Photo of Sencun Zhu

Sencun Zhu

Associate Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering

W370 Westgate Building

sxz16@psu.edu

814-865-0995

Personal or Departmental Website

Research Areas:

Security and Privacy

Interest Areas:

Network and systems security, software plagiarism detection, smartphone security, children online safety, privacy.

 
 

 

Education

  • BS, Precision Instruments, Tsinghua University, 1996
  • ME, Signal Processing, University of Science & Technology of China, 1999
  • Ph D, Information Technology, George Mason University, 2004

Publications

Journal Articles

  • Yongzhong He, Ming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li and Aimin Yu, 2023, "Automatically Identifying CVE Affected Versions with Patches and Developer Logs", IEEE Transactions on Dependable and Secure Computing
  • Hao Fu, Pengfei Hu, Zizhan Zheng, Aveek Das, Parth Pathak, Tianbo Gu, Sencun Zhu and Prasant Mohapatra, 2021, "Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications", IEEE Transactions on Mobile Computing, 20, (10)
  • Alem Fitwi, Yu Chen, Sencun Zhu, Erik Blasch and Genshe Chen, 2021, "Privacy-Preserving Surveillance as an Edge Service Based on Lightweight Video Protection Schemes Using Face De-Identification and Window Masking", MDPI Electronics, 10, (3)
  • Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed and Khurram Shafique, 2021, "Toward A Network-Assisted Approach for Effective Ransomware Detection", EAI Endorsed Transactions on Security and Safety, 7, (24)
  • Yaguang Lin, Xiaoming Wang, Fei Hao, Yichuan Jiang, Yulei Wu, Geyong Min, Daojing He, Sencun Zhu and Wei Zhao, 2021, "Dynamic control of fraud information spreading in mobile social networks", IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51, (6)
  • Alem Fitwi, Yu Chen and Sencun Zhu, 2021, "Enforcing Privacy Preservation on Edge Cameras using Lightweight Video Frame Scrambling", IEEE Transactions on Services Computing
  • Alem Fitwi, Yu Chen and Sencun Zhu, 2021, "Lightweight Frame Scrambling Mechanisms for End-to-End Privacy in Edge Smart Surveillance", The Institution of Engineering and Technology (IET) Smart Cities
  • Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian Molloy, Suresh Chari, Ce Zhang and Quanlong Guan, 2021, "A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform", IEEE Transactions on Big Data, 7, (2)
  • Youssef Khazbak, Jingyao Fan, Sencun Zhu and Guohong Cao, 2020, "Preserving personalized location privacy in ride-hailing service", Tsinghua Science and Technology, 25, (6), pp. 743--757
  • Xiaolei Wang, Yuexiang Yang and Sencun Zhu, 2019, "Automated Hybrid Analysis of Android Malware Through Augmenting Fuzzing with Forced Execution", IEEE Transactions on Mobile Computing (TMC)
  • Daojing He, Yinrong Qiao, Shiqing Chen, Xiao Du, Wenjie Chen, Sencun Zhu and Mohsen Guizani, 2019, "A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles", IEEE Network, pp. 1-6
  • Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang and Xiangliang Zhang, 2019, "Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem", IEEE Transactions on Mobile Computing (TMC)
  • Song Yang, Chen Wu, Sencun Zhu and Haining Wang, 2019, "A Machine Learning Based Approach for Mobile App Rating Manipulation Detection", EAI Endorsed Transactions on Security and Safety, 5, (18)
  • Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander Aved and Sencun Zhu, 2019, "Detecting Malicious False Frame Injection Attacks on Video Surveillance at the Edge using Electrical Network Frequency Signals", MDPI Sensors Journal
