Sencun Zhu

12.1k total citations · 3 hit papers
166 papers, 7.9k citations indexed

About

Sencun Zhu is a scholar working on Computer Networks and Communications, Signal Processing and Information Systems. According to data from OpenAlex, Sencun Zhu has authored 166 papers receiving a total of 7.9k indexed citations (citations by other indexed papers that have themselves been cited), including 104 papers in Computer Networks and Communications, 64 papers in Signal Processing and 52 papers in Information Systems. Recurrent topics in Sencun Zhu's work include Advanced Malware Detection Techniques (63 papers), Network Security and Intrusion Detection (49 papers) and Security in Wireless Sensor Networks (48 papers). Sencun Zhu is often cited by papers focused on Advanced Malware Detection Techniques (63 papers), Network Security and Intrusion Detection (49 papers) and Security in Wireless Sensor Networks (48 papers). Sencun Zhu collaborates with scholars based in United States, China and Hong Kong. Sencun Zhu's co-authors include Sushil Jajodia, Sanjeev Setia, Guohong Cao, Xinran Wang, Peng Liu, Yi Yang, Dinghao Wu, Heng Xu, Yilu Zhou and Qinghua Li and has published in prestigious journals such as SHILAP Revista de lepidopterología, Sensors and IEEE Transactions on Wireless Communications.

In The Last Decade

Sencun Zhu

162 papers receiving 7.3k citations

Hit Papers

LEAP 2003 2026 2010 2018 2003 2006 2012 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sencun Zhu United States 45 5.3k 2.2k 2.1k 2.1k 611 166 7.9k
Dongyan Xu United States 42 3.8k 0.7× 2.1k 0.9× 2.2k 1.0× 2.2k 1.0× 342 0.6× 200 5.4k
Anmol Sheth United States 27 3.8k 0.7× 1.4k 0.6× 1.8k 0.8× 3.1k 1.5× 2.9k 4.7× 48 6.8k
Angelos D. Keromytis United States 40 4.1k 0.8× 4.1k 1.8× 2.0k 0.9× 2.8k 1.3× 701 1.1× 219 6.5k
Georgios Kambourakis Greece 33 3.5k 0.7× 2.3k 1.0× 1.5k 0.7× 2.0k 1.0× 724 1.2× 144 4.8k
Qi Li China 38 2.6k 0.5× 3.0k 1.4× 1.8k 0.8× 1.7k 0.8× 463 0.8× 381 5.5k
Byung-Gon Chun United States 31 6.5k 1.2× 1.7k 0.8× 3.3k 1.6× 2.5k 1.2× 1.2k 1.9× 82 8.5k
Angelos Stavrou United States 31 3.2k 0.6× 2.1k 0.9× 1.5k 0.7× 2.3k 1.1× 442 0.7× 175 4.5k
Miguel Castro United States 36 9.3k 1.7× 2.6k 1.2× 3.7k 1.7× 1.0k 0.5× 641 1.0× 96 10.9k
Xiaofeng Wang China 35 1.6k 0.3× 1.9k 0.8× 2.3k 1.0× 2.0k 0.9× 274 0.4× 170 4.0k
Hong Mei China 41 2.4k 0.5× 1.8k 0.8× 4.1k 1.9× 750 0.4× 655 1.1× 307 6.0k

Countries citing papers authored by Sencun Zhu

Since Specialization
Citations

This map shows the geographic impact of Sencun Zhu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sencun Zhu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sencun Zhu more than expected).

Fields of papers citing papers by Sencun Zhu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sencun Zhu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sencun Zhu. The network helps show where Sencun Zhu may publish in the future.

Co-authorship network of co-authors of Sencun Zhu

This figure shows the co-authorship network connecting the top 25 collaborators of Sencun Zhu. A scholar is included among the top collaborators of Sencun Zhu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sencun Zhu. Sencun Zhu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhu, Sencun, et al.. (2024). Privacy-Preserving Live Video Analytics for Drones via Edge Computing. Applied Sciences. 14(22). 10254–10254. 1 indexed citations
2.
3.
Wu, Chen, et al.. (2022). Toward Cleansing Backdoored Neural Networks in Federated Learning. ScholarSphere (Penn State Libraries). 820–830. 4 indexed citations
4.
Hao, Shuai, et al.. (2019). Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Transactions on Information Forensics and Security. 15. 3807–3818. 7 indexed citations
5.
Yu, Ting, et al.. (2019). Towards large-scale hunting for Android negative-day malware. 533–545. 7 indexed citations
6.
Ping, Li, et al.. (2014). M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks. Integrated Computer-Aided Engineering. 21(1). 19–34. 27 indexed citations
7.
Zhang, Fangfang, Dinghao Wu, Peng Liu, & Sencun Zhu. (2014). Program Logic Based Software Plagiarism Detection. 66–77. 38 indexed citations
8.
Xu, Zhi & Sencun Zhu. (2012). Abusing notification services on smartphones for phishing and spamming. Contributions to nephrology. 32. 1–1. 26 indexed citations
9.
Chen, Wenping, Sencun Zhu, & Deying Li. (2010). VAN: Vehicle-assisted shortest-time path navigation. 442–451. 18 indexed citations
10.
Wang, Xinran, Yoon‐Chan Jhi, Sencun Zhu, & Peng Liu. (2009). Detecting Software Theft via System Call Based Birthmarks. 149–158. 71 indexed citations
11.
Xu, Heng, et al.. (2008). Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation. Journal of the Association for Information Systems. 106. 9 indexed citations
12.
Wang, Xinran, Yoon‐Chan Jhi, Sencun Zhu, & Peng Liu. (2008). STILL: Exploit Code Detection via Static Taint and Initialization Analyses. 289–298. 42 indexed citations
13.
Yang, Yi, Xinran Wang, Sencun Zhu, & Guohong Cao. (2008). SDAP. ACM Transactions on Information and System Security. 11(4). 1–43. 97 indexed citations
14.
Yang, Yi, Sencun Zhu, & Guohong Cao. (2008). Improving sensor network immunity under worm attacks. 149–158. 53 indexed citations
15.
Liu, Peng, et al.. (2006). SigFree: a signature-free buffer overflow attack blocker. USENIX Security Symposium. 16. 45 indexed citations
16.
Zhu, Sencun & Donggang Liu. (2006). Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. 5 indexed citations
17.
Zhu, Sencun, Chao Yao, Donggang Liu, Sanjeev Setia, & Sushil Jajodia. (2006). Efficient security mechanisms for overlay multicast based content delivery. Computer Communications. 30(4). 793–806. 7 indexed citations
18.
Zhu, Sencun, Sanjeev Setia, & Sushil Jajodia. (2006). LEAP+. ACM Transactions on Sensor Networks. 2(4). 500–528. 487 indexed citations breakdown →
19.
Zhu, Sencun, Sanjeev Setia, Shouzhi Xu, & Sushil Jajodia. (2004). GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks. 42–51. 54 indexed citations
20.
Zhu, Sencun, Sanjeev Setia, & Sushil Jajodia. (2003). LEAP - efficient security mechanisms for large-scale distributed sensor networks.. 308–309. 102 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026