2024:

C. Guan, G. Cao, S. Zhu.
HoneyLLM: Enabling Shell Honeypots with Large Language Models
Proceedings of IEEE Conference on Communications and Network Security (CNS), 202
4.

C. Wu, S. Zhu, P. Mitra, W. Wang.
Unlearning Backdoor Attacks in Federated Learning.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 202
4.

D. He, J. Zhang, H. Li, S. Zhu and S. Chan.
PPTFI: Patch Presence Test for Function-Irrelevant Patches.
Proceedings of The 20th International Conference on Mobility, Sensing and Networking (MSN 2024).

P. Nagasubramaniam, C. Wu, Y. Sun, N. Karamchandani, S. Zhu and Y. He.
Privacy-Preserving Live Video Analytics for Drones via Edge Computing.
Applied Sciences, Special Issue on Advances and Application of Intelligent Video Surveillance Systems: Volume II, 14(22):10254, 2024.

 

2023:

C.Guan, H.Liu, G.Cao, S.Zhu, T.LaPorta.
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices.
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2023.

B. Zhou, D. He, S.Zhu, S.Zhu, S. Chan, and X. Yang.
Password Cracking by Exploiting User Group Information.
19th EAI International Conference on Security and Privacy in Communication Networks (Securecomm), 2023.

C. Wu, S. Zhu and P. Mitra.
Unlearning Backdoor Attacks in Federated Learning.
ICLR Workshop on Backdoor Attacks aNd DefenSes in Machine Learning (BANDS), 2023,

H. Li, C. Wu, S. Zhu and Z. Zheng.
Learning to Backdoor Federated Learning.
ICLR Workshop on Backdoor Attacks aNd DefenSes in Machine Learning (BANDS), 2023,

Y.He, W.Ming, S.Zhu, W.Wang, Y.Zhang, Q.Li, A.Yu
Automatically Identifying CVE Affected Versions with Patches and Developer Logs.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.

 

2022:

Y. Sun, S. Zhu and Y. Chen
ZoomP^3: Privacy-Preserving Publishing of Online Video Conference Recordings.
Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PoPETS), 2022.

C. Wu, X. Yang, S. Zhu and P. Mitra
Toward Cleansing Backdoored Neural Networks in Federated Learning.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.

C.Guan, X.Chen, G.Cao, S.Zhu, T.LaPorta.
HoneyCam: Towards Scalable High-Interaction IoT Camera Honeypot Based on 360 Degree Videos.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2022.

Y. Sun, S. Zhu, Y. Zhao and P. Sun.
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2022. CoRR abs/2109.00132.

D. Su, J.. Liu, S. Zhu, W. Wang, and X. Wang.
Alexa Skills: Security Vulnerabilities and Countermeasures.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2022. CoRR abs/2010.10788 (2020).

B.Zolbayar, R.Sheatsley, P.McDaniel, M.Weisman, S.Zhu, S.Zhu, S.Krishnamurthy.
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
https://arxiv.org/abs/2203.06694

2021:

D. Su, J.. Liu, S. Zhu, X. Wang, W. Wang, and X. Zhang.
AppQ: Warm-starting App Recommendation Based on View Graphs.
CoRR abs/2109.03798.

L. Yuan, P. Liu, and S. Zhu.
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2021.

L.Yuan, E. Choo, T. Yu, I. Khalil, S. Zhu.
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021.

A. Fitwi, Y. Chen, S. Zhu, E.Blasch, G.Chen.
Privacy-Preserving Surveillance as an Edge Service Based on Lightweight Video Protection Schemes Using Face De-Identification and Window Masking.
MDPI Electronics, 2021.

A. Fitwi, Y. Chen, S. Zhu.
Enforcing Privacy Preservation on Edge Cameras using Lightweight Video Frame Scrambling.
IEEE Transactions on Services Computing, preprint 2021.

A. Fitwi, Y. Chen, S. Zhu.
Lightweight Frame Scrambling Mechanisms for End-to-End Privacy in Edge Smart Surveillance.
The Institution of Engineering and Technology (IET) Smart Cities
2021.

T. Xia, Y. Sun, S. Zhu, Z. Rasheed and K. Shafique.
Toward A Network-Assisted Approach for Effective Ransomware Detection.
EAI Transactions on Security and Safety, 2021.

2020:

Y. Sun, S. Chen, S. Zhu and Y. Chen.
iRyP: A Purely Edge-based Visual Privacy-Respecting System for Mobile Cameras.
Proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020.

L. Cong, H. Zhong, A. Squicciarini, S. Zhu and D. Miller.
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of ACM Conference on Data and Applications Security and Privacy (CODASPY), 2020.

C. Li, D. He, S. Li S. Zhu, S. Chan and Y. Cheng.
Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of IEEE International Conference on Blockchain (Blockchain), 2020.

A. Fitwi, Y. Chen, and S. Zhu.
PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service.
Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing, 2020 (best paper award).

X. Liu, D. He, Y. Gao, S. Zhu, S. Chan.
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems.
Proceedings of the 39th International Symposium on Reliable Distributed Systems (SRDS), 2020.

Q. Qiao, D. He, Y. Gao, S. Zhu, J. Gao and S. Chan.
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems.
Proceedings of 17th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2020.

H. Fu, P. Hu, Z. Zheng, A. Das, P. Pathak, T. Gu, S. Zhu, and P. Mohapatra.
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Transactions on Mobile Computing (TMC), 2020.

D. He, H. Gu, T. Li, Y. Du, X. Wang, S. Zhu, and N. Guizani.
Towards Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware.
IEEE Network Magazine, 2020.

D. He, X. Liu, J. Zheng, S. Chan, S. Zhu, W. Min and N. Guizani.
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Network Magazine, Volume: 34, Issue: 4, July/August 2020.

D. He, S. Li, C. Li, S. Zhu, S. Chan, W. Min, X. Li, and N. Guizani.
Security Analysis of Cryptocurrency Wallets in Android-based Applications.
IEEE Network Magazine.

Y. Khazbak, J. Fan, S. Zhu and G. Cao.
Preserving personalized location privacy in ride-hailing service.
Tsinghua Science and Technology, 2020

2019:

A. Fitwi, Y. Chen, and S. Zhu.
No Peeking through My Windows: Conserving Privacy in Personal Drones.
Proceedings of IEEE International Smart Cities Conference (ISC2), 2019.

M. Alrizah, S. Zhu, X. Xing, G. Wang.
Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of ACM Internet Measurement Conference (IMC), 2019.

L. Yuan, W.Hu, T. Yu, P. Liu, S. Zhu.
Towards Large-Scale Hunting for Android Negative-Day Malware.
The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2019.

L. Guan, C. Cao, S. Zhu, J. Lin, P. Liu, Y. Xia, B. Luo.
Protecting Mobile Devices from Physical Memory Attacks with Targeted Encryption.
Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019.

A. Fitwi, Y. Chen, and S. Zhu.
A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge.
1st International Workshop on Lightweight Blockchain for Edge Intelligence and Security (LightChain, colocated with IEEE BlockChain Conference), 2019.

X. Wang, A. Continella, Y. Yang, Y. He and S. Zhu.
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp) (Proceedings of ACM IMWUT), 2019

H. Fu, Z. Zheng, S. Zhu, P. Mohapatra.
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of IEEE International Conference on Computer Communications (INFOCOM), 2019

Y. Song, C. Wu, S. Zhu, H. Wang.
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection.
EAI Transactions on Security and Safety, 2019.

X. Liu, J. Liu, S. Zhu, W. Wang, X. Zhang.
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Transactions on Mobile Computing (TMC), 2019.

D. Nagothu, Y. Chen, E. Blasch, A. Aved, and S.Zhu.
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
MDPI Sensors Journal, 2019.

Y. Lin, X. Wang, F. Hao, Y. Jiang, Y. Wu, G. Min, D. He, S. Zhu, W. Zhao.
Dynamic Control of Fraud Information Spreading in Mobile Social Networks.
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.

Y. Zhang, J. Xiao, S. Hao, H. Wang, S. Zhu, S.Jajodia.
Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Transactions on Information Forensics & Security (TIFS), 2019. Accepted,

 

2018:

X. Wang, Y. Yang, and S. Zhu.
Automated Hybrid Analysis of Android Malware Through Augmenting Fuzzing with Forced Execution.
IEEE Transactions on Mobile Computing (TMC), 2018.

D. He, Y. Qiao, S. Chen, X. Du, W. Chen, S. Zhu, and M. Guizani.
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Network Magazine, 2018.

L. Yuan, P. Liu, S. Zhu.
Android STAR: An Efficient Interaction-Preserving Record-Replay System for Messenger App Usage Surveillance.
Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2018.

Y. Khazbak, J. Fan, S. Zhu and G. Cao.
Preserving Location Privacy in Ride-Hailing Service.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2018

L. Cong, H. Zhong, S. Zhu and A. Squicciarini.
Server-Based Manipulation Attacks Against Machine Learning Models.
Proceedings of ACM Conference on Data and Applications Security and Privacy (CODASPY), 2018.

C. Cao, L. Yuan, A. Singhal, P. Liu, X. Sun and S. Zhu.
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the 32th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), 2018.

X. Liu, J. Liu, W. Wang, S. Zhu.
Android Single Sign-On Security: Issues, Taxonomy and Directions.
To appear in Elsevier Journal on Future Generation Computer Systems (FGCS), 2018.

H. Huang, C. Zheng, J. Zeng, W. Zhou, S. Zhu, P. Liu, I. Molloy, S. Chari, G. Zhang, and Q. Guan.
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Transactions on Big Data, 2018
.

H. Chu, Y. Yang, S. Zhu.
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.
EAI Transactions on Security and Safety, 2018.

 

2017:

X. Wang, S. Zhu, D. Zhou and Y. Yang.
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of Annual Computer Security Applications Conference (ACSAC), 2017.

X. Chen, H. Huang, S. Zhu, Q. Li, Q. Guan.
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), in conjunction with the ACM CCS conference, 2017.

H. Chen, D. He, S. Zhu and J. Yang.
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.
Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2017.

C. Ren, P. Liu, S. Zhu.
WindowGuard: Systematic Protection of GUI Security in Android.
Proceedings of The Network and Distributed System Security Symposium (NDSS), 2017.

L. Luo, J. Ming, D. Wu, P. Liu, and S. Zhu.
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection.
IEEE Transactions on Software Engineering (TSE), 2017.

H. Chu, S. Zhu, Q. Guan, Y. He.
A software assignment algorithm for minimizing worm damage in networked systems.
Journal of Information Security and Applications (JISA), 2017.

2016:

H. Huang, C. Zheng, J. Zeng, W. Zhou, S. Zhu, P. Liu, S. Chari, C. Zhang.
Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study.
Proceedings of IEEE International Conference on Big Data, 2016 (A new Android malware dataset released @ the result website)

Z. Xie, S. Zhu, Q.Li and W. Wang.
You Can Promote, But You Can’t Hide: Large-Scale Abused App Detection in Mobile App Stores.
Proceedings of Annual Computer Security Applications Conference (ACSAC), 2016.

X. Liu, S. Zhu, W. Wang and J. Liu.
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Proceedings of the International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2016.

L. Luo, Y. Fu, D. Wu, S. Zhu and P. Liu.
Repackage-proofing Android Apps.
Proceedings of The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

Q. Guan, H. Huang, W. Luo and S. Zhu.
Semantics-based Repackaging Detection for Mobile Apps.
Proceedings of International Symposium on Engineering Secure Software and Systems (ESSOS), 2016.

Ming, F. Zhang, D. Wu, P. Liu and S. Zhu.
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection.
IEEE Transactions on Reliability, 2016.

Y. Yang, S. Zhu, and G. Cao. 
Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach.
Ad-hoc Networks Journal.

Z. Tian, T. Liu, Q. Zheng, F. Tong, D. Wu, S. Zhu, and K. Chen.. 
Software Plagiarism Detection: A Survey. (In Chinese)
Journal of Cyber Security, 2016.

2015:

H. Huang, S. Zhu, K. Chen and P. Liu. 
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application.
Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS), 2015.

C. Huang, S. Zhu and Q. Guan.
Multi-objective Software Assignment for Active Cyber Defense.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2015.

X. Chen and S. Zhu.
DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications.
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xie and S. Zhu.
AppWatcher: Unveiling the Underground Market of Trading Mobile App Reviews.
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xu and S. Zhu.
SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones.
Proceedings of The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015. (Outstanding paper award) 

H. Huang, K. Chen, C. Ren, P. Liu, S. Zhu and D. Wu.
Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015. 

Y. Jhi, X. Jia, X. Wang, S. Zhu, P. Liu, and D. Wu.
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Transactions on Software Engineering (TSE), 2015.

2014:

F. Zhang, D. Wu, P. Liu, and S. Zhu.
Program Logic Based Software Plagiarism Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2014.

L. Li, S. Zhu, D. Torrieri, and S. Jajodia.
Self- Healing Wireless Networks under Insider Jamming Attacks.
Proceedings of IEEE Conference on Communications and Network Security (CNS), 2014.

L. Luo, J. Ming, D. Wu, P. Liu and S. Zhu.
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection.
Proceedings of The 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), 2014.

C. Huang, S. Zhu, and R. Erbacher.
Toward Software Diversity in Heterogeneous Networked Systems.
Proceedings of the 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), 2014.

Z. Xie and S. Zhu.
GroupTie: Toward Hidden Collusion Group Discovery in App Stores.
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

F. Zhang, H. Huang, S. Zhu, D. Wu, and P. Liu.
ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection.
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014. (code available)

X. Chen, J. Cho, and S. Zhu.
GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks.
Proceedings of 11th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2014. 

2013:

W. Xu, F. Zhang, and S. Zhu.
Permlyzer: Analyzing Permission Usage in Android Apps.
Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2013.

Y. Chen, S. Zhu, H. Xu, and Y. Zhou.
Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of The ASE/IEEE International Conference on Social Computing (SocialCom), 2013. 

H. Huang, S. Zhu, P. Liu and D. Wu.
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST), 2013.

Y. Chen, H. Xu, Y. Zhou and S. Zhu.
Is This App Safe for Children? A Comparison Study of Maturity Ratings on Android and iOS Applications.
Proceedings of the 22nd International World Wide Web conference (WWW), 2013. 

X. Chen, H. Patankar, S. Zhu, M. Srivatsa, J. Opper.
Zigzag: Partial Mutual Revocation Based Trust Management in Tactical Ad Hoc Networks.
Proceedings of 10th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2013. 

W. Xu, F. Zhang and S. Zhu.
JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code.
Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY), 2013. 

T. Cheng, P. Li, S. Zhu, and D. Torrieri.
M-cluster and X-ray: Two Methods for Multi-Jammer Localization in Wireless Sensor Networks.
Journal of Integrated Computer-Aided Engineering (ICAE), 2013. 

2012:

V. Natarajan, Y. Yang and S. Zhu.
Secure Trust Metadata Management For Mobile Ad-Hoc Networks.
Proceedings of The Eighth International Conference on Information Systems Security (ICISS 2012)

W. Xu, F. Zhang and S. Zhu.
The Power of Obfuscation Techniques in Malicious JavaScript Code: A Measurement Study.
Proceedings of MALWARE 2012. 

Y. Chen, Y. Zhou, S. Zhu and H. Xu.
Detecting Offensive Languages in Social Media to Protect Adolescent Online Safety.
Proceedings of The ASE/IEEE International Conference on Social Computing (SocialCom), 2012.

Z. Xu and S. Zhu.
Abusing Notification Services on Smartphones for Phishing and Spamming.
Proceedings of The 6th USENIX Workshop on Offensive Technologies (WOOT), 2012. 

Z. Xu, H. Hsu, X. Chen, S. Zhu and A. Hurson.
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.
Proceedings of The 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2012. 

F. Zhang, Y. Jhi, D. Wu, P. Liu and S. Zhu.
A First Step Towards Algorithm Plagiarism Detection.
Proceedings of International Symposium on Software Testing and Analysis (ISSTA), 2012

Z. Xu, K. Bai, and S. Zhu.
TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors.
Proceedings of The ACM Conference on Wireless Network Security (WiSec), 2012. 

C. Huang, S. Zhu, and D. Wu.
Towards Trusted Services: Result Verification Schemes for MapReduce.
Proceedings of the IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), 2012. 

T. Cheng. P. Li, and S. Zhu.
An Algorithm for Jammer Localization in Wireless Sensor Networks.
Proceedings of The 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012. 

V. Natarajan, S. Zhu, M. Srivatsa and J. Opper
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks.
Proceedings of The 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012. 

Y. Yang, M. Shao, S. Zhu, and G. Cao. 
Towards Statistically Strong Source Anonymity for Sensor Networks.
ACM Transaction on Sensor Networks (ToSN).

Q. Li, W. Gao, S. Zhu, and G. Cao. 
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant Networks.
IEEE Transactions on Dependable and Secure Computing (TDSC).

2011:

T. Cheng, P. Li, and S. Zhu.
Multi-jammer Localization in Wireless Sensor Networks.
Proceedings of International Conference on Computational Intelligence and Security (CIS), 2011. 

V. Natarajan, Y. Yi, and S. Zhu
Resource-Misuse Attack Detection in Delay-Tolerant Networks.
Proceedings of International Performance Computing and Communications Conference (IPCCC), 2011. 

A. Chaugule, Z. Xu, and S. Zhu.
A Specification Based Intrusion Detection Framework for Mobile Phones.
Proceedings of Applied Cryptography and Network Security (ACNS), Spain, 2011. 

Y. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D. Wu.
Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering (ICSE), Software Engineering in Practice Track, 2011. 

Z. Xu, K. Bai, S. Zhu, L. Liu and R. Moulic.
Context-Related Access Control for Mobile Caching.
Proceedings of International Conference on Security and Privacy in Communication Networks (Securecomm), 2011. 

Z. Xin, H. Chen, X. Wang, P. Liu, S. Zhu and B. Mao.
Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of International Security Conference (ISC), 2011.  (Best paper award). Its journal version to appear in International Journal of Information Security (IJIS).

D. He, J. Bu, S. Zhu, S. Chan, and C. Chen.
Distributed Access Control with Privacy Support in Wireless Sensor Networks.
IEEE Transactions on Wireless Communications.  

X. Jiang, W. Hu, S. Zhu, and G. Cao.
Compromise-Resilient Anti-Jamming for Wireless Sensor Networks.
Wireless Networks (WINET).  

Q. Li, S. Zhu and G. Cao. 
A RoutingProtocol for Socially Selfish Delay Tolerant Networks.
Ad Hoc Networks Journal.


2010:

B. Zhao, Z. Xu, C. Chi, S. Zhu, and G. Cao.
Mirroring Smartphones For Good: A Feasibility Study.
Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous), 2010. 

X. Jiang, W. Hu, S. Zhu, and G. Cao.
Compromise-Resilient Anti-Jamming for Wireless Sensor Networks.
Proceedings of Twelfth International Conference on Information and Communications Security (ICICS), 2010. 

W. Xu, F. Zhang, and S. Zhu.
Toward Worm Detection in Online Social Networks.
Proceedings of 25th Annual Computer Security Applications Conference (ACSAC), 2010. 

W. Chen, S. Zhu and Deying Li.
VAN: Vehicle-Assisted Shortest-Time Path Navigation.
Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'10), 2010. 

D. Kong, Y. Jhi, Q. Pan, S. Zhu, P. Liu, and H. Xi.
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.
Proceedings of International Conference on Security and Privacy in Communication Networks (Securecomm), 2010.  

Z. Xu and  S. Zhu.
Filtering Offensive Language in Online Communities using Grammatical Relations.
Proceedings of The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS'10) , 2010.

W. Xu,  S. Zhu, and H. Xu.
COP: A Step Toward Children Online Privacy.
Proceedings of Applied Cryptography and Network Security (ACNS), Beijing, China, 2010.

L. Xie, X. Zhang, J. Seifert and S. Zhu.
pBMDS: A Behavior-based Malware Detection System for Cellphone Devices.
Proceedings of The ACM Conference on Wireless Network Security (WiSec), Mar. 2010.

Q. Li, S. Zhu and G. Cao. 
Routing in Socially Selfish Delay Tolerant Networks.
Proceedings of Infocom 2010, San Diego, CA.

H. Hsu, S. Zhu and A. Hurson. 
A Hotspot-based Protocol for Attack Traceback in Mobile Ad Hoc Networks.
Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Beijing, China, 2010. (short paper)


2009:

X. Wang, Y. Jhi, S. Zhu and P. Liu. 
Detecting Software Theft via System Call Based Birthmarks.
Proceedings of 25th Annual Computer Security Applications Conference (ACSAC), Dec., 2009.

X. Wang, Y. Jhi, S. Zhu and P. Liu. 
Behavior Based Software Theft Detection .
Proceedings of 16th ACM Conference on Computer and Communications Security (CCS), 2009.

Y. Yang, S. Zhu, G. Cao, and T. LaPorta. 
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of International Conference on Security and Privacy in Communication Networks (Securecomm), 2009.

L. Xie, X. Zhang, A. Chaugule, T. Jaeger and S. Zhu
Designing System-level Defenses against Cellphone Malware.
Proceedings of 28th IEEE International Symposium on Reliable Distributed Systems (SRDS), 2009.

M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, T. La Porta.
Cross-layer Enhanced Source Location Privacy in Sensor Networks
Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009).

Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci.
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.
Proceedings of IEEE INFOCOM, 2009.

B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao.
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses.
Proceedings of IEEE INFOCOM, 2009.

M. Shao, S. Zhu, W. Zhang, G. Cao, Y. Yang.
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
IEEE Transactions on Mobile Computing, Volume 8, Number 8, August 2009.

W. Zhang, S. Zhu, and G. Cao
Predistribution and local collaboration-based group rekeying for wireless sensor networks
Ad Hoc Networks, Volume 7, Issue 6, August 2009.

G. Ruan, S. Jain, and S. Zhu
SensorEar: A Sensor Network Based Eavesdropping System
Workshop on Embedded Systems and Communications Security, in conjunction with SRDS 2009.


2008:

H. Song, S. Zhu, W. Zhang, and G. Cao. 
Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks. 
In
ACM Transaction on Sensor Networks (TOSN), Vol.4-4, Nov. 2008.

X. Wang, C. Pan, P. Liu, S. Zhu.
SigFree: A Signature-free Buffer Overflow Attack Blocker. 
In
IEEE Transactions on Dependable and Secure Computing (TDSC), 2008.

X. Wang, Y-C Jhi, S. Zhu, P. Liu.
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
Proceedings of 24th Annual Computer Security Applications Conference (ACSAC), Dec., 2008.

X. Wang, Y. Jhi, S. Zhu, P. Liu.
Protecting Web Services from Remote Exploit code: A Static Analysis Approach
(Poster), Proc. 17th International World Wide Web Conference (WWW 2008), Beijing, China, April 2008.

 

Liang Xie, Hui Song, Trent Jaeger and Sencun Zhu

Towards a Systematic Approach for Cell-phone Worm Containment.
(Poster), Proc. 17th International World Wide Web Conference (WWW 2008), Beijing, China, April 2008.

 

H. Xu, N. Irani, S. Zhu, and W. Xu.
Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation.
Research in Progress, Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France, Dec. 2008.

 

M. Shao, S. Zhu, G. Cao, T. La Porta and P. Mohapatra.
A Cross-layer Dropping Attack in Video Streaming over Ad Hoc Networks.
In Proc. of International Conference on Security and Privacy in Communication Networks (Securecomm), 2008.

M. Masud, L. Khan, B. Thuraisingham, X. Wang, P. Liu and S. Zhu
A Data Mining Technique to Detect Remote Exploits
The Fourth IFIP WG 11.9 International Conference on Digital Forensics, 2008.

Liang Xie, Hui Song, and Sencun Zhu
On the Effectiveness of Internal Patch Dissemination against File-sharing Worms
Proceedings of Applied Cryptography and Network Security (ACNS), June, 2008. (
best student paper award)  

Liang Xie and Sencun Zhu
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
In
ACM Transactions on Information and System Security (TISSEC), Volume 11 ,  Issue 3, 2008.

