Sencun Zhu focuses on Computer network, Wireless sensor network, Distributed computing, Key distribution in wireless sensor networks and Computer security. The concepts of his Computer network study are interwoven with issues in Wireless ad hoc network and Probabilistic logic. His Wireless sensor network research is multidisciplinary, incorporating perspectives in Cryptography, Network topology, Authentication, Base station and Robustness.
His biological study spans a wide range of topics, including Node, Tree traversal, Pseudorandom number generator and Public-key cryptography. Sencun Zhu combines subjects such as Key management and Adversary with his study of Key distribution in wireless sensor networks. In his research, Compiler, Optimizing compiler, Evasion, Component-based software engineering and Hidden Markov model is intimately related to System call, which falls under the overarching field of Computer security.
His primary areas of study are Computer network, Computer security, Wireless sensor network, Android and Distributed computing. Many of his studies involve connections with topics such as Wireless ad hoc network and Computer network. His work in Computer security tackles topics such as Software which are related to areas like Plagiarism detection and System call.
His Wireless sensor network study also includes fields such as
His study on Enhanced Data Rates for GSM Evolution also encompasses disciplines like
His Private information retrieval research includes themes of Security analysis, Cryptocurrency, Attack surface and Threat model. Sencun Zhu interconnects Android malware, Malware, False positive rate, Fuzz testing and Personally identifiable information in the investigation of issues within Mobile computing. Sencun Zhu usually deals with Personally identifiable information and limits it to topics linked to Analytics and Server, Software deployment, Information privacy and Enhanced Data Rates for GSM Evolution.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)
Routing in Socially Selfish Delay Tolerant Networks
Qinghua Li;Sencun Zhu;Guohong Cao.
international conference on computer communications (2010)
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Yi Yang;Xinran Wang;Sencun Zhu;Guohong Cao.
ACM Transactions on Information and System Security (2008)
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety
Ying Chen;Yilu Zhou;Sencun Zhu;Heng Xu.
privacy security risk and trust (2012)
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
Sencun Zhu;Shouhuai Xu;Sanjeev Setia;Sushil Jajodia.
international conference on network protocols (2003)
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Zhi Xu;Kun Bai;Sencun Zhu.
wireless network security (2012)
Towards statistically strong source anonymity for sensor networks
Yi Yang;Min Shao;Sencun Zhu;Guohong Cao.
ACM Transactions on Sensor Networks (2013)
SET: Detecting node clones in sensor networks
Heesook Choi;Sencun Zhu;Thomas F. La Porta.
international workshop on security (2007)
Towards Statistically Strong Source Anonymity for Sensor Networks
Min Shao;Yi Yang;Sencun Zhu;Guohong Cao.
international conference on computer communications (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: