqiang Liu}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {655--672}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_36}, doi = {10.1007/978-3-319-59608-2\_36}, timestamp = {Tue, 12 May 2020 10:32:53 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiuZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JhiJWZ0W15, author = {Yoon{-}chan Jhi and Xiaoqi Jia and Xinran Wang and Sencun Zhu and Peng Liu and Dinghao Wu}, title = {Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection}, journal = {{IEEE} Trans. Software Eng.}, volume = {41}, number = {9}, pages = {925--943}, year = {2015}, url = {https://doi.org/10.1109/TSE.2015.2418777}, doi = {10.1109/TSE.2015.2418777}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JhiJWZ0W15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangCR0ZW15, author = {Heqing Huang and Kai Chen and Chuangang Ren and Peng Liu and Sencun Zhu and Dinghao Wu}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {7--18}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714589}, doi = {10.1145/2714576.2714589}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangCR0ZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangZ0015, author = {Heqing Huang and Sencun Zhu and Kai Chen and Peng Liu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1236--1247}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813606}, doi = {10.1145/2810103.2813606}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangZ0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangZG15, author = {Chu Huang and Sencun Zhu and Quanlong Guan}, title = {Multi-objective software assignment for active cyber defense}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {299--307}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346840}, doi = {10.1109/CNS.2015.7346840}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/XuZ15, author = {Zhi Xu and Sencun Zhu}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {SemaDroid: {A} Privacy-Aware Sensor Management Framework for Smartphones}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {61--72}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699114}, doi = {10.1145/2699026.2699114}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/XuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenZ15, author = {Xin Chen and Sencun Zhu}, title = {DroidJust: automated functionality-aware privacy leakage analysis for Android applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {5:1--5:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766507}, doi = {10.1145/2766498.2766507}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChenZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZ15, author = {Zhen Xie and Sencun Zhu}, title = {AppWatcher: unveiling the underground market of trading mobile app reviews}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {10:1--10:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766510}, doi = {10.1145/2766498.2766510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icae/ChengLZT14, author = {Tianzhen Cheng and Ping Li and Sencun Zhu and Don J. Torrieri}, title = {M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks}, journal = {Integr. Comput. Aided Eng.}, volume = {21}, number = {1}, pages = {19--34}, year = {2014}, url = {https://doi.org/10.3233/ICA-130445}, doi = {10.3233/ICA-130445}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icae/ChengLZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZTJ14, author = {Longquan Li and Sencun Zhu and Don J. Torrieri and Sushil Jajodia}, title = {Self-healing wireless networks under insider jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {220--228}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997489}, doi = {10.1109/CNS.2014.6997489}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HuangZE14, author = {Chu Huang and Sencun Zhu and Robert F. Erbacher}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Toward Software Diversity in Heterogeneous Networked Systems}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {114--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_8}, doi = {10.1007/978-3-662-43936-4\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/ZhangW0Z14, author = {Fangfang Zhang and Dinghao Wu and Peng Liu and Sencun Zhu}, title = {Program Logic Based Software Plagiarism Detection}, booktitle = {25th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2014, Naples, Italy, November 3-6, 2014}, pages = {66--77}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSRE.2014.18}, doi = {10.1109/ISSRE.2014.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/ZhangW0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ChenCZ14, author = {Xin Chen and Jin{-}Hee Cho and Sencun Zhu}, title = {GlobalTrust: An attack-resilient reputation system for tactical networks}, booktitle = {Eleventh Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2014, Singapore, June 30 - July 3, 2014}, pages = {275--283}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SAHCN.2014.6990363}, doi = {10.1109/SAHCN.2014.6990363}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/secon/ChenCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Huang00ZW14, author = {Heqing Huang and Kai Chen and Peng Liu and Sencun Zhu and Dinghao Wu}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {359--366}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_27}, doi = {10.1007/978-3-319-23802-9\_27}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Huang00ZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/LuoMW0Z14, author = {Lannan Luo and Jiang Ming and Dinghao Wu and Peng Liu and Sencun Zhu}, editor = {Shing{-}Chi Cheung and Alessandro Orso and Margaret{-}Anne D. Storey}, title = {Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection}, booktitle = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014}, pages = {389--400}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2635868.2635900}, doi = {10.1145/2635868.2635900}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/LuoMW0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangHZW014, author = {Fangfang Zhang and Heqing Huang and Sencun Zhu and Dinghao Wu and Peng Liu}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {ViewDroid: towards obfuscation-resilient mobile application repackaging detection}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {25--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627395}, doi = {10.1145/2627393.2627395}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhangHZW014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZ14, author = {Zhen Xie and Sencun Zhu}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {GroupTie: toward hidden collusion group discovery in app stores}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {153--164}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627409}, doi = {10.1145/2627393.2627409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiGZC13, author = {Qinghua Li and Wei Gao and Sencun Zhu and Guohong Cao}, title = {To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {168--182}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.84}, doi = {10.1109/TDSC.2012.84}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/YangSZC13, author = {Yi Yang and Min Shao and Sencun Zhu and Guohong Cao}, title = {Towards statistically strong source anonymity for sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {9}, number = {3}, pages = {34:1--34:23}, year = {2013}, url = {https://doi.org/10.1145/2480730.2480737}, doi = {10.1145/2480730.2480737}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/YangSZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/XuZZ13, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {JStill: mostly static detection of obfuscated malicious JavaScript code}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {117--128}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435364}, doi = {10.1145/2435349.2435364}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/XuZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/XuZZ13, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, title = {Permlyzer: Analyzing permission usage in Android applications}, booktitle = {{IEEE} 24th International Symposium on Software Reliability Engineering, {ISSRE} 2013, Pasadena, CA, USA, November 4-7, 2013}, pages = {400--410}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSRE.2013.6698893}, doi = {10.1109/ISSRE.2013.6698893}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/XuZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ChenPZSO13, author = {Xin Chen and Harshal Patankar and Sencun Zhu and Mudhakar Srivatsa and Jeff Opper}, title = {Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks}, booktitle = {10th Annual {IEEE} International Conference on Sensing, Communications and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013}, pages = {131--139}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SAHCN.2013.6644971}, doi = {10.1109/SAHCN.2013.6644971}, timestamp = {Fri, 30 Apr 2021 18:08:41 +0200}, biburl = {https://dblp.org/rec/conf/secon/ChenPZSO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/ChenZXZ13, author = {Ying Chen and Sencun Zhu and Heng Xu and Yilu Zhou}, title = {Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {196--203}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.36}, doi = {10.1109/SOCIALCOM.2013.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/ChenZXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuangZLW13, author = {Heqing Huang and Sencun Zhu and Peng Liu and Dinghao Wu}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {A Framework for Evaluating Mobile App Repackaging Detection Algorithms}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {169--186}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_13}, doi = {10.1007/978-3-642-38908-5\_13}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuangZLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ChenXZZ13, author = {Ying Chen and Heng Xu and Yilu Zhou and Sencun Zhu}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {201--212}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488407}, doi = {10.1145/2488388.2488407}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/ChenXZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TorrieriZJ13, author = {Don J. Torrieri and Sencun Zhu and Sushil Jajodia}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Cyber Maneuver Against External Adversaries and Compromised Nodes}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {87--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_5}, doi = {10.1007/978-1-4614-5416-8\_5}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/LiGZC12, author = {Qinghua Li and Wei Gao and Sencun Zhu and Guohong Cao}, title = {A routing protocol for socially selfish delay tolerant networks}, journal = {Ad Hoc Networks}, volume = {10}, number = {8}, pages = {1619--1632}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2011.07.007}, doi = {10.1016/J.ADHOC.2011.07.007}, timestamp = {Sat, 09 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/LiGZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/XinCWLZMX12, author = {Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu and Sencun Zhu and Bing Mao and Li Xie}, title = {Replacement attacks: automatically evading behavior-based software birthmark}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {293--304}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0170-9}, doi = {10.1007/S10207-012-0170-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/XinCWLZMX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NatarajanZSO12, author = {Vivek Natarajan and Sencun Zhu and Mudhakar Srivatsa and Jeff Opper}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks}, booktitle = {{IEEE} 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012}, pages = {376--383}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AINA.2012.89}, doi = {10.1109/AINA.2012.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NatarajanZSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ChengLZ12, author = {Tianzhen Cheng and Ping Li and Sencun Zhu}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {An Algorithm for Jammer Localization in Wireless Sensor Networks}, booktitle = {{IEEE} 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012}, pages = {724--731}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AINA.2012.11}, doi = {10.1109/AINA.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ChengLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/HuangZW12, author = {Chu Huang and Sencun Zhu and Dinghao Wu}, title = {Towards Trusted Services: Result Verification Schemes for MapReduce}, booktitle = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012}, pages = {41--48}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CCGrid.2012.77}, doi = {10.1109/CCGRID.2012.