2009 | ||
---|---|---|
52 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Behavior based software theft detection. ACM Conference on Computer and Communications Security 2009: 280-290 | |
51 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Detecting Software Theft via System Call Based Birthmarks. ACSAC 2009: 149-158 | |
50 | Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci: A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484 | |
49 | Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao: A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. INFOCOM 2009: 2455-2463 | |
48 | Wensheng Zhang, Sencun Zhu, Guohong Cao: Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009) | |
47 | Wensheng Zhang, Sencun Zhu, Guohong Cao: Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009) | |
46 | Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009) | |
2008 | ||
45 | Liang Xie, Hui Song, Sencun Zhu: On the Effectiveness of Internal Patching Against File-Sharing Worms. ACNS 2008: 1-20 | |
44 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 | |
43 | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 | |
42 | Hui Song, Sencun Zhu, Guohong Cao: SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136 | |
41 | Min Shao, Yi Yang, Sencun Zhu, Guohong Cao: Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55 | |
40 | Yi Yang, Sencun Zhu, Guohong Cao: Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158 | |
39 | Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao: Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88 | |
38 | Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 | |
37 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140 | |
36 | Liang Xie, Sencun Zhu: Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
35 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) | |
34 | Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao: Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. TOSN 4(4): (2008) | |
2007 | ||
33 | Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306 | |
32 | Hui Song, Liang Xie, Sencun Zhu, Guohong Cao: Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247 | |
31 | Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao: A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99 | |
30 | Liang Xie, Sencun Zhu: A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Peer-to-Peer Computing 2007: 61-70 | |
29 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230 | |
28 | Hui Song, Sencun Zhu, Guohong Cao: Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007) | |
27 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007) | |
26 | Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta: Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) | |
25 | Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007) | |
24 | Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson: LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. IJSN 2(3/4): 202-215 (2007) | |
23 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007) | |
2006 | ||
22 | Sencun Zhu, Donggang Liu: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006 | |
21 | Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta: Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 | |
20 | Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367 | |
19 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) | |
18 | Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick McDaniel, Mahmut T. Kandemir, Richard R. Brooks: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. IJDSN 2(3): 267-287 (2006) | |
17 | Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) | |
16 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006) | |
15 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006) | |
2005 | ||
14 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 | |
13 | Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao: Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389 | |
12 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 | |
2004 | ||
11 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271 | |
10 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 | |
2003 | ||
9 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72 | |
8 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- | |
7 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- | |
6 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 | |
5 | Sencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10 | |
4 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 | |
3 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 | |
2002 | ||
2 | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 | |
1 | Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002) |