Jin-Hee Cho

According to our database1, Jin-Hee Cho authored at least 126 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
CSL+: Scalable Collective Subjective Logic under Multidimensional Uncertainty.
ACM Trans. Intell. Syst. Technol., 2021

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021

Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021

Online Social Deception and Its Countermeasures: A Survey.
IEEE Access, 2021

2020
Attack Graph-Based Moving Target Defense in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2020

Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020

Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense.
J. Netw. Comput. Appl., 2020

Multidimensional Uncertainty-Aware Evidential Neural Networks.
CoRR, 2020

A Survey on Centrality Metrics and Their Implications in Network Resilience.
CoRR, 2020

Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey.
CoRR, 2020

Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation.
CoRR, 2020

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception.
CoRR, 2020

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey.
CoRR, 2020

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense.
IEEE Commun. Surv. Tutorials, 2020

Deep Reinforcement Learning with Adaptive Update Target Combination.
Comput. J., 2020

Optimizing the Lifetime of IoT-Based Star and Mesh Networks.
IEEE Access, 2020

Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Uncertainty Aware Semi-Supervised Learning on Graph Data.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Uncertainty-based False Information Propagation in Social Networks.
ACM Trans. Soc. Comput., 2019

Network Adaptations Under Cascading Failures for Mission-Oriented Networks.
IEEE Trans. Netw. Serv. Manag., 2019

Metrics Towards Measuring Cyber Agility.
IEEE Trans. Inf. Forensics Secur., 2019

Quantifying Classification Uncertainty using Regularized Evidential Neural Networks.
CoRR, 2019

Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things.
CoRR, 2019

BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019

COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks.
IEEE Access, 2019

Trust Management of Smart Service Communities.
IEEE Access, 2019

Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

The Interplay of Emotions and Norms in Multiagent Systems.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Rating Reliability and Bias in News Articles: Does AI Assistance Help Everyone?
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Uncertainty-based Decision Making Using Deep Reinforcement Learning.
Proceedings of the 22th International Conference on Information Fusion, 2019

SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Uncertainty-Aware Opinion Inference Under Adversarial Attacks.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

2018
CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks.
IEEE Trans. Serv. Comput., 2018

Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth.
IEEE Trans. Inf. Forensics Secur., 2018

PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks.
IEEE Trans. Dependable Secur. Comput., 2018

Dynamics of Uncertain and Conflicting Opinions in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2018

SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT.
IEEE Internet Things J., 2018

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Optimal Deployments of Defense Mechanisms for the Internet of Things.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

On IoT Misbehavior Detection in Cyber Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A 1.2V 64Gb 341GB/S HBM2 stacked DRAM with spiral point-to-point TSV structure and improved bank group data control.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018

Percolation-based Network Adaptability Under Correlated Failures.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Deep Learning Based Scalable Inference of Uncertain Opinions.
Proceedings of the IEEE International Conference on Data Mining, 2018

Is Uncertainty Always Bad?: Effect of Topic Competence on Uncertain Opinions.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Quantifying the security effectiveness of network diversity: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Quantifying the security effectiveness of firewalls and DMZs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Uncertainty Characteristics of Subjective Opinions.
Proceedings of the 21st International Conference on Information Fusion, 2018

Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Adaptive Situational Leadership Framework.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2018

Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Deep Learning for Predicting Dynamic Uncertain Opinions in Network Data.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks.
IEEE Trans. Serv. Comput., 2017

Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2017

A Survey on Systems Security Metrics.
ACM Comput. Surv., 2017

A Survey on Modeling and Optimizing Multi-Objective Systems.
IEEE Commun. Surv. Tutorials, 2017

Software Defined Network Based Virtual Machine Placement in Cloud Systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

PDGM: Percolation-based directed graph matching in social networks.
Proceedings of the IEEE International Conference on Communications, 2017

Modeling and Analysis of Uncertainty-Based False Information Propagation in Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Collective subjective logic: Scalable uncertainty-based opinion inference.
Proceedings of the 2017 IEEE International Conference on Big Data, 2017

2016
Trust threshold based public key management in mobile ad hoc networks.
Ad Hoc Networks, 2016

Metrics and measurement of trustworthy systems.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Interaction-based Reputation Model in Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Privacy and Social Capital in Online Social Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Extracting attack narratives from traffic datasets.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

