Sencun Zhu

    • Source: SciVal
    • Calculated based on no. of publications stored in Pure and citations from Scopus
    19962021

    Research activity per year

    If you made any changes in Pure these will be visible here soon.

    Search results

    • Conference contribution

      GroupTie: Toward hidden collusion group discovery in app stores

      Xie, Z. & Zhu, S., 2014, WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 153-164 12 p. (WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      18 Scopus citations
    • Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems

      Qiao, Q., He, D., Gao, Y., Zhu, S., Gao, J. & Chan, S., Jun 2020, 2020 17th IEEE International Conference on Sensing, Communication and Networking, SECON 2020. IEEE Computer Society, 9158421. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Improving sensor network immunity under worm attacks: A software diversity approach

      Yang, Y., Zhu, S. & Cao, G., 2008, Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008, MobiHoc'08. p. 149-158 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      52 Scopus citations
    • IRyP: A purely edge-based visual privacy-respecting system for mobile cameras

      Sun, Y., Chen, S., Zhu, S. & Chen, Y., Jul 8 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 195-206 12 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Is this app safe for children? A comparison study of maturity ratings on android and iOS applications

      Chen, Y., Xu, H., Zhou, Y. & Zhu, S., Dec 1 2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. p. 201-211 11 p. (WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      27 Scopus citations
    • JStill: Mostly static detection of obfuscated malicious javascript code

      Xu, W., Zhang, F. & Zhu, S., Mar 18 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 117-128 12 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      46 Scopus citations
    • Keeping Context in Mind: Automating Mobile App Access Control with User Interface Inspection

      Fu, H., Zheng, Z., Zhu, S. & Mohapatra, P., Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2089-2097 9 p. 8737510. (Proceedings - IEEE INFOCOM; vol. 2019-April).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks

      Zhu, S., Xu, S., Setia, S. & Jajodia, S., 2003, Proceedings - 23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003. Institute of Electrical and Electronics Engineers Inc., p. 749-755 7 p. 1203642. (Proceedings - 23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      81 Scopus citations
    • Message dropping attacks in overlay networks: Attack detection and attacker identification

      Xie, L. & Zhu, S., 2006, 2006 Securecomm and Workshops. 4198794. (2006 Securecomm and Workshops).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Mirroring smartphones for good: A feasibility study

      Zhao, B., Xu, Z., Chi, C., Zhu, S. & Cao, G., 2012, Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers. Springer Verlag, p. 26-38 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 73 LNICST).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      19 Scopus citations
    • Multi-jammer localization in wireless sensor networks

      Cheng, T., Li, P. & Zhu, S., Dec 1 2011, Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011. p. 736-740 5 p. 6128223. (Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • Multi-objective software assignment for active cyber defense

      Huang, C., Zhu, S. & Guan, Q., Dec 3 2015, 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 299-307 9 p. 7346840. (2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • No peeking through my windows: Conserving privacy in personal drones

      Fitwi, A., Chen, Y. & Zhu, S., Oct 2019, 5th IEEE International Smart Cities Conference, ISC2 2019. Institute of Electrical and Electronics Engineers Inc., p. 199-204 6 p. 9071765. (5th IEEE International Smart Cities Conference, ISC2 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • On the effectiveness of internal patching against file-sharing worms

      Xie, L., Song, H. & Zhu, S., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • PBMDS: A behavior-based malware detection system for cellphone devices

      Xie, L., Zhang, X., Seifert, J. P. & Zhu, S., May 21 2010, WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security. p. 37-48 12 p. (WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      102 Scopus citations
    • PDCS: Security and privacy support for data-centric sensor networks

      Shao, M., Zhu, S., Zhang, W. & Cao, G., 2007, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications. p. 1298-1306 9 p. 4215736. (Proceedings - IEEE INFOCOM).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      54 Scopus citations
    • Permlyzer: Analyzing permission usage in Android applications

      Xu, W., Zhang, F. & Zhu, S., 2013, 2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013. p. 400-410 11 p. 6698893. (2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      45 Scopus citations
    • Poster abstract: LEAP - Efficient security mechanisms for large-scale distributed sensor networks

      Zhu, S., Setia, S. & Jajodia, S., Dec 1 2003, SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems. p. 308-309 2 p. (SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • Practical broadcast authentication in sensor networks

      Liu, D., Ning, P., Zhu, S. & Jajodia, S., Dec 1 2005, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services. p. 118-129 12 p. 1540993. (MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      124 Scopus citations
    • Preserving location privacy in ride-hailing service

      Khazbak, Y., Fan, J., Zhu, S. & Cao, G., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433221. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service

      Fitwi, A., Chen, Y. & Zhu, S., Dec 2020, Proceedings - 2020 IEEE 6th International Conference on Collaboration and Internet Computing, CIC 2020. Institute of Electrical and Electronics Engineers Inc., p. 125-134 10 p. 9319016. (Proceedings - 2020 IEEE 6th International Conference on Collaboration and Internet Computing, CIC 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Protecting mobile devices from physical memory attacks with targeted encryption

      Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      3 Scopus citations
    • Protecting web services from remote exploit code: A static analysis approach

      Wang, X., Jhi, Y. C., Zhu, S. & Liu, P., Dec 15 2008, Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. p. 1139-1140 2 p. (Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Rassurer les parents sur le respect de la vie privée de leurs enfants: Une étude de conception prenant en considération les valeurs éthiques

