Sencun Zhu
Orcid: 0000-0002-1047-7967Affiliations:
- Pennsylvania State University, University Park, USA
According to our database1,
Sencun Zhu
authored at least 183 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cse.psu.edu
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024
2023
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling.
IEEE Trans. Serv. Comput., 2023
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021
EAI Endorsed Trans. Security Safety, 2021
IEEE Netw., 2021
Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks.
CoRR, 2021
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020
IEEE Netw., 2020
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder.
CoRR, 2020
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
CoRR, 2020
<i>iRyP</i>: a purely edge-based visual privacy-respecting system for mobile cameras.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution.
IEEE Trans. Mob. Comput., 2019
EAI Endorsed Trans. Security Safety, 2019
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
Sensors, 2019
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Netw., 2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.
EAI Endorsed Trans. Security Safety, 2018
Future Gener. Comput. Syst., 2018
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems.
EAI Endorsed Trans. Security Safety, 2017
J. Inf. Secur. Appl., 2017
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016
Ad Hoc Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
You can promote, but you can't hide: large-scale abused app detection in mobile app stores.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
DroidJust: automated functionality-aware privacy leakage analysis for Android applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks.
Integr. Comput. Aided Eng., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Proceedings of the Moving Target Defense II, 2013
ACM Trans. Sens. Networks, 2013
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks.
IEEE Trans. Dependable Secur. Comput., 2013
Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Int. J. Inf. Sec., 2012
Ad Hoc Networks, 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
The power of obfuscation techniques in malicious JavaScript code: A measurement study.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Wirel. Networks, 2011
IEEE Trans. Wirel. Commun., 2011
Int. J. Inf. Sec., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Mob. Comput., 2009
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
Ad Hoc Networks, 2009
Predistribution and local collaboration-based group rekeying for wireless sensor networks.
Ad Hoc Networks, 2009
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
ACM Trans. Sens. Networks, 2008
ACM Trans. Inf. Syst. Secur., 2008
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Towards event source unobservability with minimum network traffic in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation.
Proceedings of the International Conference on Information Systems, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
ACM Trans. Sens. Networks, 2007
IEEE Trans. Mob. Comput., 2007
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network.
Int. J. Secur. Networks, 2007
Comput. Commun., 2007
Ad Hoc Networks, 2007
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007
A random perturbation-based scheme for pairwise key establishment in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
ACM Trans. Sens. Networks, 2006
J. Comput. Secur., 2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006
Int. J. Distributed Sens. Networks, 2006
Ad Hoc Networks, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
2003
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003
Proceedings of the Distributed Computing, 2003
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
2002
A comparative performance analysis of reliable group rekey transport protocols for secure multicast.
Perform. Evaluation, 2002
Proceedings of the Foundations of Information and Knowledge Systems, 2002
1996
Stimulator for real time control of paralyzed muscles during functional electrical stimulation.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996