DaeHun Nyang

According to our database1, DaeHun Nyang authored at least 98 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020

Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Code authorship identification using convolutional neural networks.
Future Gener. Comput. Syst., 2019

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019

W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Examining the Security of DDoS Detection Systems in Software Defined Networks.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

Gruut: A Fully-Decentralized P2P Public Ledger.
CoRR, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Privacy-Preserving Mobile Payment System for Mass Transit.
IEEE Trans. Intell. Transp. Syst., 2017

Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

RFlow<sup>+</sup>: An SDN-based WLAN monitoring and management framework.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Understanding the effectiveness of typosquatting techniques.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
Recyclable Counter With Confinement for Real-Time Per-Flow Measurement.
IEEE/ACM Trans. Netw., 2016

Anonymity-based authenticated key agreement with full binding property.
J. Commun. Networks, 2016

A simple proof of optimality for the MIN cache replacement policy.
Inf. Process. Lett., 2016

Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Short Dynamic Group Signature Scheme Supporting Controllable Linkability.
IEEE Trans. Inf. Forensics Secur., 2015

UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices.
IEEE Trans. Hum. Mach. Syst., 2015

Transaction authentication using complementary colors.
Comput. Secur., 2015

2014
Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014

Two-factor face authentication using matrix permutation transformation and a user password.
Inf. Sci., 2014

2013
Group signatures with controllable linkability for dynamic membership.
Inf. Sci., 2013

2011
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

A Software-Based Group Attestation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Privacy-Enhanced Deniable Authentication E-Mail Service.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010

Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009

More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2009

A-Kad: an anonymous P2P protocol based on Kad network.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Software-Based Remote Code Attestation in Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008

A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR, 2008

Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN.
J. Comput. Sci. Technol., 2007

Secret Key Revocation in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007

Proactive Code Verification Protocol in Wireless Sensor Network.
Proceedings of the Computational Science and Its Applications, 2007

Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006

Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Two Factor Face Authentication Scheme with Cancelable Feature.
Proceedings of the Advances in Biometric Person Authentication, 2005

Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005

2004
An Efficient Video Prefix-Caching Scheme in Wide Area Networks.
Proceedings of the Information Networking, 2004

Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.
Proceedings of the Information Networking, 2004

1999
A complete test sequence using cyclic sequence for conformance testing.
Comput. Commun., 1999

Preventing Double-Spent Coins from Revealing User's Whole Secret.
Proceedings of the Information Security and Cryptology, 1999


  Loading...