2015
Tradeoffs Between Trust and Survivability for Mission Effectiveness in Tactical Networks.
IEEE Trans. Cybern., 2015

A 1.2 V 8 Gb 8-Channel 128 GB/s High-Bandwidth Memory (HBM) Stacked DRAM With Effective I/O Test Circuits.
IEEE J. Solid State Circuits, 2015

A Survey on Trust Modeling.
ACM Comput. Surv., 2015

TANDEM: a trust-based agent framework for networked decision making.
Comput. Math. Organ. Theory, 2015

On modeling of adversary behavior and defense for survivability of military MANET applications.
Proceedings of the 34th IEEE Military Communications Conference, 2015

trustd: Trust daemon experimental testbed for network emulation.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

ComTrustO: Composite trust-based ontology framework for information and decision fusion.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing.
IEEE Trans. Parallel Distributed Syst., 2014

Trust management in mobile ad hoc networks for bias minimization and application performance maximization.
Ad Hoc Networks, 2014

An exact measurement and repair circuit of TSV connections for 128GB/s high-bandwidth memory(HBM) stacked DRAM.
Proceedings of the Symposium on VLSI Circuits, 2014

GlobalTrust: An attack-resilient reputation system for tactical networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

25.3 A 1.35V 5.0Gb/s/pin GDDR5M with 5.4mW standby power and an error-adaptive duty-cycle corrector.
Proceedings of the 2014 IEEE International Conference on Solid-State Circuits Conference, 2014

Finding true and credible information on Twitter.
Proceedings of the 17th International Conference on Information Fusion, 2014

A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation.
Proceedings of the 17th International Workshop on Trust in Agent Societies co-located with the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2014), 2014

2013
Building Trust-Based Sustainable Networks.
IEEE Technol. Soc. Mag., 2013

On the tradeoff between altruism and selfishness in MANET trust management.
Ad Hoc Networks, 2013

Composite trust-based public key management in mobile ad hoc networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trust and independence aware decision fusion in distributed networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Integrated social and quality of service trust management of mobile groups in ad hoc networks.
Proceedings of the 9th International Conference on Information, 2013

2012
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks.
Wirel. Pers. Commun., 2012

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., 2012

A 1.0-ns/1.0-V Delay-Locked Loop With Racing Mode and Countered CAS Latency Controller for DRAM Interfaces.
IEEE J. Solid State Circuits, 2012

Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks.
J. Netw. Comput. Appl., 2012

Composite Trust Model for an Information Sharing Scenario.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

A Provenance-Based Trust Model for Delay Tolerant Networks.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

2011
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems.
Wirel. Pers. Commun., 2011

Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks.
Perform. Evaluation, 2011

A Survey on Trust Management for Mobile Ad Hoc Networks.
IEEE Commun. Surv. Tutorials, 2011

Hierarchical trust management for wireless sensor networks and its application to trust-based routing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Evaluation of network trust using provenance based on distributed local intelligence.
Proceedings of the MILCOM 2011, 2011

Combinatorial auction-based multiple dynamic mission assignment.
Proceedings of the MILCOM 2011, 2011

On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Trust-Threshold Based Routing in Delay Tolerant Networks.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Trust-Based Intrusion Detection in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks.
Wirel. Networks, 2010

Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
IEEE Trans. Reliab., 2010

Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Trust Management for Encounter-Based Routing in Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2010

2009
Self-Localization Algorithm for a Mobile Air Cleaner.
Int. J. Fuzzy Log. Intell. Syst., 2009

Performance analysis of distributed intrusion detection protocols for mobile group communication systems.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks.
PhD thesis, 2008

On optimal batch rekeying for secure group communications in wireless networks.
Wirel. Networks, 2008

Performance optimization of region-based group key management in mobile ad hoc networks.
Perform. Evaluation, 2008

Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Effect of intrusion detection on secure group communications in hierarchically structured group architectures.
Proceedings of the LCN 2008, 2008

Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2006
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

A series of development methodologies for a variety of systems in Korea.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Organization of Embedded System Development Methodology for Developing Product Family.
Proceedings of the IASTED International Conference on Software Engineering, 2006


  Loading...