Sencun Zhu

Orcid: 0000-0002-1047-7967

Affiliations:
  • Pennsylvania State University, University Park, USA


According to our database1, Sencun Zhu authored at least 183 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput., 2024

The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024

2023
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling.
IEEE Trans. Serv. Comput., 2023

Learning to Backdoor Federated Learning.
CoRR, 2023

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2022
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings.
Proc. Priv. Enhancing Technol., 2022

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022

Federated Unlearning with Knowledge Distillation.
CoRR, 2022

Toward Cleansing Backdoored Neural Networks in Federated Learning.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Alexa Skills: Security Vulnerabilities and Countermeasures.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021

A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021

Toward A Network-Assisted Approach for Effective Ransomware Detection.
EAI Endorsed Trans. Security Safety, 2021

Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware.
IEEE Netw., 2021

AppQ: Warm-starting App Recommendation Based on View Graphs.
CoRR, 2021

Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks.
CoRR, 2021

Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Trans. Mob. Comput., 2020

Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Trans. Inf. Forensics Secur., 2020

Editorial.
EAI Endorsed Trans. Security Safety, 2020

A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020

Security Analysis of Cryptocurrency Wallets in Android-Based Applications.
IEEE Netw., 2020

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder.
CoRR, 2020

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020

Mitigating Backdoor Attacks in Federated Learning.
CoRR, 2020

"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
CoRR, 2020

A Network-Assisted Approach for Ransomware Detection.
CoRR, 2020

<i>iRyP</i>: a purely edge-based visual privacy-respecting system for mobile cameras.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution.
IEEE Trans. Mob. Comput., 2019

A Machine Learning Based Approach for Mobile App Rating Manipulation Detection.
EAI Endorsed Trans. Security Safety, 2019

Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
Sensors, 2019

A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Netw., 2019

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

A Study on Smart Online Frame Forging Attacks against Video Surveillance System.
CoRR, 2019

Protecting mobile devices from physical memory attacks with targeted encryption.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Towards Large-Scale Hunting for Android Negative-Day Malware.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

No Peeking through My Windows: Conserving Privacy in Personal Drones.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019

A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Defence Mechanisms for Public Systems.
EAI Endorsed Trans. Security Safety, 2018

An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.
EAI Endorsed Trans. Security Safety, 2018

Android single sign-on security: Issues, taxonomy and directions.
Future Gener. Comput. Syst., 2018

Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Server-Based Manipulation Attacks Against Machine Learning Models.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Preserving Location Privacy in Ride-Hailing Service.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017

Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems.
EAI Endorsed Trans. Security Safety, 2017

A software assignment algorithm for minimizing worm damage in networked systems.
J. Inf. Secur. Appl., 2017

INSPIRED: Intention-based Privacy-preserving Permission Model.
CoRR, 2017

SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

WindowGuard: Systematic Protection of GUI Security in Android.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016

Improving sensor network immunity under worm attacks: A software diversity approach.
Ad Hoc Networks, 2016

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Proceedings of the Security and Privacy in Communication Networks, 2016

Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Repackage-Proofing Android Apps.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

You can promote, but you can't hide: large-scale abused app detection in mobile app stores.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

AppWatcher: unveiling the underground market of trading mobile app reviews.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

DroidJust: automated functionality-aware privacy leakage analysis for Android applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Multi-objective software assignment for active cyber defense.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks.
Integr. Comput. Aided Eng., 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

GroupTie: toward hidden collusion group discovery in app stores.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GlobalTrust: An attack-resilient reputation system for tactical networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Program Logic Based Software Plagiarism Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Toward Software Diversity in Heterogeneous Networked Systems.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Self-healing wireless networks under insider jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Cyber Maneuver Against External Adversaries and Compromised Nodes.
Proceedings of the Moving Target Defense II, 2013

Towards statistically strong source anonymity for sensor networks.
ACM Trans. Sens. Networks, 2013

To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks.
IEEE Trans. Dependable Secur. Comput., 2013

Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications.
Proceedings of the 22nd International World Wide Web Conference, 2013

A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Permlyzer: Analyzing permission usage in Android applications.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

JStill: mostly static detection of obfuscated malicious JavaScript code.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

