default search action
Sencun Zhu
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j54]Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. IEEE Trans. Dependable Secur. Comput. 21(2): 905-919 (2024) - [i17]Bin Wang, Tianjian Liu, Wenqi Wang, Yuan Weng, Chao Li, Guangquan Xu, Meng Shen, Sencun Zhu, Wei Wang:
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems. CoRR abs/2405.13380 (2024) - 2023
- [j53]Alem Fitwi, Yu Chen, Sencun Zhu:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. IEEE Trans. Serv. Comput. 16(1): 276-287 (2023) - [c122]Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. WISEC 2023: 49-59 - [i16]Henger Li, Chen Wu, Sencun Zhu, Zizhan Zheng:
Learning to Backdoor Federated Learning. CoRR abs/2303.03320 (2023) - [i15]Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. CoRR abs/2305.06430 (2023) - 2022
- [j52]Yuanyi Sun, Sencun Zhu, Yu Chen:
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings. Proc. Priv. Enhancing Technol. 2022(3): 630-649 (2022) - [c121]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. CNS 2022: 1-9 - [c120]Chongqi Guan, Xianda Chen, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video. CNS 2022: 82-90 - [c119]Yuanyi Sun, Sencun Zhu, Yan Zhao, Pengfei Sun:
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks. CNS 2022: 91-99 - [c118]Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra:
Toward Cleansing Backdoored Neural Networks in Federated Learning. ICDCS 2022: 820-830 - [i14]Chen Wu, Sencun Zhu, Prasenjit Mitra:
Federated Unlearning with Knowledge Distillation. CoRR abs/2201.09441 (2022) - [i13]Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick D. McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth V. Krishnamurthy:
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN. CoRR abs/2203.06694 (2022) - 2021
- [j51]Daojing He, Hongjie Gu, Tinghui Li, Yongliang Du, Xiaolei Wang, Sencun Zhu, Nadra Guizani:
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware. IEEE Netw. 35(2): 202-207 (2021) - [j50]Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique:
Toward A Network-Assisted Approach for Effective Ransomware Detection. EAI Endorsed Trans. Security Safety 7(24): e3 (2021) - [j49]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [j48]Hao Fu, Pengfei Hu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Tianbo Gu, Sencun Zhu, Prasant Mohapatra:
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications. IEEE Trans. Mob. Comput. 20(10): 3066-3080 (2021) - [j47]Yaguang Lin, Xiaoming Wang, Fei Hao, Yichuan Jiang, Yulei Wu, Geyong Min, Daojing He, Sencun Zhu, Wei Zhao:
Dynamic Control of Fraud Information Spreading in Mobile Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(6): 3725-3738 (2021) - [c117]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. AsiaCCS 2021: 336-348 - [c116]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. DSN 2021: 250-262 - [i12]Yuanyi Sun, Sencun Zhu, Yao Zhao, Pengfei Sun:
Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks. CoRR abs/2109.00132 (2021) - [i11]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang:
AppQ: Warm-starting App Recommendation Based on View Graphs. CoRR abs/2109.03798 (2021) - 2020
- [j46]Daojing He, Xiaoxia Liu, Jiajia Zheng, Sammy Chan, Sencun Zhu, Weidong Min, Nadra Guizani:
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems. IEEE Netw. 34(4): 173-179 (2020) - [j45]Daojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, Nadra Guizani:
Security Analysis of Cryptocurrency Wallets in Android-Based Applications. IEEE Netw. 34(6): 114-119 (2020) - [j44]David Mohaisen, Sencun Zhu:
Editorial. EAI Endorsed Trans. Security Safety 6(22): e1 (2020) - [j43]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j42]Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, Xiangliang Zhang:
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Trans. Mob. Comput. 19(5): 1184-1199 (2020) - [c115]Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, Yao Cheng:
Android-based Cryptocurrency Wallets: Attacks and Countermeasures. Blockchain 2020: 9-16 - [c114]Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CODASPY 2020: 97-108 - [c113]Alem Fitwi, Yu Chen, Sencun Zhu:
PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service. CIC 2020: 125-134 - [c112]Qi Qiao, Daojing He, Yun Gao, Sencun Zhu, Jiahao Gao, Sammy Chan:
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems. SECON 2020: 1-9 - [c111]Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan:
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems. SRDS 2020: 205-214 - [c110]Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen:
iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. WISEC 2020: 195-206 - [i10]Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Hassan-Shafique:
A Network-Assisted Approach for Ransomware Detection. CoRR abs/2008.12428 (2020) - [i9]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. CoRR abs/2010.10788 (2020) - [i8]Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra:
Mitigating Backdoor Attacks in Federated Learning. CoRR abs/2011.01767 (2020) - [i7]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users. CoRR abs/2012.13971 (2020) - [i6]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder. CoRR abs/2012.13972 (2020)
2010 – 2019
- 2019
- [j41]Xiaolei Wang, Andrea Continella, Yuexiang Yang, Yongzhong He, Sencun Zhu:
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1): 28:1-28:25 (2019) - [j40]Daojing He, Yinrong Qiao, Shiqing Chen, Xiao Du, Wenjie Chen, Sencun Zhu, Mohsen Guizani:
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles. IEEE Netw. 33(2): 146-151 (2019) - [j39]Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander J. Aved, Sencun Zhu:
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 19(11): 2424 (2019) - [j38]Yang Song, Chen Wu, Sencun Zhu, Haining Wang:
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. EAI Endorsed Trans. Security Safety 5(18): e3 (2019) - [j37]Xiaolei Wang, Yuexiang Yang, Sencun Zhu:
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution. IEEE Trans. Mob. Comput. 18(12): 2768-2782 (2019) - [c109]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge. Blockchain 2019: 552-555 - [c108]Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. Internet Measurement Conference 2019: 230-244 - [c107]Hao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra:
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. INFOCOM 2019: 2089-2097 - [c106]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. ISC2 2019: 199-204 - [c105]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [c104]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [i5]Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, Sencun Zhu:
A Study on Smart Online Frame Forging Attacks against Video Surveillance System. CoRR abs/1903.03473 (2019) - [i4]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. CoRR abs/1908.09935 (2019) - [i3]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge. CoRR abs/1909.09845 (2019) - 2018
- [j36]Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. Future Gener. Comput. Syst. 89: 402-420 (2018) - [j35]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. EAI Endorsed Trans. Security Safety 4(13): e1 (2018) - [j34]Chu Huang, Sencun Zhu, Yi Yang:
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. EAI Endorsed Trans. Security Safety 4(13): e4 (2018) - [c103]Youssef Khazbak, Jingyao Fan, Sencun Zhu, Guohong Cao:
Preserving Location Privacy in Ride-Hailing Service. CNS 2018: 1-9 - [c102]Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini:
Server-Based Manipulation Attacks Against Machine Learning Models. CODASPY 2018: 24-34 - [c101]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c100]Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. WISEC 2018: 248-259 - [e6]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8 [contents] - [e5]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018, ISBN 978-3-319-78815-9 [contents] - [e4]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e3]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i2]Cong Liao, Haoti Zhong, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CoRR abs/1808.10307 (2018) - 2017
- [j33]Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He:
A software assignment algorithm for minimizing worm damage in networked systems. J. Inf. Secur. Appl. 35: 55-67 (2017) - [j32]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. EAI Endorsed Trans. Security Safety 4(12): e1 (2017) - [j31]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [c99]Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang:
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. ACSAC 2017: 350-361 - [c98]Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang:
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. AsiaCCS 2017: 58-70 - [c97]Chuangang Ren, Peng Liu, Sencun Zhu:
WindowGuard: Systematic Protection of GUI Security in Android. NDSS 2017 - [c96]Xin Chen, Heqing Huang, Sencun Zhu, Qing Li, Quanlong Guan:
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS. WPES@CCS 2017: 75-86 - [e2]Giovanni Livraga, Sencun Zhu:
Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10359, Springer 2017, ISBN 978-3-319-61175-4 [contents] - [i1]Hao Fu, Zizhan Zheng, Sencun Zhu, Pransant Mohapatra:
INSPIRED: Intention-based Privacy-preserving Permission Model. CoRR abs/1709.06654 (2017) - 2016
- [j30]Yi Yang, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: A software diversity approach. Ad Hoc Networks 47: 26-40 (2016) - [j29]Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c95]Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang:
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. ACSAC 2016: 374-385 - [c94]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Suresh Chari, Ce Zhang:
Android malware development on public malware scanning platforms: A large-scale data-driven study. IEEE BigData 2016: 1090-1099 - [c93]Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. DSN 2016: 550-561 - [c92]Quanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu:
Semantics-Based Repackaging Detection for Mobile Apps. ESSoS 2016: 89-105 - [c91]Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu:
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. SecureComm 2016: 655-672 - 2015
- [j28]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c90]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c89]Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu:
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. CCS 2015: 1236-1247 - [c88]Chu Huang, Sencun Zhu, Quanlong Guan:
Multi-objective software assignment for active cyber defense. CNS 2015: 299-307 - [c87]Zhi Xu, Sencun Zhu:
SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. CODASPY 2015: 61-72 - [c86]Xin Chen, Sencun Zhu:
DroidJust: automated functionality-aware privacy leakage analysis for Android applications. WISEC 2015: 5:1-5:12 - [c85]Zhen Xie, Sencun Zhu:
AppWatcher: unveiling the underground market of trading mobile app reviews. WISEC 2015: 10:1-10:11 - 2014
- [j27]Tianzhen Cheng, Ping Li, Sencun Zhu, Don J. Torrieri:
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks. Integr. Comput. Aided Eng. 21(1): 19-34 (2014) - [c84]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c83]Chu Huang, Sencun Zhu, Robert F. Erbacher:
Toward Software Diversity in Heterogeneous Networked Systems. DBSec 2014: 114-129 - [c82]Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Program Logic Based Software Plagiarism Detection. ISSRE 2014: 66-77 - [c81]Xin Chen, Jin-Hee Cho, Sencun Zhu:
GlobalTrust: An attack-resilient reputation system for tactical networks. SECON 2014: 275-283 - [c80]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c79]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - [c78]Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - [c77]Zhen Xie, Sencun Zhu:
GroupTie: toward hidden collusion group discovery in app stores. WISEC 2014: 153-164 - 2013
- [j26]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 10(3): 168-182 (2013) - [j25]Yi Yang, Min Shao, Sencun Zhu, Guohong Cao:
Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Networks 9(3): 34:1-34:23 (2013) - [c76]Wei Xu, Fangfang Zhang, Sencun Zhu:
JStill: mostly static detection of obfuscated malicious JavaScript code. CODASPY 2013: 117-128 - [c75]Wei Xu, Fangfang Zhang, Sencun Zhu:
Permlyzer: Analyzing permission usage in Android applications. ISSRE 2013: 400-410 - [c74]Xin Chen, Harshal Patankar, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks. SECON 2013: 131-139 - [c73]Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou:
Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness. SocialCom 2013: 196-203 - [c72]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186 - [c71]Ying Chen, Heng Xu, Yilu Zhou, Sencun Zhu:
Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications. WWW 2013: 201-212 - [p1]Don J. Torrieri, Sencun Zhu, Sushil Jajodia:
Cyber Maneuver Against External Adversaries and Compromised Nodes. Moving Target Defense 2013: 87-96 - 2012
- [j24]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10(8): 1619-1632 (2012) - [j23]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [c70]Vivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks. AINA 2012: 376-383 - [c69]Tianzhen Cheng, Ping Li, Sencun Zhu:
An Algorithm for Jammer Localization in Wireless Sensor Networks. AINA 2012: 724-731 - [c68]Chu Huang, Sencun Zhu, Dinghao Wu:
Towards Trusted Services: Result Verification Schemes for MapReduce. CCGRID 2012: 41-48 - [c67]Vivek Natarajan, Yi Yang, Sencun Zhu:
Secure Trust Metadata Management for Mobile Ad-Hoc Networks. ICISS 2012: 164-180 - [c66]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu:
A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121 - [c65]