Y. Yang, X. Wang, S. Zhu, and G. Cao. 
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.  
I
n
ACM Transactions on Information and System Security (TISSEC), Volume 11 ,  Issue 4, July 2008.

Y. Yang, S. Zhu, and G. Cao. 
Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach.
Proceedings of ACM Mobihoc, May 2008.

Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. 
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks.
Proceedings of The ACM Conference on Wireless Network Security (WiSec), Mar. 2008.

M. Shao, Y. Yang, S. Zhu, and G. Cao. 
Towards Statistically Strong Source Anonymity for Sensor Networks.
Proceedings of IEEE Infocom, Mar. 2008.

H. Song, S. Zhu and G. Cao. 
SVATS: A Sensor-network-based Vehicle Anti-Theft System.
Proceedings of IEEE Infocom mini-conference, Mar. 2008.  


2007:

Y. Yang, X. Wang, S. Zhu, and G. Cao. 
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Proceedings of  26th IEEE International Symposium on Reliable Distributed Systems (SRDS), Oct. 2007.

W. Zhang, M. Tran, S. Zhu, and G. Cao. 
A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks.
Proceedings of  ACM Mobihoc'07, Sept. 2007.

H. Song, L. Xie, S. Zhu, and G. Cao. 
Sensor Node Compromise Detection: The Location Perspective.
in Proc. of International Wireless Communications and Mobile Computing Conference (IWCMC), Aug. 2007.

H. Choi, S. Zhu, and T. Laporta. 
SET: Detecting node clones in Sensor Networks.
Proceedings of  International Conference on Security and Privacy in Communication Networks (SecureComm), Sept. 2007.

M. Shao, S. Zhu, W. Zhang, and G. Cao. 
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
In Proc. of  IEEE Infocom'07, May 2007. 

Liang Xie and Sencun Zhu
A Feasibility Study on Defending Against Ultra-Fast Topological Worms
Proceedings of The Seventh IEEE International Conference on Peer-to-Peer Computing (P2P'07), Galway, Ireland, Sep. 2007.

P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta,
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks,
In
IEEE Transactions on Mobile Computing (TMC), Vol. 6, No. 6, pp. 663-677, June 2007.

Hungyuan Hsu, Sencun Zhu, and Ali Hurson.
LIP: A Lightweight Inter-layer Protocol for Preventing Packet Injection Attacks in Mobile Ad Hoc Networks.
In
International Journal of Security and Networks (IJSN) Special Issue on "Cryptography in Networks". 2(3/4):202-215, 2007

Qijun Gu, Peng Liu, Sencun Zhu, and Chao-Chien Chu. 
Defence against Packet Injection Attacks in Unreliable Ad Hoc Networks.
International Journal of Security and Networks 2007 - Vol. 2, No.1/2  pp. 154 - 169.

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning
Interleaved Hop-by-Hop Authentication Against False Data Injection Attacks in Sensor Networks.
in
ACM Transaction on Sensor Networks (TOSN), Aug. 2007.  (source code here)


2006:

X. Wang, C. Pan, P. Liu, S. Zhu.
SigFree: A Signature-free Buffer Overflow Attack Blocker. 
Proceedings of  USENIX Security'06, Aug. 2006.
(Patented)

Liang Xie and Sencun Zhu
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm), Aug., 2006. 

Y. Yang, X. Wang, S. Zhu, and G. Cao. 
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. 
In Proc. of  ACM MOBIHOC'06, May 2006. 

Sencun Zhu, Cao Yao, Donggang Liu, Sanjeev Setia, and Sushil Jajodia.
Efficient Security Mechanisms for Overlay Multicast-based Content Distribution.
In
Elsevier Journal of Computer Communications.

P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La Porta. 
Establishing Pair-Wise Keys In Heterogeneous Sensor Networks. 
Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM'06), April 2006.

Pirretti, M., S. Zhu, V. Narayanan, P. McDaniel, M. Kandemir, R. Brooks.
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
In
International Journal of Distributed Sensor Networks, 2(3):267-287, 2006.

