Name
Affiliation
Papers
SENCUN ZHU
Department of Computer Science and Engineering and College of Information Systems and Technology, The Pennsylvania State University, USA
140
Collaborators
Citations 
PageRank 
218
2581
135.53
Referers 
Referees 
References 
5265
2765
2086
Search Limit
1001000
Title
Citations
PageRank
Year
Toward Cleansing Backdoored Neural Networks in Federated Learning00.342022
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware00.342021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks20.372021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications00.342021
Security Analysis of Cryptocurrency Wallets in Android-Based Applications00.342020
Understanding The Manipulation On Recommender Systems Through Web Injection00.342020
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem10.352020
Android-based Cryptocurrency Wallets: Attacks and Countermeasures00.342020
A Study on Smart Online Frame Forging Attacks against Video Surveillance System.10.402019
Protecting mobile devices from physical memory attacks with targeted encryption00.342019
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications10.362019
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection.00.342019
Automated Hybrid Analysis of Android Malware Through Augmenting Fuzzing With Forced Execution20.392019
Preserving Location Privacy in Ride-Hailing Service.00.342018
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.00.342018
Server-Based Manipulation Attacks Against Machine Learning Models.00.342018
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.00.342018
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.30.412018
Defence Mechanisms for Public Systems.00.342018
WindowGuard: Systematic Protection of GUI Security in Android.60.462017
INSPIRED: Intention-based Privacy-preserving Permission Model.00.342017
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.00.342017
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.40.392016
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.00.342016
You can promote, but you can't hide: large-scale abused app detection in mobile app stores.20.362016
Repackage-Proofing Android Apps20.362016
AppWatcher: unveiling the underground market of trading mobile app reviews100.532015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection80.472015
DroidJust: automated functionality-aware privacy leakage analysis for Android applications120.512015
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.00.342014
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks110.542014
GroupTie: toward hidden collusion group discovery in app stores90.602014
Self-healing wireless networks under insider jamming attacks00.342014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection511.082014
GlobalTrust: An attack-resilient reputation system for tactical networks10.382014
Program Logic Based Software Plagiarism Detection150.522014
ViewDroid: towards obfuscation-resilient mobile application repackaging detection320.982014
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks20.402013
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.371.332013
Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications140.782013
Towards statistically strong source anonymity for sensor networks461.212013
AK-PPM: an authenticated packet attribution scheme for mobile ad hoc networks20.362012
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors1424.172012
Replacement attacks: automatically evading behavior-based software birthmark10.352012
An Algorithm for Jammer Localization in Wireless Sensor Networks120.632012
A first step towards algorithm plagiarism detection280.942012
Towards Trusted Services: Result Verification Schemes for MapReduce130.632012
The power of obfuscation techniques in malicious JavaScript code: A measurement study220.972012
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks10.362012
Value-based program characterization and its application to software plagiarism detection371.552011
  • 1
  • 2