Jaejong Baek

Orcid: 0000-0001-8588-3524

According to our database1, Jaejong Baek authored at least 20 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

PendingMutent: An Authorization Framework for Preventing PendingIntent Attacks in Android-based Mobile Cyber-Physical Systems.
Proceedings of the 2025 ACM Workshop on Secure and Trustworthy Cyber-physical Systems, 2025

Harnessing Software-Defined Network for Cyber Deception Modeling and Analysis.
Proceedings of the IEEE Conference on Network Function Virtualization and Software-Defined Networking, 2025

Towards Collaboration-Aware Resource Sharing in Research Computing Infrastructures.
Proceedings of the 11th IEEE International Conference on Collaboration and Internet Computing, 2025

2024
Digital Evidence Chain of Custody: Navigating New Realities of Digital Forensics.
Proceedings of the 5th IEEE International Conference on Trust, 2024

Unveiling SDN Controller Identity through Timing Side Channel.
Proceedings of the 15th International Conference on Network of the Future, 2024

2023
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android.
Inf. Syst. Frontiers, April, 2023

SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2021
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
A Secure Distributed Ledger for Transactive Energy: The Electron Volt Exchange (EVE) Blockchain.
CoRR, 2020

2018
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A Comparison of Heuristic Algorithms for Bus Dispatch.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

An Improved Brain Storm Optimization with Learning Strategy.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

2016
Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6.
J. Inform. and Commun. Convergence Engineering, 2016

2013
A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks.
Telecommun. Syst., 2013

2012
A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs.
EURASIP J. Wirel. Commun. Netw., 2012


  Loading...