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/HuangZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/NatarajanYZ12, author = {Vivek Natarajan and Yi Yang and Sencun Zhu}, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {Secure Trust Metadata Management for Mobile Ad-Hoc Networks}, booktitle = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {164--180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35130-3\_12}, doi = {10.1007/978-3-642-35130-3\_12}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/NatarajanYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ZhangJWLZ12, author = {Fangfang Zhang and Yoon{-}chan Jhi and Dinghao Wu and Peng Liu and Sencun Zhu}, editor = {Mats Per Erik Heimdahl and Zhendong Su}, title = {A first step towards algorithm plagiarism detection}, booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} 2012, Minneapolis, MN, USA, July 15-20, 2012}, pages = {111--121}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2338965.2336767}, doi = {10.1145/2338965.2336767}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/issta/ZhangJWLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/XuZZ12, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, title = {The power of obfuscation techniques in malicious JavaScript code: {A} measurement study}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461002}, doi = {10.1109/MALWARE.2012.6461002}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/XuZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuHCZH12, author = {Zhi Xu and Hung{-}Yuan Hsu and Xin Chen and Sencun Zhu and Ali R. Hurson}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{AK-PPM:} An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {147--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_8}, doi = {10.1007/978-3-642-33338-5\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuHCZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/ChenZZX12, author = {Ying Chen and Yilu Zhou and Sencun Zhu and Heng Xu}, title = {Detecting Offensive Language in Social Media to Protect Adolescent Online Safety}, booktitle = {2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012}, pages = {71--80}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.55}, doi = {10.1109/SOCIALCOM-PASSAT.2012.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/ChenZZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XuBZ12, author = {Zhi Xu and Kun Bai and Sencun Zhu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {113--124}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185465}, doi = {10.1145/2185448.2185465}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/XuBZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/XuZ12, author = {Zhi Xu and Sencun Zhu}, editor = {Elie Bursztein and Thomas Dullien}, title = {Abusing Notification Services on Smartphones for Phishing and Spamming}, booktitle = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7, 2012, Bellevue, WA, USA, Proceedings}, pages = {1--11}, publisher = {{USENIX} Association}, year = {2012}, url = {http://www.usenix.org/conference/woot12/abusing-notification-services-smartphones-phishing-and-spamming}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/XuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0132-7}, doi = {10.1007/S10207-011-0132-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeBZCC11, author = {Daojing He and Jiajun Bu and Sencun Zhu and Sammy Chan and Chun Chen}, title = {Distributed Access Control with Privacy Support in Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {10}, pages = {3472--3481}, year = {2011}, url = {https://doi.org/10.1109/TWC.2011.072511.102283}, doi = {10.1109/TWC.2011.072511.102283}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeBZCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/JiangHZC11, author = {Xuan Jiang and Wenhui Hu and Sencun Zhu and Guohong Cao}, title = {Compromise-resilient anti-jamming communication in wireless sensor networks}, journal = {Wirel. Networks}, volume = {17}, number = {6}, pages = {1513--1527}, year = {2011}, url = {https://doi.org/10.1007/s11276-011-0361-8}, doi = {10.1007/S11276-011-0361-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/JiangHZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChauguleXZ11, author = {Ashwin Chaugule and Zhi Xu and Sencun Zhu}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {A Specification Based Intrusion Detection Framework for Mobile Phones}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {19--37}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_2}, doi = {10.1007/978-3-642-21554-4\_2}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChauguleXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengLZ11, author = {Tianzhen Cheng and Ping Li and Sencun Zhu}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {Multi-jammer Localization in Wireless Sensor Networks}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {736--740}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.167}, doi = {10.1109/CIS.2011.167}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChengLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/JhiWJZLW11, author = {Yoon{-}chan Jhi and Xinran Wang and Xiaoqi Jia and Sencun Zhu and Peng Liu and Dinghao Wu}, editor = {Richard N. Taylor and Harald C. Gall and Nenad Medvidovic}, title = {Value-based program characterization and its application to software plagiarism detection}, booktitle = {Proceedings of the 33rd International Conference on Software Engineering, {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011}, pages = {756--765}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1985793.1985899}, doi = {10.1145/1985793.1985899}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/JhiWJZLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeBZYGWCC11, author = {Daojing He and Jiajun Bu and Sencun Zhu and Mingjian Yin and Yi Gao and Haodong Wang and Sammy Chan and Chun Chen}, title = {Distributed privacy-preserving access control in a single-owner multi-user sensor network}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {331--335}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935176}, doi = {10.1109/INFCOM.2011.5935176}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/HeBZYGWCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/NatarajanYZ11, author = {Vivek Natarajan and Yi Yang and Sencun Zhu}, editor = {Sheng Zhong and Dejing Dou and Yu Wang}, title = {Resource-misuse attack detection in delay-tolerant networks}, booktitle = {30th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PCCC.2011.6108092}, doi = {10.1109/PCCC.2011.6108092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/NatarajanYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XinCWLZMX11, author = {Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu and Sencun Zhu and Bing Mao and Li