Sencun Zhu Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci: A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao: A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. INFOCOM 2009: 2455-2463
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWensheng Zhang, Sencun Zhu, Guohong Cao: Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009)
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWensheng Zhang, Sencun Zhu, Guohong Cao: Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009)
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMin Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009)
2008
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Xie, Hui Song, Sencun Zhu: On the Effectiveness of Internal Patching Against File-Sharing Worms. ACNS 2008: 1-20
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHui Song, Sencun Zhu, Guohong Cao: SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMin Shao, Yi Yang, Sencun Zhu, Guohong Cao: Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi Yang, Sencun Zhu, Guohong Cao: Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao: Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Xie, Sencun Zhu: Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao: Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. TOSN 4(4): (2008)
2007
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMin Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHui Song, Liang Xie, Sencun Zhu, Guohong Cao: Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao: A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Xie, Sencun Zhu: A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Peer-to-Peer Computing 2007: 61-70
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHui Song, Sencun Zhu, Guohong Cao: Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007)
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPatrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta: Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007)
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007)
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHung-Yuan Hsu, Sencun Zhu, Ali R. Hurson: LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. IJSN 2(3/4): 202-215 (2007)
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007)
2006
22no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Donggang Liu: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPatrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta: Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick McDaniel, Mahmut T. Kandemir, Richard R. Brooks: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. IJDSN 2(3): 267-287 (2006)
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006)
2005
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao: Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
2004
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
2003
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163-
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309
2002
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
1no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002)

Coauthor Index

1Richard R. Brooks [18]
2Guohong Cao [13] [20] [21] [26] [28] [29] [31] [32] [33] [34] [35] [39] [40] [41] [42] [46] [47] [48] [49] [50]
3Caixia Chi [49]
4Heesook Choi [21] [26]
5Chao-Hsien Chu [25]
6Wei Gao [49]
7Qijun Gu [25]
8Hung-Yuan Hsu [24]
9Ali R. Hurson (A. R. Hurson) [24]
10Trent Jaeger [38]
11Sushil Jajodia [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [14] [15] [16] [17] [19] [23] [27]
12Yoon-chan Jhi [37] [44] [51] [52]
13Mahmut T. Kandemir [18]
14Latifur Khan [43]
15Raju Kumar [26]
16Yingjiu Li [2] [17]
17Donggang Liu [12] [14] [22] [27]
18Peng Liu [25] [37] [43] [44] [51] [52]
19Mohammad M. Masud [43]
20Patrick Drew McDaniel (Patrick McDaniel) [18]
21Peng Ning [11] [12] [23]
22Antonio Nucci [50]
23Matthew Pirretti [18]
24Thomas F. La Porta (Tom La Porta) [21] [26]
25Supranamaya Ranjan [50]
26Sanjeev Setia [1] [3] [4] [6] [7] [8] [9] [10] [11] [14] [15] [16] [19] [23] [27]
27Min Shao [33] [39] [41] [46]
28Hui Song [13] [28] [32] [34] [38] [42] [45]
29Bhavani M. Thuraisingham [43]
30Minh Tran [31]
31Patrick Traynor [21] [26]
32Bhuvan Urgaonkar [39]
33Narayanan Vijaykrishnan (Vijaykrishnan Narayanan) [18]
34Lingyu Wang [2]
35Xiaoyang Sean Wang [17]
36Xinran Wang [20] [29] [35] [37] [43] [44] [51] [52]
37Liang Xie [30] [32] [36] [38] [45]
38Shouhuai Xu [6] [7] [10] [16] [19]
39Yi Yang [20] [29] [35] [39] [40] [41] [46]
40Chao Yao [14] [27]
41Wensheng Zhang [13] [31] [33] [34] [46] [47] [48]
42Bo Zhao [49]
43Zhichao Zhu [50]

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)