H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 56 Citations 16,673 166 World Ranking 2056 National Ranking 1143


What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Sencun Zhu focuses on Computer network, Wireless sensor network, Distributed computing, Key distribution in wireless sensor networks and Computer security. The concepts of his Computer network study are interwoven with issues in Wireless ad hoc network and Probabilistic logic. His Wireless sensor network research is multidisciplinary, incorporating perspectives in Cryptography, Network topology, Authentication, Base station and Robustness.

His biological study spans a wide range of topics, including Node, Tree traversal, Pseudorandom number generator and Public-key cryptography. Sencun Zhu combines subjects such as Key management and Adversary with his study of Key distribution in wireless sensor networks. In his research, Compiler, Optimizing compiler, Evasion, Component-based software engineering and Hidden Markov model is intimately related to System call, which falls under the overarching field of Computer security.

His most cited work include:

  • LEAP: efficient security mechanisms for large-scale distributed sensor networks (1084 citations)
  • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks (583 citations)
  • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks (532 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Wireless sensor network, Android and Distributed computing. Many of his studies involve connections with topics such as Wireless ad hoc network and Computer network. His work in Computer security tackles topics such as Software which are related to areas like Plagiarism detection and System call.

His Wireless sensor network study also includes fields such as

  • Key distribution in wireless sensor networks together with Overhead,
  • Authentication protocol most often made with reference to Key management. His work deals with themes such as Private information retrieval, World Wide Web, Mobile computing and Internet privacy, which intersect with Android. His Distributed computing research is multidisciplinary, incorporating elements of Scalability and Key distribution.

He most often published in these fields:

  • Computer network (43.15%)
  • Computer security (36.04%)
  • Wireless sensor network (20.81%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (36.04%)
  • Android (14.21%)
  • Enhanced Data Rates for GSM Evolution (3.55%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Android, Enhanced Data Rates for GSM Evolution, Frame and Real-time computing. Sencun Zhu has researched Computer security in several fields, including Scheme, Inference and Fuzz testing. Sencun Zhu has included themes like Private information retrieval, Cryptocurrency, Privacy policy, Attack surface and Mobile computing in his Android study.

His study on Enhanced Data Rates for GSM Evolution also encompasses disciplines like

  • Edge device and related Internet privacy,
  • Anonymity which connect with Scrambling and Motion detector,
  • Convolutional neural network which is related to area like Adversary, Adversarial machine learning, Backdoor and Deep learning. His research integrates issues of Intrusion detection system and Edge computing in his study of Real-time computing. His study in Software is interdisciplinary in nature, drawing from both Privilege, User interface, Transmission, Interface and Computer network.

Between 2018 and 2021, his most popular works were:

  • Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem (42 citations)
  • Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation (20 citations)
  • A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles (14 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Computer security, Android, Permission, Drone and Mobile computing are his primary areas of study. Sencun Zhu frequently studies issues relating to Scheme and Computer security. The various areas that he examines in his Android study include World Wide Web, Privacy policy and Private information retrieval.

His Private information retrieval research includes themes of Security analysis, Cryptocurrency, Attack surface and Threat model. Sencun Zhu interconnects Android malware, Malware, False positive rate, Fuzz testing and Personally identifiable information in the investigation of issues within Mobile computing. Sencun Zhu usually deals with Personally identifiable information and limits it to topics linked to Analytics and Server, Software deployment, Information privacy and Enhanced Data Rates for GSM Evolution.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

LEAP+: Efficient security mechanisms for large-scale distributed sensor networks

Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)

2527 Citations

An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)

781 Citations

Routing in Socially Selfish Delay Tolerant Networks

Qinghua Li;Sencun Zhu;Guohong Cao.
international conference on computer communications (2010)

643 Citations

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks

Yi Yang;Xinran Wang;Sencun Zhu;Guohong Cao.
ACM Transactions on Information and System Security (2008)

581 Citations

Detecting Offensive Language in Social Media to Protect Adolescent Online Safety

Ying Chen;Yilu Zhou;Sencun Zhu;Heng Xu.
privacy security risk and trust (2012)

492 Citations

Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach

Sencun Zhu;Shouhuai Xu;Sanjeev Setia;Sushil Jajodia.
international conference on network protocols (2003)

465 Citations

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors

Zhi Xu;Kun Bai;Sencun Zhu.
wireless network security (2012)

398 Citations

Towards statistically strong source anonymity for sensor networks

Yi Yang;Min Shao;Sencun Zhu;Guohong Cao.
ACM Transactions on Sensor Networks (2013)

301 Citations

Towards Statistically Strong Source Anonymity for Sensor Networks

Min Shao;Yi Yang;Sencun Zhu;Guohong Cao.
international conference on computer communications (2008)

273 Citations

SET: Detecting node clones in sensor networks

Heesook Choi;Sencun Zhu;Thomas F. La Porta.
international workshop on security (2007)

270 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Sencun Zhu

Yang Xiao

Yang Xiao

University of Alabama

Publications: 36

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 33

Guohong Cao

Guohong Cao

Pennsylvania State University

Publications: 32

Mauro Conti

Mauro Conti

University of Padua

Publications: 31

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 30

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 29

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 28

Peng Ning

Peng Ning

Google (United States)

Publications: 25

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 23

Kui Ren

Kui Ren

Zhejiang University

Publications: 23

Jie Wu

Jie Wu

Temple University

Publications: 23

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 23

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 23

Sajal K. Das

Sajal K. Das

Missouri University of Science and Technology

Publications: 21

Wei Wang

Wei Wang

Beijing Jiaotong University

Publications: 20

Something went wrong. Please try again later.