Jung-Min Park

According to our database1, Jung-Min Park authored at least 92 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing.
IEEE Trans. Cogn. Comm. & Networking, 2019

IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications.
CoRR, 2019

Heterogeneous Coexistence of Cognitive Radio Networks in TV White Space.
CoRR, 2019

IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications.
IEEE Access, 2019

PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Uplink Resource Allocation in IEEE 802.11ax.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Thwarting Location Inference Attacks in Database-Driven Spectrum Sharing.
IEEE Trans. Cogn. Comm. & Networking, 2018

Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System.
IACR Cryptology ePrint Archive, 2018

Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research.
IEEE Communications Surveys and Tutorials, 2018

Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Performance Analysis of Uplink Multi-User OFDMA in IEEE 802.11ax.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Preserving the Incumbent Users' Location Privacy in the 3.5 GHz Band.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2018

SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions.
IEEE Trans. Mob. Comput., 2017

Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
PoPETs, 2017

Transmitter authentication using hierarchical modulation in dynamic spectrum sharing.
J. Network and Computer Applications, 2017

Software-Defined LTE Evolution Testbed Enabling Rapid Prototyping and Controlled Experimentation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Coexistence of DSRC and Wi-Fi: Impact on the performance of vehicular safety applications.
Proceedings of the IEEE International Conference on Communications, 2017

Co-Existence of NB-IoT and Radar in Shared Spectrum: An Experimental Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

TESSO: An analytical tool for characterizing aggregate interference and enabling spatial spectrum sharing.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

2016
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement.
IEEE Trans. Information Forensics and Security, 2016

An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research.
IEEE Trans. Cogn. Comm. & Networking, 2016

Incentivizing spectrum sensing in database-driven dynamic spectrum sharing.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Location Privacy of Non-Stationary Incumbent Systems in Spectrum Sharing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
PSUN: An OFDM scheme for coexistence with pulsed radar.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Multi-tier exclusion zones for dynamic spectrum sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Defining incumbent protection zones on the fly: Dynamic boundaries for spectrum sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems.
IEEE Trans. Wireless Communications, 2014

Addressing the Hidden Terminal Problem for Heterogeneous Coexistence Between TDM and CSMA Networks in White Space.
IEEE Trans. Vehicular Technology, 2014

Uplink Soft Frequency Reuse for Self-Coexistence of Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2014

Security and Enforcement in Spectrum Sharing.
Proceedings of the IEEE, 2014

Supporting mobile users in database-driven opportunistic spectrum access.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A group-theoretic framework for rendezvous in heterogeneous cognitive radio networks.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Securing a distributed policy-based cognitive radio.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

PHY-layer authentication using hierarchical modulation and duobinary signaling.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Protecting the primary users' operational privacy in spectrum sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

Blind Transmitter Authentication for Spectrum Security and Enforcement.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2013

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention.
IEEE Network, 2013

POCKET: A tool for protecting children's privacy online.
Decision Support Systems, 2013

Security of Spectrum Learning in Cognitive Radios
CoRR, 2013

A feature partitioning approach to casebased reasoning in cognitive radios.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

PHY-layer authentication by introducing controlled inter symbol interference.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces.
IEEE Wireless Commun., 2012

Spectrum Access Technologies: The Past, the Present, and the Future.
Proceedings of the IEEE, 2012

Robustness against Byzantine Failures in Distributed Spectrum Sensing.
Computer Communications, 2012

Spectrum access policy reasoning for policy-based cognitive radios.
Computer Networks, 2012

Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Physical layer authentication using controlled inter symbol interference.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

Ontology-based spectrum access policies for policy-based cognitive radios.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Security of Cognitive Radios.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Control Channel Establishment in Cognitive Radio Networks using Channel Hopping.
IEEE Journal on Selected Areas in Communications, 2011

Asynchronous channel hopping for establishing rendezvous in cognitive radio networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Channel Aggregation in Cognitive Radio Networks with Practical Considerations.
Proceedings of IEEE International Conference on Communications, 2011

2009
Cognitive Radio and Networking Research at Virginia Tech.
Proceedings of the IEEE, 2009

Evaluation of Online Resources in Assisting Phishing Detection.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

A quorum-based framework for establishing control channels in dynamic spectrum access networks.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009

A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Tamper Resistance for Software Defined Radio Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Defense against Primary User Emulation Attacks in Cognitive Radio Networks.
IEEE Journal on Selected Areas in Communications, 2008

Toward secure distributed spectrum sensing in cognitive radio networks.
IEEE Communications Magazine, 2008

Security vulnerabilities in IEEE 802.22.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Robust Distributed Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

On Providing Automatic Parental Consent over Information Collection from Children.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks.
IEEE Trans. Parallel Distrib. Syst., 2007

Key management for long-lived sensor networks in hostile environments.
Computer Communications, 2007

Network anomaly detection with incomplete audit data.
Computer Networks, 2007

An overview of anomaly detection techniques: Existing solutions and latest technological trends.
Computer Networks, 2007

Link-Layer Traceback in Ethernet Networks.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

Segment-Based Channel Assignment in Cognitive Radio Ad Hoc Networks.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

Parents and the Internet: Privacy Awareness, Practices and Control.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks.
I. J. Network Security, 2006

An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

CARE: Enhancing Denial-of-Service Resilience in Mobile Ad Hoc Networks.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

RIM: Router Interface Marking for IP Traceback.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Allocation of QoS connections in MF-TDMA satellite systems: a two-phase approach.
IEEE Trans. Vehicular Technology, 2005

Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

SECK: survivable and efficient clustered keying for wireless sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Detecting denial-of-service attacks with incomplete audit data.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2003
Efficient multicast stream authentication using erasure codes.
ACM Trans. Inf. Syst. Secur., 2003

Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

A certified e-mail protocol suitable for mobile environments.
Proceedings of the Global Telecommunications Conference, 2003

2002
Efficient Multicast Packet Authentication Using Signature Amortization.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002


  Loading...