  • Xing Liu, Jiqiang Liu, Wei Wang and Sencun Zhu, 2018, "Android Single Sign-On Security: Issues, Taxonomy and Directions", Elsevier Journal on Future Generation Computer Systems (FGCS)
  • Chu Huang, Yi Yang and Sencun Zhu, 2018, "An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process", EAI Transactions on Security and Safety
  • Nan Lan, Ming Jiang, Dinghao Wu, Liang Peng and Sencun Zhu, 2017, "Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection", IEEE Transactions on Software Engineering (TSE)
  • Chu Huang, Sencun Zhu, Quanlong Guan and Yongzhong He, 2017, "A Software Assignment Algorithm for Minimizing Worm Damage in Networked Systems", Elsevier Journal of Information Security and Applications
  • J. A. Ming, F. B. Zhang, D. A. Wu, P. A. Liu and Sencun Zhu, 2016, "Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection", IEEE Transactions on Reliability, 65, (4), pp. 1647-1664
  • Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei TONG, Dinghao Wu, Sencun Zhu and Kai Chen, 2016, "Software Plagiarism Detection: A Survey", Journal of Cyber Security
  • Y. A. Yang, Sencun Zhu and Guohong Cao, 2016, "Improving sensor network immunity under worm attacks: A software diversity approach", Ad Hoc Networks, 47, pp. 26-40
  • Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu and Dinghao Wu, 2015, "Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection", IEEE Transactions on Software Engineeering, 41, (9), pp. 925–943
  • Tianzhen Cheng, Ping Li, Sencun Zhu and Don Torrieri, 2014, "M-cluster and X-ray: Two methods for multi-jammer localization inwireless sensor networks", Integrated Computer-Aided Engineering, 21, (1), pp. 19–34
  • Qinghua Li, Wei Gao, Sencun Zhu and Guohong Cao, 2013, "To Lie or to Comply: Defending against Flood Attacks in DisruptionTolerant Networks", IEEE Transactions on Dependable and Secure Computing, 10, (3), pp. 168–182
  • Yi Yang, Min Shao, Sencun Zhu and Guohong Cao, 2013, "Towards statistically strong source anonymity for sensor networks", ACM Transactions on Sensor Networks, 9, (3), pp. 23 pages
  • Qinghua Li, Wei Gao, Sencun Zhu and Guohong Cao, 2013, "To Lie or to Comply: Defending against Flood Attacks in DisruptionTolerant Networks", IEEE Trans. Dependable Sec. Comput., 10, (3), pp. 168–182
  • Q Li, Sencun Zhu and G Cao, 2012, "A Routing Protocol for Socially Selfish Delay Tolerant Networks", 10, (8), pp. 1619-1632
  • Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao and Li Xie, 2012, "Replacement attacks: automatically evading behavior-based software birthmark", International Journal of Information Security, 11, (5), pp. 293–304
  • D He, J Bu, Sencun Zhu, S Chan and C Chen, 2011, "Distributed Access Control with Privacy Support in Wireless Sensor Networks", 10, (10), pp. 3472-3481
  • D Kong, Y Jhi, T Gong, Sencun Zhu, Peng Liu and H Xi, 2011, "SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection", 10, (5), pp. 269-283
  • X Jiang, W Hu, Sencun Zhu and G Cao, 2011, "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks", 17, (6), pp. 1513-1527
  • B Zhao, Z Xu, C Chi, Sencun Zhu and G Cao, 2011, "Mirroring Smartphones for Good: A Feasibility Study"
  • Xuan Jiang, Wenhui Hu, Sencun Zhu and Guohong Cao, 2011, "Compromise-resilient anti-jamming communication in wireless sensor networks", Wireless Networks, 17, (6), pp. 1513–1527
  • Xinran Wang, Chi-Chun Pan, Peng Liu and Sencun Zhu, 2010, "SigFree: A Signature-Free Buffer Overflow Attack Blocker", IEEE Transactions on Dependable and Secure Computing, 7, (1), pp. 65–79
  • Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao and Yi Yang, 2009, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", IEEE Transactions on Mobile Computing, 8, (8), pp. 1023–1038
  • Wensheng Zhang, Sencun Zhu and Guohong Cao, 2009, "Predistribution and local collaboration-based group rekeying for wireless sensor networks", Ad Hoc Networks, 7, (6), pp. 1229–1242
  • Wensheng Zhang, Sencun Zhu and Guohong Cao, 2009, "Editorial for special issue on privacy and security in wireless sensorand ad hoc networks", Ad Hoc Networks, 7, (8), pp. 1431–1433
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2008, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks", ACM Transactions on Information and System Security, 11, (4)
  • Liang Xie and Sencun Zhu, 2008, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification", ACM Transactions on Information and System Security, 11, (3), pp. 28
  • Hui Song, Sencun Zhu, Wensheng Zhang and Guohong Cao, 2008, "Least privilege and privilege deprivation: Toward tolerating mobilesink compromises in wireless sensor networks", TOSN, 4, (4)
  • Sencun Zhu, Sanjeev Setia, Sushil Jajodia and Peng Ning, 2007, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks", ACM Transactions on Sensor Networks, 3, (3), pp. 33
  • Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663–677
  • Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia and Sushil Jajodia, 2007, "Efficient security mechanisms for overlay multicast based content delivery", Elsevier Journal of Computer Communications, 30, (4), pp. 793–806
  • Hui Song, Sencun Zhu and Guohong Cao, 2007, "Attack-resilient time synchronization for wireless sensor networks", Ad Hoc Networks, 5, (1), pp. 112–125
  • Qijun Gu, Peng Liu, Chao-Hsien Chu and Sencun Zhu, 2007, "Defence against packet injection in ad hoc networks", International Journal of Security and Networks, Special Issue on Computer and Network Security, 2, (1/2), pp. 154–169
  • Hung-Yuan Hsu, Sencun Zhu and Ali R. Hurson, 2007, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network", International Journal of Security and Networks, Special Issue on Cryptography in Networks, 2, (3/4), pp. 202–215
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2006, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks", ACM Transaction on Sensor Networks, 2, (4), pp. 500–528
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2006, "LHAP: A lightweight network access control protocol for ad hoc networks", Ad Hoc Networks, 4, (5), pp. 567–585
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
  • Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang and Sushil Jajodia, 2006, "Looking into the seeds of time: Discovering temporal patterns in large transaction sets", Journal Information Sciences, 176, (8), pp. 1003–1031
  • Sencun Zhu, Sanjeev Setia, Shouhuai Xu and Sushil Jajodia, 2006, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks", Journal of Computer Security, 14, (4), pp. 301–325
  • Qijun Gu, C.-H. Chu, Peng Liu and Sencun Zhu, 2006, "Slander-resistant forwarding isolation in ad hoc networks", International Journal of Mobile Network Design and Innovation, 1, (3/4), pp. 162–174
  • Q. Gu, C.-H. Chu, P. Liu and Sencun Zhu, 2006, "Slander Resistant Attacker Isolation in Ad Hoc Networks", International Journal of Mobile Network Design and Innovation (IJMNDI), 1, (3/4), pp. 162-174
  • Sanjeev Setia, Sencun Zhu and Sushil Jajodia, 2002, "A comparative performance analysis of reliable group rekey transport protocols for secure multicast", Performance Evaluation, 49, (1–4), pp. 21 - 41
  • Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu and Sushil Jajodia, , "Understanding the Manipulation on Recommender Systems through Web Injection", IEEE Transactions on Information Forensics and Security (TIFS)

Conference Proceedings

  • Chongqi Guan, Guohong Cao and Sencun Zhu, 2024, "HoneyLLM: Enabling Shell honeypots with Large Language Models", Univ. Park, United States, pp. 9
  • Chen Wu, Sencun Zhu, Prasenjit Mitra and Wei Wang, 2024, "Unlearning Backdoor Attacks in Federated Learning", Univ. Park, United States, pp. 9
  • Beibei Zhou, Daojing He, Sencun Zhu, ShanShan Zhu, Sammy Chan and Xiao Yang, 2023, "Password Cracking by Exploiting User Group Information"
  • Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2023, "HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices", Univ. Park, United States, pp. 9
  • Chongqi Guan, Xianda Chen, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2022, "HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video", Univ. Park, United States, pp. 9
  • Yuanyi Sun, Sencun Zhu, Yan Zhao and Pengfei Sun, 2022, "A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks", United States, pp. 9
  • Dan Su, Sencun Zhu, Jiqiang Liu, Wei Wang and Yang Xiao, 2022, "Alexa Skills: Security Vulnerabilities and Countermeasures", pp. 9
  • Yuanyi Sun, Sencun Zhu and Yu Chen, 2022, "ZoomP^3: Privacy-Preserving Publishing of Online Video Conference Recordings.", Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PETS), Univ. Park, United States, 2022, (3), pp. 20
  • Chen Wu, Xian Yang, Sencun Zhu and Prasenjit Mitra, 2022, "Toward Cleansing Backdoored Neural Networks in Federated Learning", Univ. Park, United States
  • Lunpin Yuan, Euijin Choo, Ting Yu, Issa Khalil and Sencun Zhu, 2021, "Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users", Proceedings of the 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • Lunpin Yuan, Peng Liu and Sencun Zhu, 2021, "Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs", Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
  • Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan and Yao Cheng, 2020, "Android-based Cryptocurrency Wallets: Attacks and Countermeasures", pp. 9--16
  • Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu and David J Miller, 2020, "Backdoor embedding in convolutional neural network models via invisible perturbation", pp. 97--108
  • Qi Qiao, Daojing He, Yun Gao, Sencun Zhu, Jiahao Gao and Sammy Chan, 2020, "Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems", pp. 1--9
  • Yuanyi Sun, Shiqing Chen, Sencun Zhu and Yu Chen, 2020, "iRyP: a purely edge-based visual privacy-respecting system for mobile cameras", pp. 195--206
  • Alem Fitwi, Yu Chen and Sencun Zhu, 2020, "PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service", pp. 125--134
  • Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu and Sammy Chan, 2020, "TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems", pp. 205--214
  • Xiaolei Wang, ANDREA CONTINELLA, YUEXIANG Yang, Yongzhong He and Sencun Zhu, 2019, "LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications"
  • Alem Fitwi, Yu Chen and Sencun Zhu, 2019, "No Peeking through My Windows: Conserving Privacy in Personal Drones", Proceedings of IEEE International Smart Cities Conference (ISC2)
  • Alem Fitwi, Yu Chen and Sencun Zhu, 2019, "A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge", pp. 552--555
  • Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch and Sencun Zhu, 2019, "A study on smart online frame forging attacks against video surveillance system", 11017, pp. 110170L
  • Mshabab Alrizah, Sencun Zhu, Xinyu Xing and Gang Wang, 2019, "Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems", pp. 230--244
  • Hao Fu, Zizhan Zheng, Sencun Zhu and Prasant Mohapatra, 2019, "Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection", pp. 2089--2097
  • Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia and Bo Luo, 2019, "Protecting mobile devices from physical memory attacks with targeted encryption", pp. 34--44
  • Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu and Sencun Zhu, 2019, "Towards large-scale hunting for Android negative-day malware", pp. 533--545
  • Chen Cao, Lunpin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun and Sencun Zhu, 2018, "Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs."
  • Youssef Khazbak, Jingyao Fan, Sencun Zhu and Guohong Cao, 2018, "Preserving Location Privacy in Ride-Hailing Service"
  • Lunpin Yuan, Peng Liu and Sencun Zhu, 2018, "Android STAR: An Efficient Interaction-Preserving Record-Replay System for Messenger App Usage Surveillance"
  • Liao Cong, Haoti Zhong, Sencun Zhu and Anna Squicciarini, 2018, "Server-Based Manipulation Attacks Against Machine Learning Models", Univ. Park, United States
  • Xiaolei Wang, Sencun Zhu, Dehua Zhou and Yuexiang Yang, 2017, "Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware"
  • Xin Chen, Heqing Huang, Sencun Zhu, Qing Li and Quanlong Guan, 2017, "SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS"
  • Chuangang Ren, Peng Liu and Sencun Zhu, 2017, "WindowGuard: Systematic Protection of GUI Security in Android."
  • Hao Chen, Daojing He, Sencun Zhu and Jingshun Yang, 2017, "Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets"
  • Xing Liu, Sencun Zhu, Wei Wang and Jiqiang Liu, 2016, "Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem"
  • Heqing Huang, Cong Zheng, Wu Zhou, Junyuan Zeng, Sencun Zhu, Peng Liu, Suresh and Ce Zhang, 2016, "Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study"
  • L. Luo, Y. Fu, Dinghao Wu, Sencun Zhu and P Liu, 2016, "Repackage-proofing android apps"
  • Zhen Xie, Sencun Zhu, Qing Li and Wenjing Wang, 2016, "You Can Promote, But You Can’t Hide: Large-Scale Abused App Detection in Mobile App Stores"
  • Q Guan, Hai Huang, W. Luo and Sencun Zhu, 2016, "Semantics-based repackaging detection for mobile apps", pp. pp. 89-105
  • Heqing Huang, Sencun Zhu, Kai Chen and Peng Liu, 2015, "From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App", pp. 1236–1247
  • Chu Huang, Sencun Zhu, and , , 2015, "Multi-objective Software Assignment for Active Cyber Defense", pp. 220-228
  • Xin Chen and Sencun Zhu, 2015, "DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications.", pp. 12
  • Zhen Xie and Sencun Zhu, 2015, "AppWatcher: unveiling the underground market of trading mobile app reviews", pp. 11
  • Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu and Dinghao Wu, 2015, "Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android", pp. 7–18
  • Zhi Xu and Sencun Zhu, 2015, "SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones", ACM, pp. 61–72
  • H. Huang, K. Chen, Peng Liu, Sencun Zhu and D. Wu, 2015, "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms", Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015, 153, pp. 7 pages
  • Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu and Sencun Zhu, 2014, "Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection", pp. 389–400
  • Fangfang Zhang, Dinghao Wu, Peng Liu and Sencun Zhu, 2014, "Program Logic Based Software Plagiarism Detection", pp. 66–77
  • L. Li , Sencun Zhu, D. Torrieri and S. Jajodia, 2014, "Self-healing wireless networks under insider jamming attacks", pp. 220-228
  • C. Huang, Sencun Zhu and R. Erbacher, 2014, "Toward Software Diversity in Heterogeneous Networked Systems", pp. 114-129
  • X. Chen, J. Cho and Sencun Zhu, 2014, "GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks", IEEE, pp. 275-283
  • Zhen Xie and Sencun Zhu, 2014, "GroupTie: toward hidden collusion group discovery in app stores", pp. 153–164
  • Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu and Peng Liu, 2014, "ViewDroid: towards obfuscation-resilient mobile application repackaging detection", pp. 25–36
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2013, "Permlyzer: Analyzing permission usage in Android applications", pp. 400–410
  • Ying Chen, Sencun Zhu, Heng Xu and Yilu Zhou, 2013, "Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness", pp. 196–203
  • Heqing Huang, Sencun Zhu, Peng Liu and Dinghao Wu, 2013, "A Framework for Evaluating Mobile App Repackaging Detection Algorithms", pp. 169–186
  • Xin Chen, Harshal Patankar, Sencun Zhu, Mudhakar Srivatsa and Jeff Opper, 2013, "Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks", pp. 131–139
  • Ying Chen, Heng Xu, Yilu Zhou and Sencun Zhu, 2013, "Is This App Safe for Children?: A Comparison Study of Maturity Ratings on Android and iOS Applications", pp. 201–212
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2013, "JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code", pp. 117–128
  • Vivek Natarajan, Yi Yang and Sencun Zhu, 2012, "Secure Trust Metadata Management for Mobile Ad-Hoc Networks", pp. 164-180
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2012, "The power of obfuscation techniques in malicious JavaScript code:A measurement study", IEEE Computer Society, pp. 9–16
  • Z Xu, H Hsu, X. Chen, Sencun Zhu and A Hurson, 2012, "AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks", pp. 147-168
  • Ying Chen, Yilu Zhou, Sencun Zhu and Heng Xu, 2012, "Detecting Offensive Language in Social Media to Protect Adolescent Online Safety", pp. 71–80
  • Z Xu and Sencun Zhu, 2012, "Abusing Notification Services on Smartphones for Phishing and Spamming", pp. 11 pages
  • F Zhang, Y Jhi, D Wu, Peng Liu and Sencun Zhu, 2012, "A First Step Towards Algorithm Plagiarism Detection", pp. 111-121
  • C Huang, Sencun Zhu and D Wu, 2012, "Towards Trusted Services: Result Verification Schemes for Map Reduce", pp. 41-48
  • Z Xu, K Bai and Sencun Zhu, 2012, "TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors", pp. 113-124
  • T Cheng, P Liu and Sencun Zhu, 2012, "An Algorithm for Jammer Localization in Wireless Sensor Networks", pp. 724-731
  • V Natarajan, Sencun Zhu, M Srivatsa and J Opper, 2012, "Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks", pp. 376-383
  • Chu Huang, Sencun Zhu and Dinghao Wu, 2012, "Towards Trusted Services: Result Verification Schemes for MapReduce", pp. 41–48
  • T Cheng, Peng Liu and Sencun Zhu, 2011, "Multi-jammer Localization in Wireless Sensor Networks", pp. 736-740
  • V Natarajan, Y Yi and Sencun Zhu, 2011, "Resource-Misuse Attack Detection in Delay-Tolerant Networks", pp. 8 pages
  • Z Xu, K Bai, Sencun Zhu, L Liu and R Moulic, 2011, "Context-Related Access Control for Mobile Caching", pp. 20 pages
  • Z Xin, H Cheng, X Wang, Peng Liu, Sencun Zhu and B Zhao, 2011, "Replacement Attacks on Behavior Based Software Birthmark", pp. 1-16
  • A Chaugule, Z Xu and Sencun Zhu, 2011, "A Specification Based Intrusion Detection Framework for Mobile Phones", pp. 19-37
  • Y C Jhi, X Wang, X Jia, Sencun Zhu, Peng Liu and D Wu, 2011, "Value-Based Program Characterization and Its Application to Software Plagiarism Detection", pp. 756-765
  • Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan and Chun Chen, 2011, "Distributed privacy-preserving access control in a single-owner multi-usersensor network", pp. 331–335
  • X Jiang, W Hu, Sencun Zhu and G Cao, 2010, "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks", pp. 140-154
  • Wei Xu, Fangfang Zhang and Sencun Zhu, 2010, "Toward worm detection in online social networks", ACM, pp. 11–20
  • B Zhao, Z Xu, C Chi, Sencun Zhu and G Cao, 2010, "Mirroring Smartphones for Good: A Feasibility Study", pp. 26-38
  • Wenping Chen, Sencun Zhu and Deying Li, 2010, "VAN: Vehicle-assisted shortest-time path navigation", IEEE, pp. 442–451
  • Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu and Hongsheng Xi, 2010, "SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection", pp. 269-283
  • Z. Xu and Sencun Zhu, 2010, "Filtering Offensive Language in Online Communities using Grammatical Relations", pp. 10 pages
  • Wei Xu, Sencun Zhu and Heng Xu, 2010, "COP: A Step toward Children Online Privacy", Springer-Verlag LNCS, 6123, pp. 529–544
  • Hung-Yuan Hsu, Sencun Zhu and Ali R. Hurson, 2010, "A hotspot-based protocol for attack traceback in mobile ad hoc networks", ACM, pp. 333–336
  • Liang Xie, Xinwen Zhang, Jean-Pierre Seifert and Sencun Zhu, 2010, "pBMDS: a behavior-based malware detection system for cellphone devices", ACM, pp. 37–48
  • Qinghua Li, Sencun Zhu and Guohong Cao, 2010, "Routing in Socially Selfish Delay Tolerant Networks", IEEE, pp. 857–865
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2009, "Detecting Software Theft via System Call Based Birthmarks", pp. 149–158
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2009, "Behavior based software theft detection", pp. 280–290
  • Yi Yang, Sencun Zhu, Guohong Cao and Thomas F Laporta, 2009, "An Active Global Attack Model for Sensor Source Location Privacy:Analysis and Countermeasures", pp. 373–393
  • Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent R Jaeger and Sencun Zhu, 2009, "Designing System-Level Defenses against Cellphone Malware", pp. 83–90
  • G. Ruan, S. Jain and Sencun Zhu, 2009, "SensorEar: A Sensor Network Based Eavesdropping System", pp. 8
  • Min Shao, Wenhui Hu, Sencun Zhu, Guohong Cao, Srikanth Krishnamurth and Thomas F Laporta, 2009, "Cross-layer Enhanced Source Location Privacy in Sensor Networks", pp. 1–9
  • Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu and Guohong Cao, 2009, "A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses", pp. 2455–2463
  • Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan and Antonio Nucci, 2009, "A Social Network Based Patching Scheme for Worm Containment in CellularNetworks", pp. 1476–1484
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2008, "STILL: Exploit Code Detection via Static Taint and InitializationAnalyses", pp. 289–298
  • Heng Xu, Nazneen Irani, Sencun Zhu and Wei Xu, 2008, "Alleviating Parental Concerns for Children’s Online Privacy: A ValueSensitive Design Investigation", pp. 106
  • Min Shao, Sencun Zhu, Guohong Cao, Thomas F Laporta and Prasant Mohapatra, 2008, "A cross-layer dropping attack in video streaming over ad hoc networks", pp. 25
  • Liang Xie, Hui Song and Sencun Zhu, 2008, "On the Effectiveness of Internal Patching Against File-Sharing Worms", pp. 1–20
  • Yi Yang, Sencun Zhu and Guohong Cao, 2008, "Improving sensor network immunity under worm attacks: a software diversity approach", pp. 149–158
  • Hui Song, Sencun Zhu and Guohong Cao, 2008, "SVATS: A Sensor-Network-Based Vehicle Anti-Theft System", pp. 2128–2136
  • Min Shao, Yi Yang, Sencun Zhu and Guohong Cao, 2008, "Towards Statistically Strong Source Anonymity for Sensor Networks", pp. 51–55
  • Xinran Wang, Yoon-chan Jhi, Sencun Zhu and Peng Liu, 2008, "Protecting web services from remote exploit code: a static analysis approach (poster)", pp. 1139–1140
  • Liang Xie, Hui Song, Trent R Jaeger and Sencun Zhu, 2008, "A systematic approach for cell-phone worm containment (poster)", pp. 1083–1084
  • Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar and Guohong Cao, 2008, "Towards event source unobservability with minimum network trafficin sensor networks", pp. 77–88
  • Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu and Sencun Zhu, 2008, "Detecting Remote Exploits Using Data Mining", pp. 177–189
  • Heng Xu, Nazneen Irani, Sencun Zhu and Wei Xu, 2008, "Alleviating Parental Concerns for Children’s Online Privacy: A ValueSensitive Design Investigation", pp. 106
  • Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar and Guohong Cao, 2008, "Towards event source unobservability with minimum network trafficin sensor networks", pp. 77–88
  • M. Masud, L. Kahn, B. Thuraisingham, X. Wang, P. Liu and Sencun Zhu, 2008, "A Data Mining Technique to Detect Remote Exploits", Proceedings of the Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, pp. 14
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2007, "Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks", pp. 219–230
  • Heesook Choi, Sencun Zhu and Thomas F Laporta, 2007, "SET: Detecting node clones in sensor networks", pp. 341–350
  • L. Xie and Sencun Zhu, 2007, "A Study on Defending against Ultra-Fast Topological Worms", Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp. 61-68
  • Liang Xie and Sencun Zhu, 2007, "A Feasibility Study on Defending Against Ultra-Fast Topological Worms", pp. 61–70
  • Wensheng Zhang, Minh Tran, Sencun Zhu and Guohong Cao, 2007, "A random perturbation-based scheme for pairwise key establishment in sensor networks", pp. 90–99
  • Hui Song, Liang Xie, Sencun Zhu and Guohong Cao, 2007, "Sensor node compromise detection: the location perspective", pp. 242–247
  • Min Shao, Sencun Zhu, Wensheng Zhang and Guohong Cao, 2007, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", pp. 1298–1306
  • Liang Xie and Sencun Zhu, 2007, "A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms", pp. 61–70
  • Liang Xie and Sencun Zhu, 2006, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification", pp. 1–10
  • Xinran Wang, Chi-Chun Pan, Peng Liu and Sencun Zhu, 2006, "SigFree: A Signature-free Buffer Overflow Attack Blocker", USENIX Association, Berkeley, CA, USA
  • Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, 2006, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks", pp. 356–367
  • Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu and Thomas F Laporta, 2006, "Establishing Pair-Wise Keys in Heterogeneous Sensor Networks"
  • Qijun Gu, C.-H. Chu, Peng Liu and Sencun Zhu, 2005, "Slander-resistant forwarding isolation in ad hoc networks", pp. 12
  • Hui Song, Sencun Zhu and Guohong Cao, 2005, "Attack-resilient time synchronization for wireless sensor networks"
  • Qijun Gu, Peng Liu, Sencun Zhu and Chao-Hsien Chu, 2005, "Defending against packet injection attacks unreliable ad hoc networks", pp. 5
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel and Mahmut T Kandemir, 2005, "The sleep deprivation attack in sensor networks: analysis and methods of defense"
  • Donggang Liu, Peng Ning, Sencun Zhu and Sushil Jajodia, 2005, "Practical Broadcast Authentication in Sensor Networks", pp. 118–132
  • Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia and Sushil Jajodia, 2005, "Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution", pp. 40–55
  • Wensheng Zhang, Hui Song, Sencun Zhu and Guohong Cao, 2005, "Least privilege and privilege deprivation: towards tolerating mobilesink compromises in wireless sensor networks", pp. 378–389
  • Q. Gu, C.-H. Chu, P. Liu and Sencun Zhu, 2005, "Slander Resistant Attacker Isolation in Ad Hoc Networks", Proceedings of the International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM 2005)
  • Sencun Zhu, Sanjeev Setia, Shouhuai Xu and Sushil Jajodia, 2004, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Network", pp. 42–51
  • Sencun Zhu, Sanjeev Setia, Sushil Jajodia and Peng Ning, 2004, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks", pp. 259–271
  • Sencun Zhu and Sushil Jajodia, 2003, "Scalable Group Rekeying for Secure Multicast: A Survey", pp. 1–10
  • Sencun Zhu, S. Xu, S. Setia and S. Jajodia, 2003, "Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach"
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP: efficient security mechanisms for large-scale distributedsensor networks", pp. 62–72
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast", pp. 107–118
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2003, "LHAP: A lightweight network access control protocol for ad hoc networks", pp. 749-754
  • Sencun Zhu, S. Setia and S. Jajodia, 2003, "Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicas", Proceedings of the Fifth International Workshop on Networked Group Communications (NGC '03), pp. 107-118
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP - efficient security mechanisms for large-scale distributed sensor networks (Poster)", pp. 308–309
  • Sencun Zhu, Sanjeev Setia and Sushil Jajodia, 2003, "LEAP: efficient security mechanisms for large-scale distributedsensor networks", pp. 62–72
  • Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, 2003, "LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-HocNetworks", pp. 749
  • Sanjeeve Setia, Sencun Zhu and Sushil Jajodia, 2002, "A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast", pp. 21–41
  • Yingjiu Li, Sencun Zhu, Lingyu Wang and Sushil Jajodia, 2002, "A Privacy-Enhanced Microaggregation Method", pp. 148–159
  • Y. Li, Sencun Zhu, L. Wang and S. Jajodia, 2002, "A Privacy Enhanced Microaggregation Method", Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems (FoIKS 2002), pp. 148-159
  • Hao Fu, Zizan Zheng, Sencun Zhu and Prasant Mohapatra, , "Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection"

Magazines/Trade Publications

  • Daojing He, Hongjie Gu, Tinghui Li, Yongliang Du, Xiaolei Wang, Sencun Zhu and Nadra Guizani, 2021, "Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware", IEEE Network, 35, (1)
  • Daojing He, Xiaoxia Liu, Jiajia Zheng, Sammy Chen, Sencun Zhu, Weidong Min and Nadra Guizani, 2020, "A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems", IEEE Network Magazine, 34, (4)
  • Daojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min and Nadra Guizani, 2020, "Security analysis of cryptocurrency wallets in android-based applications", IEEE Network, 34, (6), pp. 114--119
  • Sencun Zhu and Z. Xu, 2012, "Launching Phishing and Spam attacks on Android with Customized Notifications"

Research Projects

Honors and Awards

Service

Service to Penn State:

Service to External Organizations:

 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research fields.

We offer B.S. degrees in electrical engineering, computer science, computer engineering and data science and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

207 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667