


default search action
Sencun Zhu
- > Home > Persons > Sencun Zhu
Publications
- 2023
- [c122]Chongqi Guan
, Heting Liu
, Guohong Cao
, Sencun Zhu
, Thomas La Porta
:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. WISEC 2023: 49-59 - [i15]Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. CoRR abs/2305.06430 (2023) - 2022
- [c120]Chongqi Guan
, Xianda Chen, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video. CNS 2022: 82-90 - 2018
- [c103]Youssef Khazbak, Jingyao Fan, Sencun Zhu, Guohong Cao:
Preserving Location Privacy in Ride-Hailing Service. CNS 2018: 1-9 - 2016
- [j30]Yi Yang
, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: A software diversity approach. Ad Hoc Networks 47: 26-40 (2016) - 2013
- [j26]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 10(3): 168-182 (2013) - [j25]Yi Yang, Min Shao, Sencun Zhu, Guohong Cao:
Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Networks 9(3): 34:1-34:23 (2013) - 2012
- [j24]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10(8): 1619-1632 (2012) - 2011
- [j20]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-resilient anti-jamming communication in wireless sensor networks. Wirel. Networks 17(6): 1513-1527 (2011) - 2010
- [c50]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-Resilient Anti-jamming for Wireless Sensor Networks. ICICS 2010: 140-154 - [c49]Qinghua Li, Sencun Zhu, Guohong Cao:
Routing in Socially Selfish Delay Tolerant Networks. INFOCOM 2010: 857-865 - [c47]Bo Zhao, Zhi Xu, Caixia Chi, Sencun Zhu, Guohong Cao:
Mirroring Smartphones for Good: A Feasibility Study. MobiQuitous 2010: 26-38 - 2009
- [j18]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009) - [j17]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009) - [j16]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009) - [c42]Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484 - [c41]Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao:
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. INFOCOM 2009: 2455-2463 - [c40]Min Shao, Wenhui Hu, Sencun Zhu, Guohong Cao, Srikanth V. Krishnamurthy
, Tom La Porta:
Cross-layer Enhanced Source Location Privacy in Sensor Networks. SECON 2009: 1-9 - [c39]Yi Yang, Sencun Zhu, Guohong Cao, Thomas La Porta:
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. SecureComm 2009: 373-393 - 2008
- [j14]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 18:1-18:43 (2008) - [j13]Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao:
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sens. Networks 4(4): 23:1-23:34 (2008) - [c33]Min Shao, Yi Yang, Sencun Zhu, Guohong Cao:
Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55 - [c32]Hui Song, Sencun Zhu, Guohong Cao:
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136 - [c31]Yi Yang, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158 - [c30]Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra:
A cross-layer dropping attack in video streaming over ad hoc networks. SecureComm 2008: 25 - [c29]Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao:
Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88 - 2007
- [j12]Hui Song, Sencun Zhu, Guohong Cao:
Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007) - [j8]Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) - [c26]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306 - [c25]Hui Song, Liang Xie, Sencun Zhu, Guohong Cao:
Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247 - [c24]Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao:
A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99 - [c21]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230 - 2006
- [c20]Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 - [c19]Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367 - 2005
- [c14]Hui Song, Sencun Zhu, Guohong Cao:
Attack-resilient time synchronization for wireless sensor networks. MASS 2005 - [c13]Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao:
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-09 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint