Incheol Shin

According to our database1, Incheol Shin authored at least 21 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Boosting in-transit entertainment: deep reinforcement learning for intelligent multimedia caching in bus networks.
Soft Comput., December, 2023

AptaTrans: a deep neural network for predicting aptamer-protein interaction using pretrained encoders.
BMC Bioinform., December, 2023

2022
Aptamer- Protein Interaction Prediction using Transformer.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2022

2020
Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image.
IEICE Trans. Inf. Syst., 2020

2016
Optimal packet scan against malicious attacks in smart grids.
Theor. Comput. Sci., 2016

2014
Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency.
Mob. Networks Appl., 2014

Optimal Inspection Points for Malicious Attack Detection in Smart Grids.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

2013
Whitelisting for Critical IT-Based Infrastructure.
IEICE Trans. Commun., 2013

A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.
Proceedings of the SEGS'13, 2013

DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure.
Proceedings of the SEGS'13, 2013

2012
On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
A Novel Approach Against Reactive Jamming Attacks.
Ad Hoc Sens. Wirel. Networks, 2011

2010
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach.
IEEE Trans. Parallel Distributed Syst., 2010

On approximation of dominating tree in wireless sensor networks.
Optim. Lett., 2010

Construction of Virtual Backbone with Multiple Factors Constraints in Wireless Ad-hoc Network.
Ad Hoc Sens. Wirel. Networks, 2010

2009
Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes.
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing, 2009

On trigger detection against reactive Jamming Attacks: A clique-independent set based approach.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network.
Proceedings of the Wireless Algorithms, 2008

Trade-off scheme for fault tolerant connected dominating sets on size and diameter.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

On Detection of Malicious Users Using Group Testing Techniques.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008


  Loading...