Photo of Sencun Zhu

Sencun Zhu

Associate Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering

W370 Westgate Building

sxz16@psu.edu

814-865-0995

Personal or Departmental Website

Research Areas:

Interest Areas:

Network and systems security, software plagiarism detection, smartphone security, children online safety, privacy.

 
 

 

Education

  • BS, Precision Instruments, Tsinghua University, 1996
  • ME, Signal Processing, University of Science & Technology of China, 1999
  • Ph D, Information Technology, George Mason University, 2004

Publications

Book, Chapters

  • Don Torrieri, Sencun Zhu and Sushil Jajodia, 2013, Cyber Maneuver Against External Adversaries and Compromised Nodes, Springer, pp. 87–96
  • Yi Yang and Sencun Zhu, 2011, Sensor Code Attestation, Springer, pp. 1178-1179
  • Yi Yang and Sencun Zhu, 2011, Sensor Key Management, Springer, pp. 1179-1181
  • Yi Yang and Sencun Zhu, 2011, Anonymous Routing, Springer, pp. 39-40
  • Sencun Zhu and Sushil Jajodia, 2010, Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions, Springer US, pp. 57-75
  • Sencun Zhu and W. Zhang, 2006, Group Key Management in Sensor Networks, CRC Press, pp. 23
  • Sencun Zhu and S. Jajodia, 2005, Scalable Group Key Management for Secure Multicast: Taxonomy and New Directions, Springer-Verlag
  • Yingjiu Li, Sencun Zhu, Lingyu Wang and Sushil Jajodia, 2002, A Privacy-Enhanced Microaggregation Method, Springer Berlin Heidelberg, pp. 148-159

Journal Articles

  • Nan Lan, Ming Jiang, Dinghao Wu, Liang Peng and Sencun Zhu, 2017, "Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection", IEEE Transactions on Software Engineering (TSE)
  • Chu Huang, Sencun Zhu, Quanlong Guan and Yongzhong He, 2017, "A Software Assignment Algorithm for Minimizing Worm Damage in Networked Systems", Elsevier Journal of Information Security and Applications
  • J. A. Ming, F. B. Zhang, D. A. Wu, P. A. Liu and Sencun Zhu, 2016, "Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection", IEEE Transactions on Reliability, 65, (4), pp. 1647-1664
  • Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei TONG, Dinghao Wu, Sencun Zhu and Kai Chen, 2016, "Software Plagiarism Detection: A Survey", Journal of Cyber Security
  • Y. A. Yang, Sencun Zhu and Guohong Cao, 2016, "Improving sensor network immunity under worm attacks: A software diversity approach", Ad Hoc Networks, 47
  • Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu and Dinghao Wu, 2015, "Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection", IEEE Transactions on Software Engineeering, 41, (9), pp. 925–943
  • Tianzhen Cheng, Ping Li, Sencun Zhu and Don Torrieri, 2014, "M-cluster and X-ray: Two methods for multi-jammer localization inwireless sensor networks", Integrated Computer-Aided Engineering, 21, (1), pp. 19–34
  • Qinghua Li, Wei Gao, Sencun Zhu and Guohong Cao, 2013, "To Lie or to Comply: Defending against Flood Attacks in DisruptionTolerant Networks", IEEE Transactions on Dependable and Secure Computing, 10, (3), pp. 168–182
  • Yi Yang, Min Shao, Sencun Zhu and Guohong Cao, 2013, "Towards statistically strong source anonymity for sensor networks", ACM Transactions on Sensor Networks, 9, (3), pp. 23 pages
  • Qinghua Li, Wei Gao, Sencun Zhu and Guohong Cao, 2013, "To Lie or to Comply: Defending against Flood Attacks in DisruptionTolerant Networks", IEEE Trans. Dependable Sec. Comput., 10, (3), pp. 168–182
  • Q Li, Sencun Zhu and G Cao, 2012, "A Routing Protocol for Socially Selfish Delay Tolerant Networks", 10, (8), pp. 1619-1632
  • Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao and Li Xie, 2012, "Replacement attacks: automatically evading behavior-based software birthmark", International Journal of Information Security, 11, (5), pp. 293–304
  • D He, J Bu, Sencun Zhu, S Chan and C Chen, 2011, "Distributed Access Control with Privacy Support in Wireless Sensor Networks", 10, (10), pp. 3472-3481
  • D Kong, Y Jhi, T Gong, Sencun Zhu, Peng Liu and H Xi, 2011, "SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection", 10, (5), pp. 269-283
  • X Jiang, W Hu, Sencun Zhu and G Cao, 2011, "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks", 17, (6), pp. 1513-1527
  • B Zhao, Z Xu, C Chi, Sencun Zhu and G Cao, 2011, "Mirroring Smartphones for Good: A Feasibility Study"
  • Xuan Jiang, Wenhui Hu, Sencun Zhu and Guohong Cao, 2011, "Compromise-resilient anti-jamming communication in wireless sensor networks", Wireless Networks, 17, (6), pp. 1513–1527
  • Xinran Wang, Chi-Chun Pan, Peng Liu and Sencun Zhu, 2010, "SigFree: A Signature-Free Buffer Overflow Attack Blocker", IEEE Transactions on Dependable and Secure Computing, 7, (1), pp. 65–79
  • Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao and Yi Yang, 2009, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", IEEE Transactions on Mobile Computing, 8, (8), pp. 1023–1038
  • Wensheng Zhang, Sencun Zhu and Guohong Cao, 2009, "Predistribution and local collaboration-based group rekeying for wireless sensor networks", Ad Hoc Networks, 7, (6), pp. 1229–1242
  • Wensheng Zhang, Sencun Zhu and Guohong Cao, 2009, "Editorial for special issue on privacy and security in wireless sensorand ad hoc networks", Ad Hoc Networks, 7, (8), pp. 1431–1433
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2008, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks", ACM Transactions on Information and System Security, 11, (4)
  • Liang Xie and Sencun Zhu, 2008, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification", ACM Transactions on Information and System Security, 11, (3), pp. 28
  • Hui Song, Sencun Zhu, Wensheng Zhang and Guohong Cao, 2008, "Least privilege and privilege deprivation: Toward tolerating mobilesink compromises in wireless sensor networks", TOSN, 4, (4)
  • Sencun Zhu, Sanjeev Setia, Sushil Jajodia and Peng Ning, 2007, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks", ACM Transactions on Sensor Networks, 3, (3), pp. 33
  • Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663–677
  • Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia and Sushil Jajodia, 2007, "Efficient security mechanisms for overlay multicast based content delivery", Elsevier Journal of Computer Communications, 30, (4), pp. 793–806
  • Hui Song, Sencun Zhu and Guohong Cao, 2007, "Attack-resilient time synchronization for wireless sensor networks", Ad Hoc Networks, 5, (1), pp. 112–125
  • Qijun Gu, Peng Liu, Chao-Hsien Chu and Sencun Zhu, 2007, "Defence against packet injection in ad hoc networks", International Journal of Security and Networks, Special Issue on Computer and Network Security, 2, (1/2), pp. 154–169
  • Hung-Yuan Hsu, Sencun Zhu and Ali R. Hurson, 2007, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network", International Journal of Security and Networks, Special Issue on Cryptography in Networks, 2, (3/4), pp. 202–215
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2006, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks", ACM Transaction on Sensor Networks, 2, (4), pp. 500–528
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2006, "LHAP: A lightweight network access control protocol for ad hoc networks", Ad Hoc Networks, 4, (5), pp. 567–585
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
  • Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang and Sushil Jajodia, 2006, "Looking into the seeds of time: Discovering temporal patterns in large transaction sets", Journal Information Sciences, 176, (8), pp. 1003–1031
  • Sencun Zhu, Sanjeev Setia, Shouhuai Xu and Sushil Jajodia, 2006, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks", Journal of Computer Security, 14, (4), pp. 301–325
  • Qijun Gu, C.-H. Chu, Peng Liu and Sencun Zhu, 2006, "Slander-resistant forwarding isolation in ad hoc networks", International Journal of Mobile Network Design and Innovation, 1, (3/4), pp. 162–174
  • Q. Gu, C.-H. Chu, P. Liu and Sencun Zhu, 2006, "Slander Resistant Attacker Isolation in Ad Hoc Networks", International Journal of Mobile Network Design and Innovation (IJMNDI), 1, (3/4), pp. 162-174
  • Sanjeev Setia, Sencun Zhu and Sushil Jajodia, 2002, "A comparative performance analysis of reliable group rekey transport protocols for secure multicast", Performance Evaluation, 49, (1–4), pp. 21 - 41

Conference Proceedings

  • Chuangang Ren, Peng Liu and Sencun Zhu, 2017, "WindowGuard: Systematic Protection of GUI Security in Android."
  • Hao Chen, Daojing He, Sencun Zhu and Jingshun Yang, 2017, "Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets", Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
  • Xing Liu, Sencun Zhu, Wei Wang and Jiqiang Liu, 2016, "Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem"
  • Heqing Huang, Cong Zheng, Wu Zhou, Junyuan Zeng, Sencun Zhu, Peng Liu, Suresh and Ce Zhang, 2016, "Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study"
  • Q Guan, Hai Huang, W. Luo and Sencun Zhu, 2016, "Semantics-based repackaging detection for mobile apps", pp. pp. 89-105
  • L. Luo, Y. Fu, Dinghao Wu, Sencun Zhu and P Liu, 2016, "Repackage-proofing android apps"
  • Zhen Xie, Sencun Zhu, Qing Li and Wenjing Wang, 2016, "You Can Promote, But You Can’t Hide: Large-Scale Abused App Detection in Mobile App Stores"
  • Heqing Huang, Sencun Zhu, Kai Chen and Peng Liu, 2015, "From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App", pp. 1236–1247
  • Chu Huang, Sencun Zhu, and , , 2015, "Multi-objective Software Assignment for Active Cyber Defense", pp. 220-228
  • Xin Chen and Sencun Zhu, 2015, "DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications.", pp. 12
  • Zhen Xie and Sencun Zhu, 2015, "AppWatcher: unveiling the underground market of trading mobile app reviews", pp. 11
  • Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu and Dinghao Wu, 2015, "Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android", pp. 7–18
  • Zhi Xu and Sencun Zhu, 2015, "SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones", ACM, pp. 61–72
  • H. Huang, K. Chen, Peng Liu, Sencun Zhu and D. Wu, 2015, "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms", Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015, 153, pp. pgs. 359-366
  • Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu and Sencun Zhu, 2014, "Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection", pp. 389–400
  • Fangfang Zhang, Dinghao Wu, Peng Liu and Sencun Zhu, 2014, "Program Logic Based Software Plagiarism Detection", pp. 66–77
  • L. Li , Sencun Zhu, D. Torrieri and S. Jajodia, 2014, "Self-healing wireless networks under insider jamming attacks", pp. 220-228
  • C. Huang, Sencun Zhu and R. Erbacher, 2014, "Toward Software Diversity in Heterogeneous Networked Systems", pp. 114-129
  • X. Chen, J. Cho and Sencun Zhu, 2014, "GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks", IEEE, pp. 275-283
  • Zhen Xie and Sencun Zhu, 2014, "GroupTie: toward hidden collusion group discovery in app stores", pp. 153–164
  • Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu and Peng Liu, 2014, "ViewDroid: towards obfuscation-resilient mobile application repackaging detection", pp. 25–36
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2013, "Permlyzer: Analyzing permission usage in Android applications", pp. 400–410
  • Ying Chen, Sencun Zhu, Heng Xu and Yilu Zhou, 2013, "Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness", pp. 196–203
  • Heqing Huang, Sencun Zhu, Peng Liu and Dinghao Wu, 2013, "A Framework for Evaluating Mobile App Repackaging Detection Algorithms", pp. 169–186
  • Xin Chen, Harshal Patankar, Sencun Zhu, Mudhakar Srivatsa and Jeff Opper, 2013, "Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks", pp. 131–139
  • Ying Chen, Heng Xu, Yilu Zhou and Sencun Zhu, 2013, "Is This App Safe for Children?: A Comparison Study of Maturity Ratings on Android and iOS Applications", pp. 201–212
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2013, "JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code", pp. 117–128
  • Vivek Natarajan, Yi Yang and Sencun Zhu, 2012, "Secure Trust Metadata Management for Mobile Ad-Hoc Networks", pp. 164-180
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2012, "The power of obfuscation techniques in malicious JavaScript code:A measurement study", IEEE Computer Society, pp. 9–16
  • Z Xu, H Hsu, X. Chen, Sencun Zhu and A Hurson, 2012, "AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks", pp. 147-168
  • Ying Chen, Yilu Zhou, Sencun Zhu and Heng Xu, 2012, "Detecting Offensive Language in Social Media to Protect Adolescent Online Safety", pp. 71–80
  • Z Xu and Sencun Zhu, 2012, "Abusing Notification Services on Smartphones for Phishing and Spamming", pp. 11 pages
  • F Zhang, Y Jhi, D Wu, Peng Liu and Sencun Zhu, 2012, "A First Step Towards Algorithm Plagiarism Detection", pp. 111-121
  • C Huang, Sencun Zhu and D Wu, 2012, "Towards Trusted Services: Result Verification Schemes for Map Reduce", pp. 41-48
  • Z Xu, K Bai and Sencun Zhu, 2012, "TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors", pp. 113-124
  • T Cheng, P Liu and Sencun Zhu, 2012, "An Algorithm for Jammer Localization in Wireless Sensor Networks", pp. 724-731
  • V Natarajan, Sencun Zhu, M Srivatsa and J Opper, 2012, "Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks", pp. 376-383
  • Chu Huang, Sencun Zhu and Dinghao Wu, 2012, "Towards Trusted Services: Result Verification Schemes for MapReduce", pp. 41–48
  • T Cheng, Peng Liu and Sencun Zhu, 2011, "Multi-jammer Localization in Wireless Sensor Networks", pp. 736-740
  • V Natarajan, Y Yi and Sencun Zhu, 2011, "Resource-Misuse Attack Detection in Delay-Tolerant Networks", pp. 8 pages
  • Z Xu, K Bai, Sencun Zhu, L Liu and R Moulic, 2011, "Context-Related Access Control for Mobile Caching", pp. 20 pages
  • Z Xin, H Cheng, X Wang, Peng Liu, Sencun Zhu and B Zhao, 2011, "Replacement Attacks on Behavior Based Software Birthmark", pp. 1-16
  • A Chaugule, Z Xu and Sencun Zhu, 2011, "A Specification Based Intrusion Detection Framework for Mobile Phones", pp. 19-37
  • Y C Jhi, X Wang, X Jia, Sencun Zhu, Peng Liu and D Wu, 2011, "Value-Based Program Characterization and Its Application to Software Plagiarism Detection", pp. 756-765
  • Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan and Chun Chen, 2011, "Distributed privacy-preserving access control in a single-owner multi-usersensor network", pp. 331–335
  • X Jiang, W Hu, Sencun Zhu and G Cao, 2010, "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks", pp. 140-154
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2010, "Toward worm detection in online social networks", ACM, pp. 11–20
  • B Zhao, Z Xu, C Chi, Sencun Zhu and G Cao, 2010, "Mirroring Smartphones for Good: A Feasibility Study", pp. 26-38
  • Wenping Chen, Sencun Zhu and Deying Li, 2010, "VAN: Vehicle-assisted shortest-time path navigation", IEEE, pp. 442–451
  • Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu and Hongsheng Xi, 2010, "SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection", pp. 269-283
  • Z. Xu and Sencun Zhu, 2010, "Filtering Offensive Language in Online Communities using Grammatical Relations", pp. 10 pages
  • Wei Xu, Sencun Zhu and Heng Xu, 2010, "COP: A Step toward Children Online Privacy", Springer-Verlag LNCS, 6123, pp. 529–544
  • Hung-Yuan Hsu, Sencun Zhu and Ali R. Hurson, 2010, "A hotspot-based protocol for attack traceback in mobile ad hoc networks", ACM, pp. 333–336
  • Liang Xie, Xinwen Zhang, Jean-Pierre Seifert and Sencun Zhu, 2010, "pBMDS: a behavior-based malware detection system for cellphone devices", ACM, pp. 37–48
  • Qinghua Li, Sencun Zhu and Guohong Cao, 2010, "Routing in Socially Selfish Delay Tolerant Networks", IEEE, pp. 857–865
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2009, "Detecting Software Theft via System Call Based Birthmarks", pp. 149–158
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2009, "Behavior based software theft detection", pp. 280–290
  • Yi Yang, Sencun Zhu, Guohong Cao and Thomas F Laporta, 2009, "An Active Global Attack Model for Sensor Source Location Privacy:Analysis and Countermeasures", pp. 373–393
  • Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent R Jaeger and Sencun Zhu, 2009, "Designing System-Level Defenses against Cellphone Malware", pp. 83–90
  • G. Ruan, S. Jain and Sencun Zhu, 2009, "SensorEar: A Sensor Network Based Eavesdropping System", pp. 8
  • Min Shao, Wenhui Hu, Sencun Zhu, Guohong Cao, Srikanth Krishnamurth and Thomas F Laporta, 2009, "Cross-layer Enhanced Source Location Privacy in Sensor Networks", pp. 1–9
  • Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu and Guohong Cao, 2009, "A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses", pp. 2455–2463
  • Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan and Antonio Nucci, 2009, "A Social Network Based Patching Scheme for Worm Containment in CellularNetworks", pp. 1476–1484
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2008, "STILL: Exploit Code Detection via Static Taint and InitializationAnalyses", pp. 289–298
  • Heng Xu, Nazneen Irani, Sencun Zhu and Wei Xu, 2008, "Alleviating Parental Concerns for Children’s Online Privacy: A ValueSensitive Design Investigation", pp. 106
  • Min Shao, Sencun Zhu, Guohong Cao, Thomas F Laporta and Prasant Mohapatra, 2008, "A cross-layer dropping attack in video streaming over ad hoc networks", pp. 25
  • Liang Xie, Hui Song and Sencun Zhu, 2008, "On the Effectiveness of Internal Patching Against File-Sharing Worms", pp. 1–20
  • Yi Yang, Sencun Zhu and Guohong Cao, 2008, "Improving sensor network immunity under worm attacks: a software diversity approach", pp. 149–158
  • Hui Song, Sencun Zhu and Guohong Cao, 2008, "SVATS: A Sensor-Network-Based Vehicle Anti-Theft System", pp. 2128–2136
  • Min Shao, Yi Yang, Sencun Zhu and Guohong Cao, 2008, "Towards Statistically Strong Source Anonymity for Sensor Networks", pp. 51–55
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2008, "Protecting web services from remote exploit code: a static analysis approach (poster)", pp. 1139–1140
  • Liang Xie, Hui Song, Trent R Jaeger and Sencun Zhu, 2008, "A systematic approach for cell-phone worm containment (poster)", pp. 1083–1084
  • Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar and Guohong Cao, 2008, "Towards event source unobservability with minimum network trafficin sensor networks", pp. 77–88
  • Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu and Sencun Zhu, 2008, "Detecting Remote Exploits Using Data Mining", pp. 177–189
  • Heng Xu, Nazneen Irani, Sencun Zhu and Wei Xu, 2008, "Alleviating Parental Concerns for Children’s Online Privacy: A ValueSensitive Design Investigation", pp. 106
  • Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar and Guohong Cao, 2008, "Towards event source unobservability with minimum network trafficin sensor networks", pp. 77–88
  • M. Masud, L. Kahn, B. Thuraisingham, X. Wang, P. Liu and Sencun Zhu, 2008, "A Data Mining Technique to Detect Remote Exploits", Proceedings of the Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, pp. 14
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2007, "Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks", pp. 219–230
  • Heesook Choi, Sencun Zhu and Thomas F Laporta, 2007, "SET: Detecting node clones in sensor networks", pp. 341–350
  • L. Xie and Sencun Zhu, 2007, "A Study on Defending against Ultra-Fast Topological Worms", Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp. 61-68
  • Liang Xie and Sencun Zhu, 2007, "A Feasibility Study on Defending Against Ultra-Fast Topological Worms", pp. 61–70
  • Wensheng Zhang, Minh Tran, Sencun Zhu and Guohong Cao, 2007, "A random perturbation-based scheme for pairwise key establishment in sensor networks", pp. 90–99
  • Hui Song, Liang Xie, Sencun Zhu and Guohong Cao, 2007, "Sensor node compromise detection: the location perspective", pp. 242–247
  • Min Shao, Sencun Zhu, Wensheng Zhang and Guohong Cao, 2007, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", pp. 1298–1306
  • Liang Xie and Sencun Zhu, 2007, "A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms", pp. 61–70
  • Liang Xie and Sencun Zhu, 2006, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification", pp. 1–10
  • Xinran Wang, Chi-Chun Pan, Peng Liu and Sencun Zhu, 2006, "SigFree: A Signature-free Buffer Overflow Attack Blocker", USENIX Association, Berkeley, CA, USA
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2006, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks", pp. 356–367
  • Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2006, "Establishing Pair-Wise Keys in Heterogeneous Sensor Networks"
  • Qijun Gu, C.-H. Chu, Peng Liu and Sencun Zhu, 2005, "Slander-resistant forwarding isolation in ad hoc networks", pp. 12
  • Hui Song, Sencun Zhu and Guohong Cao, 2005, "Attack-resilient time synchronization for wireless sensor networks"
  • Qijun Gu, Peng Liu, Sencun Zhu and Chao-Hsien Chu, 2005, "Defending against packet injection attacks unreliable ad hoc networks", pp. 5
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel and Mahmut T Kandemir, 2005, "The sleep deprivation attack in sensor networks: analysis and methods of defense"
  • Donggang Liu, Peng Ning, Sencun Zhu and Sushil Jajodia, 2005, "Practical Broadcast Authentication in Sensor Networks", pp. 118–132
  • Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia and Sushil Jajodia, 2005, "Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution", pp. 40–55
  • Wensheng Zhang, Hui Song, Sencun Zhu and Guohong Cao, 2005, "Least privilege and privilege deprivation: towards tolerating mobilesink compromises in wireless sensor networks", pp. 378–389
  • Q. Gu, C.-H. Chu, P. Liu and Sencun Zhu, 2005, "Slander Resistant Attacker Isolation in Ad Hoc Networks", Proceedings of the International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM 2005)
  • Sencun Zhu, Sanjeev Setia, Shouhuai Xu and Sushil Jajodia, 2004, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Network", pp. 42–51
  • Sencun Zhu, Sanjeev Setia, Sushil Jajodia and Peng Ning, 2004, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks", pp. 259–271
  • Sencun Zhu and Sushil Jajodia, 2003, "Scalable Group Rekeying for Secure Multicast: A Survey", pp. 1–10
  • Sencun Zhu, S. Xu, S. Setia and S. Jajodia, 2003, "Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach"
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP: efficient security mechanisms for large-scale distributedsensor networks", pp. 62–72
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast", pp. 107–118
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2003, "LHAP: A lightweight network access control protocol for ad hoc networks", pp. 749-754
  • Sencun Zhu, S. Setia and S. Jajodia, 2003, "Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicas", Proceedings of the Fifth International Workshop on Networked Group Communications (NGC '03), pp. 107-118
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP - efficient security mechanisms for large-scale distributed sensor networks (Poster)", pp. 308–309
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP: efficient security mechanisms for large-scale distributedsensor networks", pp. 62–72
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2003, "LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-HocNetworks", pp. 749
  • Sanjeeve Setia, Sencun Zhu and Sushil Jajodia, 2002, "A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast", pp. 21–41
  • Yingjiu Li, Sencun Zhu, Lingyu Wang and Sushil Jajodia, 2002, "A Privacy-Enhanced Microaggregation Method", pp. 148–159
  • Y. Li, Sencun Zhu, L. Wang and S. Jajodia, 2002, "A Privacy Enhanced Microaggregation Method", Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems (FoIKS 2002), pp. 148-159

Magazines/Trade Publications

  • Sencun Zhu and Z. Xu, 2012, "Launching Phishing and Spam attacks on Android with Customized Notifications"

Research Projects

  • July 2016 - June 2019, "TWC: Small: Collaborative: Reputation-Escalation-as-a-Service: Analyses and Defenses," (Sponsor: National Science Foundation).
  •  2016 -  2017, "A Quantitative Approach for Measuring Security Risks of Mobile Apps," (Sponsor: BlueCoat, Inc.).
  • August 2013 - July 2017, "SHF: Small: Towards Obfuscation-Resilient Software Plagiarism Detection," (Sponsor: National Science Foundation).
  • October 2015 - September 2016, "New Techniques towards Active Cyber Defense," (Sponsor: National Security Agency).

Honors and Awards

  • Outstanding paper award, The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015., March 2015 - March 2015
  • Google Faculty Research Award, Google, 2013
  • International Security Conference (ISC 2011) Best Paper Award, June 2011
  • Sixth Applied Cryptography and Network Security Conference (ACNS 2008) Best Student Paper Award, June 2008 - June 2008
  • NSF CAREER Award, NSF, 2007
  • ICA DSN 2005 Conference Best Paper Award, 2005
  • Outstanding Ph.D. Student, Department of Information & Software Engineering, George Mason University, 2004
  • ACM SenSys 2003 Student Travel Award (15/45), ACM, 2003
  • IEEE ICDCS 2003 Student Travel Award, IEEE, 2003
  • Excellent Graduation Award, Tsinghua University, 1996

Service

Service to Penn State:

  • Committee Member, Faculty Search Committee (Security & Privacy), August 2016 - April 2017
  • Chairperson, Candidacy Exam on Security, 2013 - January 2017
  • Committee Member, Associate Dean search, 2017
  • Member, CSE Promotion and Tenure Committee, August 2013 - July 2016
  • Member, Distance Learning Committee, August 2012 - July 2015
  • Advisor, Student Gaming Association at Penn State, January 2009 - December 2014
  • Member, iMPS option on Computer & Network Security, 2011 - 2013
  • Chairperson, Candidacy Exam on Security, September 2012
  • President, Association of Chinese Faculty, 2009 - 2011
  • Member, Graduate Committee, August 2006 - July 2011
  • Member, Laboratory Committee, August 2005 - July 2009
  • Advisor, Engineering Advising Center (CMPEN), August 2009 - December 2009
  • Vice-PresidentAssociation of Chinese Faculty, 2007 - 2008
  • Chairperson, Candidacy Exam on Security, January 2007
  • Chairperson, Candidacy Exam on Security, September 2007
  • MonitorPh.D. Candidacy Exam B, January 2006
  • Committee Member, Search Committee (IST), January 2006 - May 2006
  • Member, Security/Privacy SIG (IST), 2011
  • Member, IST 220 Course Committee, 2013
  • Member, Graduate Committee, August 2015
  • Reviewer, March 2015
  • Advisor, PSU Graduate Student Association on Computer Security & Privacy, 2013
  • Faculty, meeting with faculty candidates, Penn State, 2004

Service to External Organizations:

  • Co-Organizer, General Co-Chair, IEEE Conference on Communications and Network Security (CNS 2017), Las Vegas, Oct. 9-11, 2017, 2017
  • Co-Organizer, Program Co-chair, Securecomm 2017, 2017
  • Co-Organizer, Program Co-chair, IFIP DBSEC, 2017
  • Committee Member, The ACM Conference on Computer and Communications Security (CCS), 2017
  • Committee Member, 3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), 2017
  • Committee Member, IEEE Infocom, 2013 - 2017
  • Committee Member, ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2011 - 2016
  • Committee Member, European Symposium on Research in Computer Security (ESORICS), 2016
  • Committee Member, International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2016
  • Area ChairIEEE Conference on Communications and Network Security (CNS), 2016
  • Member, Program Committee, July 2015
  • Member, Program Committee, September 2015
  • Member, Program Committee, October 2015
  • , Area Chairperson and Session Chair, September 2015
  • Member, Technical Program Committee, March 2015
  • Member, Technical Program Committee, May 2015
  • Member, Program Committee, July 2014
  • Member, October 2014
  • Member, Technical Program Committee, October 2014
  • Member, Program Committee, April 2014
  • Member, Program Committee, September 2014 - September 2014
  • Member, Technical Program Committee, September 2013
  • Member, Program Committee, April 2013
  • Member, Program Committee, April 2013
  • Chairperson, Area, October 2013
  • Member, Technical Program Committee, October 2013
  • Member, Program Committee, June 2013
  • Member, Program Committee, June 2012
  • Member, Program Committee, April 2012
  • Member, Technical Program Committee, September 2012
  • Member, Program Committee, December 2012
  • Member, Program Committee, February 2011
  • Member, Technical Program Committee, December 2011
  • Member, Program Committee, September 2011
  • Member, Program Committee, September 2011
  • Member, Program Committee, June 2011
  • Member, Program Committee, June 2011
  • Member, Program Committee, May 2011
  • Member, Program Committee, October 2011
  • Member, Program Committee, October 2011
  • Member, Program Committee, October 2010
  • Member, Program Committee, October 2010
  • Member, Technical Program Committee, November 2010
  • Member, Technical Program Committee, March 2010
  • Member, Technical Program Committee, May 2010
  • Member, Program Committee, June 2010
  • Member, Technical Program Committee, June 2010
  • Member, Technical Program Committee, June 2010
  • Officer, TreasurerOctober 2010
  • Officer, TreasurerApril 2010
  • Member, Technical Program Committee, September 2010
  • Member, Technical Program Committee, September 2009
  • Member, Technical Program Committee, September 2009
  • Officer, TreasurerNovember 2009
  • Member, Technical Program Committee, June 2009
  • Member, Technical Program Committee, March 2009
  • Member, Technical Program Committee, June 2008
  • Member, Technical Program Committee, October 2008
  • Member, Technical Program Committee, October 2008
  • Member, Technical Program Committee, September 2008
  • Officer, TreasurerOctober 2008
  • Member, Technical Program Committee, April 2008
  • Member, Technical Program Committee, December 2008
  • Member, Technical Program Committee, August 2008
  • Organizer, September 2008 - October 2008
  • Member, Technical Program Committee, August 2007
  • Member, Technical Program Committee, April 2007
  • Member, Program Committee, April 2007 - May 2007
  • Member, Technical Program Committee, October 2007 - November 2007
  • Officer, TreasurerOctober 2007 - November 2007
  • Member, Program Committee, June 2007
  • Member, Program Committee, May 2007
  • Member, Technical Program Committee, March 2007
  • Member, Program Committee, July 2006
  • Member, Technical Program Committee, November 2006
  • Co-Chairperson, October 2006
  • Member, Technical Program Committee, December 2006
  • Demo ChairJuly 2006
  • Member, Technical Program Committee, November 2005
  • Member, Program Committee, November 2005
  • Member, Program Committee, November 2005
  • Member, Program Committee, November 2005
  • Member, Technical Program Committee, July 2005
  • Member, Technical Program Committee, October 2004
  • Chairperson, October 2004
  • Chairperson, October 2004
  • Member, Technical Program Committee, January 2004
 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research in fields.

We offer B.S. degrees in electrical engineering, computer science and computer engineering and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

209 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667