A routing protocol for socially selfish delay tolerant networks.
Ad Hoc Networks, 2012

Abusing Notification Services on Smartphones for Phishing and Spamming.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Detecting Offensive Language in Social Media to Protect Adolescent Online Safety.
Proceedings of the 2012 International Conference on Privacy, 2012

AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

The power of obfuscation techniques in malicious JavaScript code: A measurement study.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

A first step towards algorithm plagiarism detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Secure Trust Metadata Management for Mobile Ad-Hoc Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Towards Trusted Services: Result Verification Schemes for MapReduce.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

An Algorithm for Jammer Localization in Wireless Sensor Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Sensor Key Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Sensor Code Attestation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Anonymous Routing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Compromise-resilient anti-jamming communication in wireless sensor networks.
Wirel. Networks, 2011

Distributed Access Control with Privacy Support in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

SAS: semantics aware signature generation for polymorphic worm detection.
Int. J. Inf. Sec., 2011

Context-Related Access Control for Mobile Caching.
Proceedings of the Security and Privacy in Communication Networks, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Resource-misuse attack detection in delay-tolerant networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Multi-jammer Localization in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Specification Based Intrusion Detection Framework for Mobile Phones.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
SigFree: A Signature-Free Buffer Overflow Attack Blocker.
IEEE Trans. Dependable Secur. Comput., 2010

pBMDS: a behavior-based malware detection system for cellphone devices.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Mirroring Smartphones for Good: A Feasibility Study.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

VAN: Vehicle-assisted shortest-time path navigation.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Routing in Socially Selfish Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Compromise-Resilient Anti-jamming for Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A hotspot-based protocol for attack traceback in mobile ad hoc networks.
Proceedings of the 5th ACM Symposium on Information, 2010

Toward worm detection in online social networks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

COP: A Step toward Children Online Privacy.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
IEEE Trans. Mob. Comput., 2009

Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
Ad Hoc Networks, 2009

Predistribution and local collaboration-based group rekeying for wireless sensor networks.
Ad Hoc Networks, 2009

Designing System-Level Defenses against Cellphone Malware.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009

Cross-layer Enhanced Source Location Privacy in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Behavior based software theft detection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Detecting Software Theft via System Call Based Birthmarks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
ACM Trans. Sens. Networks, 2008

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
ACM Trans. Inf. Syst. Secur., 2008

A systematic approach for cell-phone worm containment.
Proceedings of the 17th International Conference on World Wide Web, 2008

Protecting web services from remote exploit code: a static analysis approach.
Proceedings of the 17th International Conference on World Wide Web, 2008

Towards event source unobservability with minimum network traffic in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A cross-layer dropping attack in video streaming over ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

SVATS: A Sensor-Network-Based Vehicle Anti-Theft System.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation.
Proceedings of the International Conference on Information Systems, 2008

STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

On the Effectiveness of Internal Patching Against File-Sharing Worms.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
ACM Trans. Sens. Networks, 2007

Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks.
IEEE Trans. Mob. Comput., 2007

LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network.
Int. J. Secur. Networks, 2007

Defence against packet injection in ad hoc networks.
Int. J. Secur. Networks, 2007

Efficient security mechanisms for overlay multicast based content delivery.
Comput. Commun., 2007

Attack-resilient time synchronization for wireless sensor networks.
Ad Hoc Networks, 2007

Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

SET: Detecting node clones in sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

A random perturbation-based scheme for pairwise key establishment in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Sensor node compromise detection: the location perspective.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks.
ACM Trans. Sens. Networks, 2006

GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
J. Comput. Secur., 2006

Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
Int. J. Distributed Sens. Networks, 2006

LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks, 2006

Establishing Pair-Wise Keys in Heterogeneous Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Practical Broadcast Authentication in Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2003
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Scalable Group Rekeying for Secure Multicast: A Survey.
Proceedings of the Distributed Computing, 2003

Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Performance Optimizations for Group Key Management Scheme.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

2002
A comparative performance analysis of reliable group rekey transport protocols for secure multicast.
Perform. Evaluation, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

1996
Stimulator for real time control of paralyzed muscles during functional electrical stimulation.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996


  Loading...