| 2009 | ||
|---|---|---|
| 52 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290 | |
| 51 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158 | |
| 50 | Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci: A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484 | |
| 49 | Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao: A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. INFOCOM 2009: 2455-2463 | |
| 48 | Wensheng Zhang, Sencun Zhu, Guohong Cao: Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009) | |
| 47 | Wensheng Zhang, Sencun Zhu, Guohong Cao: Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009) | |
| 46 | Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009) | |
| 2008 | ||
| 45 | Liang Xie, Hui Song, Sencun Zhu: On the Effectiveness of Internal Patching Against File-Sharing Worms. ACNS 2008: 1-20 | |
| 44 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 | |
| 43 | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 | |
| 42 | Hui Song, Sencun Zhu, Guohong Cao: SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136 | |
| 41 | Min Shao, Yi Yang, Sencun Zhu, Guohong Cao: Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55 | |
| 40 | Yi Yang, Sencun Zhu, Guohong Cao: Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158 | |
| 39 | Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao: Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88 | |
| 38 | Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 | |
| 37 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140 | |
| 36 | Liang Xie, Sencun Zhu: Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
| 35 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) | |
| 34 | Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao: Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. TOSN 4(4): (2008) | |
| 2007 | ||
| 33 | Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306 | |
| 32 | Hui Song, Liang Xie, Sencun Zhu, Guohong Cao: Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247 | |
| 31 | Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao: A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99 | |
| 30 | Liang Xie, Sencun Zhu: A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Peer-to-Peer Computing 2007: 61-70 | |
| 29 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230 | |
| 28 | Hui Song, Sencun Zhu, Guohong Cao: Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007) | |
| 27 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007) | |
| 26 | Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta: Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) | |
| 25 | Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007) | |
| 24 | Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson: LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. IJSN 2(3/4): 202-215 (2007) | |
| 23 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007) | |
| 2006 | ||
| 22 | Sencun Zhu, Donggang Liu: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006 | |
| 21 | Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta: Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 | |
| 20 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367 | |
| 19 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) | |
| 18 | Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick McDaniel, Mahmut T. Kandemir, Richard R. Brooks: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. IJDSN 2(3): 267-287 (2006) | |
| 17 | Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) | |
| 16 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006) | |
| 15 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006) | |
| 2005 | ||
| 14 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 | |
| 13 | Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao: Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389 | |
| 12 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 | |
| 2004 | ||
| 11 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271 | |
| 10 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 | |
| 2003 | ||
| 9 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72 | |
| 8 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- | |
| 7 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- | |
| 6 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 | |
| 5 | Sencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10 | |
| 4 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 | |
| 3 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 | |
| 2002 | ||
| 2 | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 | |
| 1 | Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002) | |