Qijun Gu, Chao Chu, Peng Liu, Sencun Zhu. 
Slander Resistant Attacker Isolation in Ad Hoc Networks. 
In
Int. J. Mobile Network Design and Innovation, Vol. 1, Nos. 3/4, 2006.

Sencun Zhu, Sanjeev Setia, Shouhuai Xu, and Sushil Jajodia
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
In
Journal of Computer Security (JCS), 2006.

Sencun Zhu, Sanjeev Setia, and Sushil Jajodia
LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks.
In
ACM Transaction on Sensor Networks (TOSN), Nov. 2006


2005:

Sencun Zhu, Cao Yao, Donggang Liu, Sanjeev Setia, and Sushil Jajodia
Efficient Security Mechanisms for Overlay Multicast-based Content Distribution. 
In Proc. of Applied Cryptography and Network Security (ACNS) conference, New York, June, 2005. 

Hui Song, Sencun Zhu, and Guohong Cao.. 
Attack-Resilient Time Synchronization for Wireless Sensor Networks. 
In Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'05), 2005.

Pirretti, M., S. Zhu, V. Narayanan, P. McDaniel, M. Kandemir, R. Brooks.
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
In Proc. of the Innovations and Commercial Applications of Distributed Sensor Networks Symposium (ICA DSN 2005). Washington, D.C. (Best paper) October 18-19, 2005.

Wensheng Zhang, Hui Song, Sencun Zhu, and Guohong Cao. 
Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks. 
In Proc. of  ACM Mobihoc'05,  May 2005. 

D. Liu, P. Ning, S. Zhu, and S. Jajodia.
Practical Broadcast Authentication in Sensor Networks.
In Proc. of the 2nd International Conference on Mobile and Ubiquitous Systems (Mobiquitous'05), San Diego, Jul, 2005. 

Qijun Gu, Peng Liu, Sencun Zhu, and Chao-Chien Chu. 
Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks.
In Proc. of  IEEE Globecom 2005.

Qijun Gu, Chao Chu, Peng Liu, Sencun Zhu. 
Slander Resistant Attacker Isolation in Ad Hoc Networks. 
In Proceedings of the International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM 2005).  Dallas, TX, November 17-20, 2005.

Yingjiu Li, Sencun Zhu, X. Sean Wang, Sushil Jajodia.
Looking into the Seeds of Time: Discovering Temporal Patterns in Large Transaction Sets 
Elsevier Journal Information Sciences, 2005.

Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks.
In
Elsevier Ad Hoc Networks Journal, 2005.


2004:

Sencun Zhu, Sanjeev Setia, Shouhuai Xu, and Sushil Jajodia
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
In Proc. of the 1st ACM International Conference on Mobile and Ubiquitous Systems (Mobiquitous'04), Boston, Massachusetts, August 22-25, 2004. 

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
In Proc. of IEEE Symposium on Security and Privacy, Oakland, California, May 2004. 

Sencun Zhu, Sushil Jajodia.
Scalable group rekeying for secure multicast: A survey 
In Proc. 5th International Workshop on Distributed Computing, Springer Lecture Notes in Computer Science, Vol. 2918 (Samir R. Das and Sajal K. Das editors), 2004, pages 1-10.


2003:

Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks.
In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003

Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia
Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
In Proc. of the 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, Georgia, November 4-7, 2003. 

Sencun Zhu, Sanjeev Setia, and Sushil Jajodia
Performance Optimizations for Group Key Management Schemes for Secure Multicast. 
In Proc. of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003), May 2003. 

Sencun Zhu, Sanjeev Setia and Sushil Jajodia
Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
In Proc. of Networked Group Communications (NGC 2003), Germany, Sep. 2003. 

Sencun Zhu, Sanjeev Setia, and Sushil Jajodia
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks.
In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003. 


2002:

Sanjeev Setia, Sencun Zhu, and Sushil Jajodia
A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast.
In
Performance Evaluation, special issue Proceedings of Performance 2002 , Rome, Italy, Sep., 2002. 

Y. Li, S. Zhu, L. Wang and S. Jajodia.
A Privacy Enhanced Microaggregation Method. 
In Proc. FoIKS 2002, pages 148-159, Salzau Castle, Germany, February 20-23, 2002.