Sencun Zhu focuses on Computer network, Wireless sensor network, Distributed computing, Key distribution in wireless sensor networks and Computer security. The concepts of his Computer network study are interwoven with issues in Wireless ad hoc network and Probabilistic logic. His Wireless sensor network research is multidisciplinary, incorporating perspectives in Cryptography, Network topology, Authentication, Base station and Robustness.
His biological study spans a wide range of topics, including Node, Tree traversal, Pseudorandom number generator and Public-key cryptography. Sencun Zhu combines subjects such as Key management and Adversary with his study of Key distribution in wireless sensor networks. In his research, Compiler, Optimizing compiler, Evasion, Component-based software engineering and Hidden Markov model is intimately related to System call, which falls under the overarching field of Computer security.
His primary areas of study are Computer network, Computer security, Wireless sensor network, Android and Distributed computing. Many of his studies involve connections with topics such as Wireless ad hoc network and Computer network. His work in Computer security tackles topics such as Software which are related to areas like Plagiarism detection and System call.
His Wireless sensor network study also includes fields such as
His primary areas of investigation include Computer security, Android, Enhanced Data Rates for GSM Evolution, Frame and Real-time computing. Sencun Zhu has researched Computer security in several fields, including Scheme, Inference and Fuzz testing. Sencun Zhu has included themes like Private information retrieval, Cryptocurrency, Privacy policy, Attack surface and Mobile computing in his Android study.
His study on Enhanced Data Rates for GSM Evolution also encompasses disciplines like
Computer security, Android, Permission, Drone and Mobile computing are his primary areas of study. Sencun Zhu frequently studies issues relating to Scheme and Computer security. The various areas that he examines in his Android study include World Wide Web, Privacy policy and Private information retrieval.
His Private information retrieval research includes themes of Security analysis, Cryptocurrency, Attack surface and Threat model. Sencun Zhu interconnects Android malware, Malware, False positive rate, Fuzz testing and Personally identifiable information in the investigation of issues within Mobile computing. Sencun Zhu usually deals with Personally identifiable information and limits it to topics linked to Analytics and Server, Software deployment, Information privacy and Enhanced Data Rates for GSM Evolution.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)
Routing in Socially Selfish Delay Tolerant Networks
Qinghua Li;Sencun Zhu;Guohong Cao.
international conference on computer communications (2010)
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Yi Yang;Xinran Wang;Sencun Zhu;Guohong Cao.
ACM Transactions on Information and System Security (2008)
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety
Ying Chen;Yilu Zhou;Sencun Zhu;Heng Xu.
privacy security risk and trust (2012)
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
Sencun Zhu;Shouhuai Xu;Sanjeev Setia;Sushil Jajodia.
international conference on network protocols (2003)
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Zhi Xu;Kun Bai;Sencun Zhu.
wireless network security (2012)
Towards statistically strong source anonymity for sensor networks
Yi Yang;Min Shao;Sencun Zhu;Guohong Cao.
ACM Transactions on Sensor Networks (2013)
SET: Detecting node clones in sensor networks
Heesook Choi;Sencun Zhu;Thomas F. La Porta.
international workshop on security (2007)
Towards Statistically Strong Source Anonymity for Sensor Networks
Min Shao;Yi Yang;Sencun Zhu;Guohong Cao.
international conference on computer communications (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Chinese Academy of Sciences
Pennsylvania State University
George Mason University
East China Normal University
Iowa State University
Sichuan University
University of Colorado Colorado Springs
University of Hong Kong
University of California, Davis
Pennsylvania State University
University of Missouri
Georgia Institute of Technology
University of Leeds
Boston University
National Polytechnic Institute of Toulouse
Khalifa University
Cornell University
University of Canterbury
Chinese Academy of Sciences
University of Washington
French Alternative Energies and Atomic Energy Commission
University of Manchester
The University of Texas MD Anderson Cancer Center
Complutense University of Madrid
University College London
University of Rochester Medical Center