Search

Search Constraints

Start Over You searched for: Committee Member Sencun Zhu Remove constraint Committee Member: Sencun Zhu

Search Results

2. SUPPORTING NEW SERVICES IN 3G NETWORKS: ENERGY AND SECURITY PERSPECTIVES

open_access
Open Access

4. Supporting Multi-Missions In Wireless Sensor Networks

open_access
Open Access

6. PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS

open_access
Open Access

7. A SECURITY FRAMEWORK FOR MOBILE AD HOC NETWORKS

open_access
Open Access

8. SECURE WIRELESS SENSOR NETWORKS: BUILDING BLOCKS AND APPLICATIONS

open_access
Open Access

10. RESOURCE ALLOCATION IN WIRELESS NETWORKS

open_access
Open Access

13. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK

open_access
Open Access

14. Secure Communications in Sensor Networks

open_access
Open Access

16. DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID

open_access
Open Access

17. Secure Systems Development Using Security-Typed Languages

open_access
Open Access

18. Adaptive Social Networking With Applications To Security

open_access
Open Access

19. Mitigating Congestion in Wireless Networks

open_access
Open Access

22. UTILITY-BASED DYNAMIC RESOURCE OPTIMIZATION IN MISSION-ORIENTED WIRELESS SENSOR NETWORKS

open_access
Open Access

24. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks

open_access
Open Access

26. Protecting software from attack and theft via program analysis

open_access
Open Access

27. zeta functions of complexes from PGSp(4)

open_access
Open Access

28. A STUDY OF SELECTED SECURITY MEASURES AGAINST NON-LEGITIMATE USE OF CODE

open_access
Open Access

29. VARIATION-AWARE BEHAVIORAL SYNTHESIS FOR NANOMETER VLSI CHIPS

open_access
Open Access

30. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY

open_access
Open Access

31. Towards Compromise Resilient Wireless Sensor Networks

open_access
Open Access

32. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS

open_access
Open Access

33. DESIGNING AND SECURING AN EVENT PROCESSING SYSTEM FOR SMART SPACES

open_access
Open Access

34. Virtualization-based Security Analysis of Production Server Systems

open_access
Open Access

35. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach

open_access
Open Access

36. Data Service Analysis, Threats and Countermeasures in Wireless Mobile Environments

open_access
Open Access

41. Node Misbehavior Detection and Secure Trust Metadata Management in Mobile Networks

open_access
Open Access

43. Security and Privacy of New Features on Smartphones

open_access
Open Access

46. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty

open_access
Open Access

48. Security and Privacy Mechanisms for Web and Third-party Applications

open_access
Open Access

49. Broadband Optical Wireless Communications

open_access
Open Access

53. Real-time Ventricular Fibrillation Detection for Pervasive Health Monitorinng

open_access
Open Access

57. Protect Children Online Safety on Social Media and Mobile Platforms

open_access
Open Access

59. Resilient and Efficient Data Access in Cognitive Radio Networks

open_access
Open Access

60. Improving Software Security With Concurrent Monitoring, Automated Diagnosis, and Self-shielding

open_access
Open Access

61. Identifying Private Data Leakage Threats in Web Browsers

open_access
Open Access

63. Protecting Server Programs and Systems: Privilege Separation, Attack Surface Reduction, And Risk Assessment

open_access
Open Access

64. New Techniques for Trustworthy Mobile Computing

open_access
Open Access

65. Energy Optimization for Smartphones in Wireless Networks

open_access
Open Access

68. Efficient and Quality-Aware Data Access in Mobile Opportunistic Networks

open_access
Open Access

70. TOWARDS TRUSTWORTHY RATING SYSTEMS FOR MOBILE APP STORES

open_access
Open Access

72. Making Sense of Conflict in Distributed Teams: A Design Science Approach

open_access
Open Access

75. Stochastic Resource Allocation Strategies With Uncertain Information In Sensor Networks

open_access
Open Access

76. Program Analysis Based Bloatware Mitigation and Software Customization

open_access
Open Access

77. Semisupervised Active Learning and Group Anomaly Detection with Unknown or Label-Scarce Categories

open_access
Open Access

83. Improving Capacity and Robustness of Wireless Networks

open_access
Open Access

87. Opaque Predicate: Attack and Defense in Obfuscated Binary Code

open_access
Open Access

88. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis

open_access
Open Access

89. Advanced Software Obfuscation Techniques and Applications

open_access
Open Access

91. Energy-efficient Computation Offloading in Wireless Networks

open_access
Open Access

92. Detection and Prevention: Toward Secure Mobile Robotic Systems

open_access
Open Access

93. Machine-Learning-Based Approaches for Learning Marketing Strategies

open_access
Open Access

94. Towards Secure Solutions for Cloud Applications

open_access
Open Access

95. User Protection in Social Networks using Machine Learning Techniques

open_access
Open Access

96. ON IMPROVING THE UTILITY FOR DATA ANALYSES UNDER DIFFERENTIAL PRIVACY

open_access
Open Access

97. Reinforcement learning for adaptive cyber defense: Algorithms, analysis and experiments

open_access
Open Access

98. Ensuring Service Integrity in Cloud Computing

open_access
Open Access

100. Preserving Privacy in Wireless and Mobile Systems

open_access
Open Access