Wireless sensor networks S Limin, L Jianzhong, C Yu, Z Hongsong Beijing: Tsinghua University Press 5, 7-8, 2005 | 424 | 2005 |
TPLinker: Single-stage joint extraction of entities and relations through token pair linking Y Wang, B Yu, Y Zhang, T Liu, H Zhu, L Sun arXiv preprint arXiv:2010.13415, 2020 | 418 | 2020 |
{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation Y Zheng, A Davanian, H Yin, C Song, H Zhu, L Sun 28th USENIX Security Symposium (USENIX Security 19), 1099-1114, 2019 | 340 | 2019 |
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods Z Wang, H Zhu, L Sun Ieee Access 9, 11895-11910, 2021 | 176 | 2021 |
Defining social engineering in cybersecurity Z Wang, L Sun, H Zhu IEEE Access 8, 85094-85115, 2020 | 168 | 2020 |
Security and privacy in localization for underwater sensor networks H Li, Y He, X Cheng, H Zhu, L Sun IEEE Communications Magazine 53 (11), 56-62, 2015 | 98 | 2015 |
Application of internet of things in power-line monitoring X Chen, L Sun, H Zhu, Y Zhen, H Chen 2012 International conference on cyber-enabled distributed computing and …, 2012 | 84 | 2012 |
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection S Yang, L Cheng, Y Zeng, Z Lang, H Zhu, Z Shi 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 74 | 2021 |
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples Z Wang, H Zhu, P Liu, L Sun Cybersecurity 4, 1-21, 2021 | 66 | 2021 |
Understanding and securing device vulnerabilities through automated bug report analysis X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019 | 65 | 2019 |
Exploiting FM radio data system for adaptive clock calibration in sensor networks L Li, G Xing, L Sun, W Huangfu, R Zhou, H Zhu Proceedings of the 9th international conference on Mobile systems …, 2011 | 61 | 2011 |
Nonidentical linear pulse-coupled oscillators model with application to time synchronization in wireless sensor networks Z An, H Zhu, X Li, C Xu, Y Xu, X Li IEEE Transactions on Industrial Electronics 58 (6), 2205-2215, 2009 | 59 | 2009 |
Discontinuous named entity recognition as maximal clique discovery Y Wang, B Yu, H Zhu, T Liu, N Yu, L Sun arXiv preprint arXiv:2106.00218, 2021 | 55 | 2021 |
Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks W YANG, LI Pan, H ZHU The Journal of China Universities of Posts and Telecommunications 20 (1), 11-25, 2013 | 51 | 2013 |
RestThing: A Restful Web service infrastructure for mash-up physical and Web resources W Qin, Q Li, L Sun, H Zhu, Y Liu 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011 | 49 | 2011 |
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation Y Zheng, Y Li, C Zhang, H Zhu, Y Liu, L Sun Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 41 | 2022 |
Coff: Contact-duration-aware cellular traffic offloading over delay tolerant networks Z Li, Y Liu, H Zhu, L Sun IEEE Transactions on Vehicular Technology 64 (11), 5257-5268, 2014 | 41 | 2014 |
When llms meet cybersecurity: A systematic literature review J Zhang, H Bu, H Wen, Y Chen, L Li, H Zhu arXiv preprint arXiv:2405.03644, 2024 | 36 | 2024 |
Probability based dynamic load-balancing tree algorithm for wireless sensor networks T Yan, Y Bi, L Sun, H Zhu International Conference on Networking and Mobile Computing, 682-691, 2005 | 34 | 2005 |
Security OSIF: Toward automatic discovery and analysis of event based cyber threat intelligence K Li, H Wen, H Li, H Zhu, L Sun 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 28 | 2018 |