D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 14,570 192 World Ranking 2529 National Ranking 1353

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Sencun Zhu focuses on Computer network, Wireless sensor network, Distributed computing, Key distribution in wireless sensor networks and Computer security. The concepts of his Computer network study are interwoven with issues in Wireless ad hoc network and Probabilistic logic. His Wireless sensor network research is multidisciplinary, incorporating perspectives in Cryptography, Network topology, Authentication, Base station and Robustness.

His biological study spans a wide range of topics, including Node, Tree traversal, Pseudorandom number generator and Public-key cryptography. Sencun Zhu combines subjects such as Key management and Adversary with his study of Key distribution in wireless sensor networks. In his research, Compiler, Optimizing compiler, Evasion, Component-based software engineering and Hidden Markov model is intimately related to System call, which falls under the overarching field of Computer security.

His most cited work include:

  • LEAP: efficient security mechanisms for large-scale distributed sensor networks (1084 citations)
  • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks (583 citations)
  • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks (532 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Wireless sensor network, Android and Distributed computing. Many of his studies involve connections with topics such as Wireless ad hoc network and Computer network. His work in Computer security tackles topics such as Software which are related to areas like Plagiarism detection and System call.

His Wireless sensor network study also includes fields such as

  • Key distribution in wireless sensor networks together with Overhead,
  • Authentication protocol most often made with reference to Key management. His work deals with themes such as Private information retrieval, World Wide Web, Mobile computing and Internet privacy, which intersect with Android. His Distributed computing research is multidisciplinary, incorporating elements of Scalability and Key distribution.

He most often published in these fields:

  • Computer network (43.15%)
  • Computer security (36.04%)
  • Wireless sensor network (20.81%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (36.04%)
  • Android (14.21%)
  • Enhanced Data Rates for GSM Evolution (3.55%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Android, Enhanced Data Rates for GSM Evolution, Frame and Real-time computing. Sencun Zhu has researched Computer security in several fields, including Scheme, Inference and Fuzz testing. Sencun Zhu has included themes like Private information retrieval, Cryptocurrency, Privacy policy, Attack surface and Mobile computing in his Android study.

His study on Enhanced Data Rates for GSM Evolution also encompasses disciplines like

  • Edge device and related Internet privacy,
  • Anonymity which connect with Scrambling and Motion detector,
  • Convolutional neural network which is related to area like Adversary, Adversarial machine learning, Backdoor and Deep learning. His research integrates issues of Intrusion detection system and Edge computing in his study of Real-time computing. His study in Software is interdisciplinary in nature, drawing from both Privilege, User interface, Transmission, Interface and Computer network.

Between 2018 and 2021, his most popular works were:

  • Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem (42 citations)
  • Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation (20 citations)
  • A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles (14 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Computer security, Android, Permission, Drone and Mobile computing are his primary areas of study. Sencun Zhu frequently studies issues relating to Scheme and Computer security. The various areas that he examines in his Android study include World Wide Web, Privacy policy and Private information retrieval.

His Private information retrieval research includes themes of Security analysis, Cryptocurrency, Attack surface and Threat model. Sencun Zhu interconnects Android malware, Malware, False positive rate, Fuzz testing and Personally identifiable information in the investigation of issues within Mobile computing. Sencun Zhu usually deals with Personally identifiable information and limits it to topics linked to Analytics and Server, Software deployment, Information privacy and Enhanced Data Rates for GSM Evolution.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

LEAP+: Efficient security mechanisms for large-scale distributed sensor networks

Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)

2719 Citations

An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)

821 Citations

Routing in Socially Selfish Delay Tolerant Networks

Qinghua Li;Sencun Zhu;Guohong Cao.
international conference on computer communications (2010)

687 Citations

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks

Yi Yang;Xinran Wang;Sencun Zhu;Guohong Cao.
ACM Transactions on Information and System Security (2008)

628 Citations

Detecting Offensive Language in Social Media to Protect Adolescent Online Safety

Ying Chen;Yilu Zhou;Sencun Zhu;Heng Xu.
privacy security risk and trust (2012)

592 Citations

Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach

Sencun Zhu;Shouhuai Xu;Sanjeev Setia;Sushil Jajodia.
international conference on network protocols (2003)

487 Citations

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors

Zhi Xu;Kun Bai;Sencun Zhu.
wireless network security (2012)

426 Citations

Towards statistically strong source anonymity for sensor networks

Yi Yang;Min Shao;Sencun Zhu;Guohong Cao.
ACM Transactions on Sensor Networks (2013)

321 Citations

SET: Detecting node clones in sensor networks

Heesook Choi;Sencun Zhu;Thomas F. La Porta.
international workshop on security (2007)

275 Citations

Towards Statistically Strong Source Anonymity for Sensor Networks

Min Shao;Yi Yang;Sencun Zhu;Guohong Cao.
international conference on computer communications (2008)

274 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Sencun Zhu

Yang Xiao

Yang Xiao

University of Alabama

Publications: 36

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 33

Guohong Cao

Guohong Cao

Pennsylvania State University

Publications: 32

Mauro Conti

Mauro Conti

University of Padua

Publications: 31

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 30

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 29

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 28

Peng Ning

Peng Ning

Google (United States)

Publications: 25

Kui Ren

Kui Ren

Zhejiang University

Publications: 23

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 23

Jie Wu

Jie Wu

Temple University

Publications: 23

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 23

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 23

Sajal K. Das

Sajal K. Das

Missouri University of Science and Technology

Publications: 21

Sy-Yen Kuo

Sy-Yen Kuo

National Taiwan University

Publications: 20

Ing-Ray Chen

Ing-Ray Chen

Virginia Tech

Publications: 20

Trending Scientists

K. C. Ho

K. C. Ho

University of Missouri

Ajay K. Kohli

Ajay K. Kohli

Georgia Institute of Technology

Jaafar M. H. Elmirghani

Jaafar M. H. Elmirghani

University of Leeds

Christos G. Cassandras

Christos G. Cassandras

Boston University

Philippe Serp

Philippe Serp

National Polytechnic Institute of Toulouse

Vinay Gupta

Vinay Gupta

Khalifa University

Todd Evans

Todd Evans

Cornell University

David R. Schiel

David R. Schiel

University of Canterbury

Le Kang

Le Kang

Chinese Academy of Sciences

Earl W. Davie

Earl W. Davie

University of Washington

Nathalie Rouas-Freiss

Nathalie Rouas-Freiss

French Alternative Energies and Atomic Energy Commission

Anthony Howell

Anthony Howell

University of Manchester

Steven A. Curley

Steven A. Curley

The University of Texas MD Anderson Cancer Center

Mariano Sanz

Mariano Sanz

Complutense University of Madrid

James Thomas

James Thomas

University College London

Jeffrey M. Lyness

Jeffrey M. Lyness

University of Rochester Medical Center

Something went wrong. Please try again later.