DaeHun Nyang

Orcid: 0000-0001-5183-891X

Affiliations:
  • Ewha Womans University, Information Security Research Laboratory, Seoul, South Korea
  • Inha University, Information Security Research Laboratory, Incheon, Republic of Korea
  • Yonsei University, Seoul, South Korea (PhD 2000)


According to our database1, DaeHun Nyang authored at least 141 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Measuring and Modeling the Free Content Web.
CoRR, 2023

SHIELD: Thwarting Code Authorship Attribution.
CoRR, 2023

Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation.
Proceedings of the Information Security Applications - 24th International Conference, 2023

A Robust Counting Sketch for Data Plane Intrusion Detection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Untargeted Code Authorship Evasion with Seq2Seq Transformation.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

2022
A One-Page Text Entry Method Optimized for Rectangle Smartwatches.
IEEE Trans. Mob. Comput., 2022

DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.
IEEE Syst. J., 2022

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022

Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis.
CoRR, 2022

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022

Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

Do Content Management Systems Impact the Security of Free Content Websites?
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022

A Scalable and Dynamic ACL System for In-Network Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021

Large-scale and Robust Code Authorship Identification with Deep Feature Learning.
ACM Trans. Priv. Secur., 2021

SSD-Assisted Ransomware Detection and Data Recovery Techniques.
IEEE Trans. Computers, 2021

Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools.
J. Netw. Comput. Appl., 2021

Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021

Empirically comparing the performance of blockchain's consensus algorithms.
IET Blockchain, 2021

Count-Less: A Counting Sketch for the Data Plane of High Speed Switches.
CoRR, 2021

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR, 2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021

A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021

Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems.
Proceedings of the International Conference on Information Networking, 2021

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020

Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020

From Blue-Sky to Practical Adversarial Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Code authorship identification using convolutional neural networks.
Future Gener. Comput. Syst., 2019

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019

W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Distributed Network Resource Sharing AP in Inter-WLAN Environments.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Examining the Security of DDoS Detection Systems in Software Defined Networks.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

Gruut: A Fully-Decentralized P2P Public Ledger.
CoRR, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Privacy-Preserving Mobile Payment System for Mass Transit.
IEEE Trans. Intell. Transp. Syst., 2017

Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

RFlow<sup>+</sup>: An SDN-based WLAN monitoring and management framework.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Understanding the effectiveness of typosquatting techniques.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
Recyclable Counter With Confinement for Real-Time Per-Flow Measurement.
IEEE/ACM Trans. Netw., 2016

Anonymity-based authenticated key agreement with full binding property.
J. Commun. Networks, 2016

A simple proof of optimality for the MIN cache replacement policy.
Inf. Process. Lett., 2016

Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Short Dynamic Group Signature Scheme Supporting Controllable Linkability.
IEEE Trans. Inf. Forensics Secur., 2015

UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices.
IEEE Trans. Hum. Mach. Syst., 2015

Transaction authentication using complementary colors.
Comput. Secur., 2015

2014
Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014

Two-factor face authentication using matrix permutation transformation and a user password.
Inf. Sci., 2014

2013
Group signatures with controllable linkability for dynamic membership.
Inf. Sci., 2013

2011
Batch Verification and Finding Invalid Signatures in a Group Signature Scheme.
Int. J. Netw. Secur., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

A Software-Based Group Attestation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Privacy-Enhanced Deniable Authentication E-Mail Service.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010

On the Security of Two Group Signature Schemes with Forward Security.
Informatica (Slovenia), 2010

Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

Security Analysis of a Threshold Proxy Signature Scheme.
IACR Cryptol. ePrint Arch., 2010

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009

More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2009

A-Kad: an anonymous P2P protocol based on Kad network.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Software-Based Remote Code Attestation in Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008

A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR, 2008

Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN.
J. Comput. Sci. Technol., 2007

Secret Key Revocation in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007

Proactive Code Verification Protocol in Wireless Sensor Network.
Proceedings of the Computational Science and Its Applications, 2007

Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006

Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Two Factor Face Authentication Scheme with Cancelable Feature.
Proceedings of the Advances in Biometric Person Authentication, 2005

Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005

2004
An Efficient Video Prefix-Caching Scheme in Wide Area Networks.
Proceedings of the Information Networking, 2004

Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.
Proceedings of the Information Networking, 2004

2000
Knowledge-proof based versatile smart card verification protocol.
Comput. Commun. Rev., 2000

1999
A complete test sequence using cyclic sequence for conformance testing.
Comput. Commun., 1999

Preventing Double-Spent Coins from Revealing User's Whole Secret.
Proceedings of the Information Security and Cryptology, 1999


  Loading...