Xie}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Replacement Attacks on Behavior Based Software Birthmark}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_1}, doi = {10.1007/978-3-642-24861-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/XinCWLZMX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XuBZLM11, author = {Zhi Xu and Kun Bai and Sencun Zhu and Leslie S. Liu and Randy Moulic}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Context-Related Access Control for Mobile Caching}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {389--408}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_22}, doi = {10.1007/978-3-642-31909-9\_22}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XuBZLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/YangZ11, author = {Yi Yang and Sencun Zhu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Anonymous Routing}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {39--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_628}, doi = {10.1007/978-1-4419-5906-5\_628}, timestamp = {Fri, 26 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/YangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/YangZ11a, author = {Yi Yang and Sencun Zhu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Sensor Code Attestation}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1178--1179}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_644}, doi = {10.1007/978-1-4419-5906-5\_644}, timestamp = {Fri, 26 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/YangZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/YangZ11b, author = {Yi Yang and Sencun Zhu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Sensor Key Management}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1179--1181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_633}, doi = {10.1007/978-1-4419-5906-5\_633}, timestamp = {Fri, 26 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/YangZ11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangPLZ10, author = {Xinran Wang and Chi{-}Chun Pan and Peng Liu and Sencun Zhu}, title = {SigFree: {A} Signature-Free Buffer Overflow Attack Blocker}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {65--79}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.30}, doi = {10.1109/TDSC.2008.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangPLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuZX10, author = {Wei Xu and Sencun Zhu and Heng Xu}, editor = {Jianying Zhou and Moti Yung}, title = {{COP:} {A} Step toward Children Online Privacy}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {529--544}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_31}, doi = {10.1007/978-3-642-13708-2\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuZZ10, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Toward worm detection in online social networks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {11--20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920264}, doi = {10.1145/1920261.1920264}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HsuZH10, author = {Hung{-}Yuan Hsu and Sencun Zhu and Ali R. Hurson}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {A hotspot-based protocol for attack traceback in mobile ad hoc networks}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {333--336}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755733}, doi = {10.1145/1755688.1755733}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HsuZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiangHZC10, author = {Xuan Jiang and Wenhui Hu and Sencun Zhu and Guohong Cao}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Compromise-Resilient Anti-jamming for Wireless Sensor Networks}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {140--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_11}, doi = {10.1007/978-3-642-17650-0\_11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/JiangHZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiZC10, author = {Qinghua Li and Sencun Zhu and Guohong Cao}, title = {Routing in Socially Selfish Delay Tolerant Networks}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {857--865}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462138}, doi = {10.1109/INFCOM.2010.5462138}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ChenZL10, author = {Wenping Chen and Sencun Zhu and Deying Li}, title = {{VAN:} Vehicle-assisted shortest-time path navigation}, booktitle = {{IEEE} 7th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2010, 8-12 November 2010, San Francisco, CA, {USA}}, pages = {442--451}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MASS.2010.5663936}, doi = {10.1109/MASS.2010.5663936}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ChenZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/ZhaoXCZC10, author = {Bo Zhao and Zhi Xu and Caixia Chi and Sencun Zhu and Guohong Cao}, editor = {Patrick S{\'{e}}nac and Max Ott and Aruna Seneviratne}, title = {Mirroring Smartphones for Good: {A} Feasibility Study}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {73}, pages = {26--38}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29154-8\_3}, doi = {10.1007/978-3-642-29154-8\_3}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/ZhaoXCZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, editor = {Sushil Jajodia and Jianying Zhou}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {1--19}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_1}, doi = {10.1007/978-3-642-16161-2\_1}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZSZ10, author = {Liang Xie and Xinwen Zhang and Jean{-}Pierre Seifert and Sencun Zhu}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {pBMDS: a behavior-based malware detection system for cellphone devices}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {37--48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741874}, doi = {10.1145/1741866.1741874}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhangZC09, author = {Wensheng Zhang and Sencun Zhu and Guohong Cao}, title = {Predistribution and local collaboration-based group rekeying for wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {6}, pages = {1229--1242}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2008.11.004}, doi = {10.1016/J.ADHOC.2008.11.004}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhangZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhangZC09a, author = {Wensheng Zhang and Sencun Zhu and Guohong Cao}, title = {Editorial for special issue on privacy and security in wireless sensorand ad hoc networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1431--1433}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.05.001}, doi = {10.1016/J.ADHOC.2009.05.001}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhangZC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ShaoZZCY09, author = {Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao and Yi Yang}, title = {pDCS: Security and Privacy Support for Data-Centric Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {8}, number = {8}, pages = {1023--1038}, year = {2009}, url = {https://doi.org/10.1109/TMC.2008.168}, doi = {10.1109/TMC.2008.168}, timestamp = {Fri, 26 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ShaoZZCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJZL09, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, title = {Detecting Software Theft via System Call Based Birthmarks}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {149--158}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.24}, doi = {10.1109/ACSAC.2009.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangJZL09, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Behavior based software theft detection}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {280--290}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653696}, doi = {10.1145/1653662.1653696}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangJZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhuCZRN09, author = {Zhichao Zhu and Guohong Cao and Sencun Zhu and Supranamaya Ranjan and Antonio Nucci}, title = {A Social Network Based Patching Scheme for Worm Containment in Cellular Networks}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1476--1484}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062064}, doi = {10.1109/INFCOM.2009.5062064}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhuCZRN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhaoCGZC09, author = {Bo Zhao and Caixia Chi and Wei Gao and Sencun Zhu and Guohong Cao}, title = {A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2455--2463}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062173}, doi = {10.1109/INFCOM.2009.5062173}, timestamp = {Tue, 12 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhaoCGZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ShaoHZCKP09, author = {Min Shao and Wenhui Hu and Sencun Zhu and Guohong Cao and Srikanth V. Krishnamurthy and Tom La Porta}, title = {Cross-layer Enhanced Source Location Privacy in Sensor Networks}, booktitle = {Proceedings of the Sixth Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2009, June 22-26, 2009, Rome, Italy}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/SAHCN.2009.5168923}, doi = {10.1109/SAHCN.2009.5168923}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/ShaoHZCKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangZCL09, author = {Yi Yang and Sencun Zhu and Guohong Cao and Thomas La Porta}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {373--393}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_22}, doi = {10.1007/978-3-642-05284-2\_22}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/YangZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/XieZCJZ09, author = {Liang Xie and Xinwen Zhang and Ashwin Chaugule and Trent Jaeger and Sencun Zhu}, title = {Designing System-Level Defenses against Cellphone Malware}, booktitle = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009), Niagara Falls, New York, USA, September 27-30, 2009}, pages = {83--90}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SRDS.2009.21}, doi = {10.1109/SRDS.2009.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/XieZCJZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XieZ08, author = {Liang Xie and Sencun Zhu}, title = {Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {15:1--15:30}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341736}, doi = {10.1145/1341731.1341736}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XieZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YangWZC08, author = {Yi Yang and Xinran Wang and Sencun Zhu and Guohong Cao}, title = {{SDAP:} {A} Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {18:1--18:43}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380568}, doi = {10.1145/1380564.1380568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YangWZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/SongZZC08, author = {Hui Song and Sencun Zhu and Wensheng Zhang and Guohong Cao}, title = {Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {4}, number = {4}, pages = {23:1--23:34}, year = {2008}, url = {https://doi.org/10.1145/1387663.1387669}, doi = {10.1145/1387663.1387669}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/SongZZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XieSZ08, author = {Liang Xie and Hui Song and Sencun Zhu}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {On the Effectiveness of Internal Patching Against File-Sharing Worms}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {1--20}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_1}, doi = {10.1007/978-3-540-68914-0\_1}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/XieSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJZL08, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, title = {{STILL:} Exploit Code Detection via Static Taint and Initialization Analyses}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.37}, doi = {10.1109/ACSAC.2008.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/XuIZX08, author = {Heng Xu and Nazneen Irani and Sencun Zhu and Wei Xu}, title = {Alleviating Parental Concerns for Children's Online Privacy: {A} Value Sensitive Design Investigation}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2008, Paris, France, December 14-17, 2008}, pages = {106}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/icis2008/106}, timestamp = {Wed, 28 Dec 2011 12:50:25 +0100}, biburl = {https://dblp.org/rec/conf/icis/XuIZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MasudKTWLZ08, author = {Mohammad M. Masud and Latifur Khan and Bhavani Thuraisingham and Xinran Wang and Peng Liu and Sencun Zhu}, editor = {Indrajit Ray and Sujeet Shenoi}, title = {Detecting Remote Exploits Using Data Mining}, booktitle = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008}, series = {{IFIP}}, volume = {285}, pages = {177--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-84927-0\_15}, doi = {10.1007/978-0-387-84927-0\_15}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/MasudKTWLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShaoYZC08, author = {Min Shao and Yi Yang and Sencun Zhu and Guohong Cao}, title = {Towards Statistically Strong Source Anonymity for Sensor Networks}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {51--55}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.19}, doi = {10.1109/INFOCOM.2008.19}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShaoYZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SongZC08, author = {Hui Song and Sencun Zhu and Guohong Cao}, title = {{SVATS:} {A} Sensor-Network-Based Vehicle Anti-Theft System}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {2128--2136}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.279}, doi = {10.1109/INFOCOM.2008.279}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SongZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/YangZC08, author = {Yi Yang and Sencun Zhu and Guohong Cao}, editor = {Xiaohua Jia and Ness B. Shroff and Peng{-}Jun Wan}, title = {Improving sensor network immunity under worm attacks: a software diversity approach}, booktitle = {Proceedings of the 9th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008}, pages = {149--158}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374618.1374640}, doi = {10.1145/1374618.1374640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/YangZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ShaoZCPM08, author = {Min Shao and Sencun Zhu and Guohong Cao and Tom La Porta and Prasant Mohapatra}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {A cross-layer dropping attack in video streaming over ad hoc networks}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {25}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460909}, doi = {10.1145/1460877.1460909}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ShaoZCPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YangSZUC08, author = {Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Towards event source unobservability with minimum network traffic in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {77--88}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352547}, doi = {10.1145/1352533.1352547}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YangSZUC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/XieSJZ08, author = {Liang Xie and Hui Song and Trent Jaeger and Sencun Zhu}, editor = {Jinpeng Huai and Robin Chen and Hsiao{-}Wuen Hon and Yunhao Liu and Wei{-}Ying Ma and Andrew Tomkins and Xiaodong Zhang}, title = {A systematic approach for cell-phone worm containment}, booktitle = {Proceedings of the 17th International Conference on World Wide Web, {WWW} 2008, Beijing, China, April 21-25, 2008}, pages = {1083--1084}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1367497.1367667}, doi = {10.1145/1367497.1367667}, timestamp = {Tue, 20 Dec 2022 21:20:03 +0100}, biburl = {https://dblp.org/rec/conf/www/XieSJZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangJZL08, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, editor = {Jinpeng Huai and Robin Chen and Hsiao{-}Wuen Hon and Yunhao Liu and Wei{-}Ying Ma and Andrew Tomkins and Xiaodong Zhang}, title = {Protecting web services from remote exploit code: a static analysis approach}, booktitle = {Proceedings of the 17th International Conference on World Wide Web, {WWW} 2008, Beijing, China, April 21-25, 2008}, pages = {1139--1140}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1367497.1367695}, doi = {10.1145/1367497.1367695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/WangJZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SongZC07, author = {Hui Song and Sencun Zhu and Guohong Cao}, title = {Attack-resilient time synchronization for wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {5}, number = {1}, pages = {112--125}, year = {2007}, url = {https://doi.org/10.1016/j.adhoc.2006.05.016}, doi = {10.1016/J.ADHOC.2006.05.016}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/SongZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuYLSJ07, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, title = {Efficient security mechanisms for overlay multicast based content delivery}, journal = {Comput. Commun.}, volume = {30}, number = {4}, pages = {793--806}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2006.10.003}, doi = {10.1016/J.COMCOM.2006.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuLCZ07, author = {Qijun Gu and Peng Liu and Chao{-}Hsien Chu and Sencun Zhu}, title = {Defence against packet injection in ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {154--169}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012832}, doi = {10.1504/IJSN.2007.012832}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsuZH07, author = {Hung{-}Yuan Hsu and Sencun Zhu and Ali R. Hurson}, title = {{LIP:} a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {202--215}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013174}, doi = {10.1504/IJSN.2007.013174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/TraynorKCCZP07, author = {Patrick Traynor and Raju Kumar and Heesook Choi and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {6}, number = {6}, pages = {663--677}, year = {2007}, url = {https://doi.org/10.1109/TMC.2007.1020}, doi = {10.1109/TMC.2007.1020}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJN07, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {Interleaved hop-by-hop authentication against false data injection attacks in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {3}, number = {3}, pages = {14}, year = {2007}, url = {https://doi.org/10.1145/1267060.1267062}, doi = {10.1145/1267060.1267062}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShaoZZC07, author = {Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao}, title = {pDCS: Security and Privacy Support for Data-Centric Sensor Networks}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1298--1306}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.154}, doi = {10.1109/INFCOM.2007.154}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShaoZZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/SongXZC07, author = {Hui Song and Liang Xie and Sencun Zhu and Guohong Cao}, editor = {Mohsen Guizani and Hsiao{-}Hwa Chen and Xi Zhang}, title = {Sensor node compromise detection: the location perspective}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, {IWCMC} 2007, Honolulu, Hawaii, USA, August 12-16, 2007}, pages = {242--247}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1280940.1280993}, doi = {10.1145/1280940.1280993}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/SongXZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/ZhangTZC07, author = {Wensheng Zhang and Minh Tran and Sencun Zhu and Guohong Cao}, editor = {Evangelos Kranakis and Elizabeth M. Belding and Eytan H. Modiano}, title = {A random perturbation-based scheme for pairwise key establishment in sensor networks}, booktitle = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007}, pages = {90--99}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288107.1288120}, doi = {10.1145/1288107.1288120}, timestamp = {Mon, 22 Feb 2021 15:13:40 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/ZhangTZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/XieZ07, author = {Liang Xie and Sencun Zhu}, editor = {Manfred Hauswirth and Adam Wierzbicki and Klaus Wehrle and Alberto Montresor and Nahid Shahmehri}, title = {A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms}, booktitle = {Seventh {IEEE} International Conference on Peer-to-Peer Computing {(P2P} 2007), September 2-5, 2007, Galway, Ireland}, pages = {61--70}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/P2P.2007.3}, doi = {10.1109/P2P.2007.3}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/XieZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChoiZP07, author = {Heesook Choi and Sencun Zhu and Thomas F. La Porta}, title = {{SET:} Detecting node clones in sensor networks}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {341--350}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550353}, doi = {10.1109/SECCOM.2007.4550353}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChoiZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/YangWZC07, author = {Yi Yang and Xinran Wang and Sencun Zhu and Guohong Cao}, title = {Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks}, booktitle = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007), Beijing, China, October 10-12, 2007}, pages = {219--230}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SRDS.2007.31}, doi = {10.1109/SRDS.2007.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/YangWZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhuXSJ06, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {{LHAP:} {A} lightweight network access control protocol for ad hoc networks}, journal = {Ad Hoc Networks}, volume = {4}, number = {5}, pages = {567--585}, year = {2006}, url = {https://doi.org/10.1016/j.adhoc.2005.06.002}, doi = {10.1016/J.ADHOC.2005.06.002}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhuXSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/PirrettiZVMKB06, author = {Matthew Pirretti and Sencun Zhu and Narayanan Vijaykrishnan and Patrick D. McDaniel and Mahmut T. Kandemir and Richard R. Brooks}, title = {The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense}, journal = {Int. J. Distributed Sens. Networks}, volume = {2}, number = {3}, pages = {267--287}, year = {2006}, url = {https://doi.org/10.1080/15501320600642718}, doi = {10.1080/15501320600642718}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/PirrettiZVMKB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZWJ06, author = {Yingjiu Li and Sencun Zhu and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Looking into the seeds of time: Discovering temporal patterns in large transaction sets}, journal = {Inf. Sci.}, volume = {176}, number = {8}, pages = {1003--1031}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2005.01.019}, doi = {10.1016/J.INS.2005.01.019}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiZWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhuSXJ06, author = {Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia}, title = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks}, journal = {J. Comput. Secur.}, volume = {14}, number = {4}, pages = {301--325}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14401}, doi = {10.3233/JCS-2006-14401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJ06, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, title = {{LEAP+:} Efficient security mechanisms for large-scale distributed sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {2}, number = {4}, pages = {500--528}, year = {2006}, url = {https://doi.org/10.1145/1218556.1218559}, doi = {10.1145/1218556.1218559}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TraynorCCZP06, author = {Patrick Traynor and Heesook Choi and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {Establishing Pair-Wise Keys in Heterogeneous Sensor Networks}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.260}, doi = {10.1109/INFOCOM.2006.260}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/TraynorCCZP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/YangWZ06, author = {Yi Yang and Xinran Wang and Sencun Zhu and Guohong Cao}, editor = {Sergio Palazzo and Marco Conti and Raghupathy Sivakumar}, title = {{SDAP:} : a secure hop-by-Hop data aggregation protocol for sensor networks}, booktitle = {Proceedings of the 7th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006}, pages = {356--367}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1132905.1132944}, doi = {10.1145/1132905.1132944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/YangWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XieZ06, author = {Liang Xie and Sencun Zhu}, title = {Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359534}, doi = {10.1109/SECCOMW.2006.359534}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/XieZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangP06, author = {Xinran Wang and Chi{-}Chun Pan and Peng Liu and Sencun Zhu}, editor = {Angelos D. Keromytis}, title = {SigFree: {A} Signature-free Buffer Overflow Attack Blocker}, booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/15th-usenix-security-symposium/sigfree-signature-free-buffer-overflow-attack-blocker}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sasn/2006, editor = {Sencun Zhu and Donggang Liu}, title = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-554-1}, timestamp = {Thu, 07 Dec 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhuYLSJ05, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {40--55}, year = {2005}, url = {https://doi.org/10.1007/11496137\_4}, doi = {10.1007/11496137\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GuLZC05, author = {Qijun Gu and Peng Liu and Sencun Zhu and Chao{-}Hsien Chu}, title = {Defending against packet injection attacks unreliable ad hoc networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM} '05, St. Louis, Missouri, USA, 28 November - 2 December 2005}, pages = {5}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/GLOCOM.2005.1577966}, doi = {10.1109/GLOCOM.2005.1577966}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/GuLZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/SongZC05, author = {Hui Song and Sencun Zhu and Guohong Cao}, title = {Attack-resilient time synchronization for wireless sensor networks}, booktitle = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MAHSS.2005.1542869}, doi = {10.1109/MAHSS.2005.1542869}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/SongZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/ZhangSZC05, author = {Wensheng Zhang and Hui Song and Sencun Zhu and Guohong Cao}, editor = {P. R. Kumar and Andrew T. Campbell and Roger Wattenhofer}, title = {Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks}, booktitle = {Proceedings of the 6th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005}, pages = {378--389}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1062689.1062737}, doi = {10.1145/1062689.1062737}, timestamp = {Thu, 08 Apr 2021 08:40:43 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/ZhangSZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05, author = {Donggang Liu and Peng Ning and Sencun Zhu and Sushil Jajodia}, title = {Practical Broadcast Authentication in Sensor Networks}, booktitle = {2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}}, pages = {118--132}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MOBIQUITOUS.2005.49}, doi = {10.1109/MOBIQUITOUS.2005.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/ZhuSXJ04, author = {Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia}, title = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks}, booktitle = {1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge, MA, {USA}}, pages = {42--51}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MOBIQ.2004.1331709}, doi = {10.1109/MOBIQ.2004.1331709}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/ZhuSXJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhuSJN04, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {259--271}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301328}, doi = {10.1109/SECPRI.2004.1301328}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{LEAP:} efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {62--72}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948120}, doi = {10.1145/948109.948120}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, title = {Performance Optimizations for Group Key Management Scheme}, booktitle = {23rd International Conference on Distributed Computing Systems {(ICDCS} 2003), 19-22 May 2003, Providence, RI, {USA}}, pages = {163}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCS.2003.1203463}, doi = {10.1109/ICDCS.2003.1203463}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhuXSJ03, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {{LHAP:} {A} Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks}, booktitle = {23rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2003 Workshops), 19-22 May 2003, Providence, RI, {USA}}, pages = {749}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCSW.2003.1203642}, doi = {10.1109/ICDCSW.2003.1203642}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhuXSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ZhuXSJ03, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: {A} Probabilistic Approach}, booktitle = {11th {IEEE} International Conference on Network Protocols {(ICNP} 2003), 4-7 November 2003, Atlanta, GA, {USA}}, pages = {326--335}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICNP.2003.1249782}, doi = {10.1109/ICNP.2003.1249782}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ZhuXSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdc/ZhuJ03, author = {Sencun Zhu and Sushil Jajodia}, editor = {Samir R. Das and Sajal K. Das}, title = {Scalable Group Rekeying for Secure Multicast: {A} Survey}, booktitle = {Distributed Computing - {IWDC} 2003, 5th International Workshop, Kolkata, India, December 27-30, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2918}, pages = {1--10}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24604-6\_1}, doi = {10.1007/978-3-540-24604-6\_1}, timestamp = {Tue, 10 Sep 2019 13:47:28 +0200}, biburl = {https://dblp.org/rec/conf/iwdc/ZhuJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngc/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Burkhard Stiller and Georg Carle and Martin Karsten and Peter Reichl}, title = {Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast}, booktitle = {Group Communications and Charges; Technology and Business Models, 5th {COST264} International Workshop on Networked Group Communications, {NGC} 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2816}, pages = {107--118}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39405-1\_10}, doi = {10.1007/978-3-540-39405-1\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/ngc/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{LEAP} - efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {308--309}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958534}, doi = {10.1145/958491.958534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/SetiaZJ02, author = {Sanjeev Setia and Sencun Zhu and Sushil Jajodia}, title = {A comparative performance analysis of reliable group rekey transport protocols for secure multicast}, journal = {Perform. Evaluation}, volume = {49}, number = {1/4}, pages = {21--41}, year = {2002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/SetiaZJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/foiks/LiZWJ02, author = {Yingjiu Li and Sencun Zhu and Lingyu Wang and Sushil Jajodia}, editor = {Thomas Eiter and Klaus{-}Dieter Schewe}, title = {A Privacy-Enhanced Microaggregation Method}, booktitle = {Foundations of Information and Knowledge Systems, Second International Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2284}, pages = {148--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45758-5\_10}, doi = {10.1007/3-540-45758-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/DouAZZ96, author = {Huifang Dou and Ainishet Asres and Zhaoying Zhou and Sencun Zhu}, title = {Stimulator for real time control of paralyzed muscles during functional electrical stimulation}, booktitle = {Proceedings of Third International Conference on Electronics, Circuits, and Systems, {ICECS} 1996, Rodos, Greece, October 13-16, 1996}, pages = {1096--1099}, publisher = {{IEEE}}, year = {1996}, url = {https://doi.org/10.1109/ICECS.1996.584612}, doi = {10.1109/ICECS.1996.584612}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/DouAZZ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.