LEAP+ Efficient security mechanisms for large-scale distributed sensor networks S Zhu, S Setia, S Jajodia ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006 | 2754 | 2006 |
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks S Zhu, S Setia, S Jajodia, P Ning IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004 | 841 | 2004 |
Detecting offensive language in social media to protect adolescent online safety Y Chen, Y Zhou, S Zhu, H Xu 2012 international conference on privacy, security, risk and trust and 2012 …, 2012 | 834 | 2012 |
Routing in socially selfish delay tolerant networks Q Li, S Zhu, G Cao 2010 Proceedings IEEE Infocom, 1-9, 2010 | 693 | 2010 |
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks Y Yang, X Wang, S Zhu, G Cao ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-43, 2008 | 627 | 2008 |
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors Z Xu, K Bai, S Zhu Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 490 | 2012 |
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach S Zhu, S Xu, S Setia, S Jajodia 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 481 | 2003 |
Towards statistically strong source anonymity for sensor networks Y Yang, M Shao, S Zhu, G Cao ACM Transactions on Sensor Networks (TOSN) 9 (3), 1-23, 2013 | 335 | 2013 |
SET: Detecting node clones in sensor networks H Choi, S Zhu, TF La Porta 2007 Third International Conference on Security and Privacy in …, 2007 | 286 | 2007 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 264 | 2014 |
Towards event source unobservability with minimum network traffic in sensor networks Y Yang, M Shao, S Zhu, B Urgaonkar, G Cao Proceedings of the first ACM conference on Wireless network security, 77-88, 2008 | 262 | 2008 |
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection F Zhang, H Huang, S Zhu, D Wu, P Liu Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 247 | 2014 |
Practical broadcast authentication in sensor networks D Liu, P Ning, S Zhu, S Jajodia The Second Annual International Conference on Mobile and Ubiquitous Systems …, 2005 | 228 | 2005 |
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks S Zhu, S Xu, S Setia, S Jajodia 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 217 | 2003 |
Attack-resilient time synchronization for wireless sensor networks H Song, S Zhu, G Cao Ad hoc networks 5 (1), 112-125, 2007 | 215 | 2007 |
Sigfree: A signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008 | 208 | 2008 |
Distributed software-based attestation for node compromise detection in sensor networks Y Yang, X Wang, S Zhu, G Cao 2007 26th IEEE international symposium on reliable distributed systems (SRDS …, 2007 | 199 | 2007 |
pBMDS: a behavior-based malware detection system for cellphone devices L Xie, X Zhang, JP Seifert, S Zhu Proceedings of the third ACM conference on Wireless network security, 37-48, 2010 | 182 | 2010 |
A social network based patching scheme for worm containment in cellular networks Z Zhu, G Cao, S Zhu, S Ranjan, A Nucci Handbook of Optimization in Complex Networks: Communication and Social …, 2012 | 177 | 2012 |
The sleep deprivation attack in sensor networks: Analysis and methods of defense M Pirretti, S Zhu, N Vijaykrishnan, P McDaniel, M Kandemir, R Brooks International Journal of Distributed Sensor Networks 2 (3), 267-287, 2006 | 175 | 2006 |