      Xu, H., Irani, N., Zhu, S. & Xu, W., 2008, ICIS 2008 Proceedings - Twenty Ninth International Conference on Information Systems.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs

      Yuan, L. P., Liu, P. & Zhu, S., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 336-348 13 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      1 Scopus citations
    • Repackage-proofing android apps

      Luo, L., Fu, Y., Wu, D., Zhu, S. & Liu, P., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 550-561 12 p. 7579771. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      16 Scopus citations
    • Replacement attacks on behavior based software birthmark

      Xin, Z., Chen, H., Wang, X., Liu, P., Zhu, S., Mao, B. & Xie, L., Oct 26 2011, Information Security - 14th International Conference, ISC 2011, Proceedings. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7001 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • Resource-misuse attack detection in delay-tolerant networks

      Natarajan, V., Yang, Y. & Zhu, S., 2011, 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011. 6108092. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      19 Scopus citations
    • Routing in socially selfish delay tolerant networks

      Li, Q., Zhu, S. & Cao, G., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462138. (Proceedings - IEEE INFOCOM).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      277 Scopus citations
    • SAS: Semantics aware signature generation for polymorphic worm detection

      Kong, D., Jhi, Y. C., Gong, T., Zhu, S., Liu, P. & Xi, H., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 1-19 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • SDAP: A Secure hop-by-hop Data Aggregation Protocol for sensor networks

      Yang, Y., Wang, X., Zhu, S. & Cao, G., Sep 4 2006, Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006. p. 356-367 12 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2006).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      193 Scopus citations
    • Secure trust metadata management for mobile ad-hoc networks

      Natarajan, V., Yang, Y. & Zhu, S., 2012, Information Systems Security - 8th International Conference, ICISS 2012, Proceedings. p. 164-180 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7671 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Self-healing wireless networks under insider jamming attacks

      Li, L., Zhu, S., Torrieri, D. & Jajodia, S., Dec 23 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 220-228 9 p. 6997489. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • SemaDroid: A privacy-aware sensor management framework for smartphones

      Xu, Z. & Zhu, S., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 61-72 12 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      41 Scopus citations
    • Semantics-aware storage and replication of trust metadata in mobile ad-hoc networks

      Natarajan, V., Zhu, S., Srivatsa, M. & Opper, J., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 376-383 8 p. 6184895. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

      Luo, L., Ming, J., Wu, D., Liu, P. & Zhu, S., Nov 16 2014, 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2014 - Proceedings. Association for Computing Machinery, p. 389-400 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 16-21-November-2014).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      115 Scopus citations
    • Semantics-based repackaging detection for mobile apps

      Guan, Q., Huang, H., Luo, W. & Zhu, S., 2016, Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, Proceedings. Bodden, E., Caballero, J. & Athanasopoulos, E. (eds.). Springer Verlag, p. 89-105 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9639).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      15 Scopus citations
    • Sensor node compromise detection: The location perspective

      Song, H., Xie, L., Zhu, S. & Cao, G., Dec 14 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 242-247 6 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      51 Scopus citations
    • Server-based manipulation attacks against machine learning models

      Liao, C., Zhu, S., Zhong, H. & Squicciarini, A., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 2-34 33 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • SET: Detecting node clones in sensor networks

      Choi, H., Zhu, S. & Porta, T. F. L., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 341-350 10 p. 4550353. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      134 Scopus citations
    • SVATS: A sensor-network-based vehicle anti-theft system

      Song, H., Zhu, S. & Cao, G., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 171-175 5 p. 4509874. (Proceedings - IEEE INFOCOM).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      34 Scopus citations
    • Sweetdroid: Toward a context-sensitive privacy policy enforcement framework for android os

      Chen, X., Huang, H., Zhu, S., Li, Q. & Guan, Q., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 75-86 12 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • TapLogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors

      Xu, Z., Bai, K. & Zhu, S., 2012, WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 113-124 12 p. (WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      239 Scopus citations
    • The power of obfuscation techniques in malicious JavaScript code: A measurement study

      Xu, W., Zhang, F. & Zhu, S., Dec 1 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 9-16 8 p. 6461002. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      49 Scopus citations
    • Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users

      Yuan, L. P., Choo, E., Yu, T., Khalil, I. & Zhu, S., Jun 2021, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021. Institute of Electrical and Electronics Engineers Inc., p. 250-262 13 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems

      Liu, X., He, D., Gao, Y., Zhu, S. & Chan, S., Sep 2020, Proceedings - 2020 International Symposium on Reliable Distributed Systems, SRDS 2020. IEEE Computer Society, p. 205-214 10 p. 9252065. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2020-September).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Toward detecting collusive ranking manipulation attackers in mobile app markets

      Chen, H., He, D., Zhu, S. & Yang, J., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 58-70 13 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      19 Scopus citations
    • Towards event source unobservability with minimum network traffic in sensor networks

      Yang, Y., Shao, M., Zhu, S., Urgaonkar, B. & Cao, G., Dec 1 2008, WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security. p. 77-88 12 p. (WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      156 Scopus citations
    • Towards large-scale hunting for Android negative-day malware

      Yuan, L. P., Hu, W., Yu, T., Liu, P. & Zhu, S., 2019, RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 533-545 13 p. (RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations
    • Toward software diversity in heterogeneous networked systems

      Huang, C., Zhu, S. & Erbacher, R., 2014, Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Proceedings. Springer Verlag, p. 114-129 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations