Jung-Min Park

Orcid: 0000-0002-4879-8467

Affiliations:
  • Virginia Tech, Blacksburg, VA, USA
  • Purdue University, West Lafayette, IN, USA (PhD 2003)


According to our database1, Jung-Min Park authored at least 112 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Your Airspace: Detection of Drones Trespassing Protected Areas.
Sensors, April, 2024

OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones.
Sensors, March, 2024

2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023

iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023

PILOT: High-Precision Indoor Localization for Autonomous Drones.
IEEE Trans. Veh. Technol., May, 2023

EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

2022
Detecting Out-of-Distribution Data in Wireless Communications Applications of Deep Learning.
IEEE Trans. Wirel. Commun., 2022

RAIL: Robust Acoustic Indoor Localization for Drones.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

SPIN: Sensor Placement for Indoor Navigation of Drones.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

2021
"Seeing is Not Always Believing": Detecting Perception Error Attacks Against Autonomous Vehicles.
IEEE Trans. Dependable Secur. Comput., 2021

Cumulative Message Authentication Codes for Resource-Constrained IoT Networks.
IEEE Internet Things J., 2021

Coexistence of Wi-Fi 6E and 5G NR-U: Can We Do Better in the 6 GHz Bands?
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Can Wi-Fi 7 Support Real-Time Applications? On the Impact of Multi Link Aggregation on Latency.
Proceedings of the ICC 2021, 2021

2020
Spectrum Sharing Among Rapidly Deployable Small Cells: A Hybrid Multi-Agent Approach.
IEEE Trans. Wirel. Commun., 2020

Dynamic Exclusion Zones for Protecting Primary Users in Database-Driven Spectrum Sharing.
IEEE/ACM Trans. Netw., 2020

Next Generation Wi-Fi and 5G NR-U in the 6 GHz Bands: Opportunities & Challenges.
CoRR, 2020

Next Generation Wi-Fi and 5G NR-U in the 6 GHz Bands: Opportunities and Challenges.
IEEE Access, 2020

C<sup>2</sup> RC: Channel Congestion-based Re-transmission Control for 3GPP-based V2X Technologies.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

ROLATIN: Robust Localization and Tracking for Indoor Navigation of Drones.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Cumulative Message Authentication Codes for Resource-Constrained Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing.
IEEE Trans. Cogn. Commun. Netw., 2019

Heterogeneous Coexistence of Cognitive Radio Networks in TV White Space.
CoRR, 2019

IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications.
IEEE Access, 2019

PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Uplink Resource Allocation in IEEE 802.11ax.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Estimating the Required Training Dataset Size for Transmitter Classification Using Deep Learning.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Impact of Wi-Fi Transmissions on C-V2X Performance.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

2018
Thwarting Location Inference Attacks in Database-Driven Spectrum Sharing.
IEEE Trans. Cogn. Commun. Netw., 2018

Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System.
IACR Cryptol. ePrint Arch., 2018

Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research.
IEEE Commun. Surv. Tutorials, 2018

Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Performance Analysis of Uplink Multi-User OFDMA in IEEE 802.11ax.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Preserving the Incumbent Users' Location Privacy in the 3.5 GHz Band.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2018

SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions.
IEEE Trans. Mob. Comput., 2017

Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Proc. Priv. Enhancing Technol., 2017

Transmitter authentication using hierarchical modulation in dynamic spectrum sharing.
J. Netw. Comput. Appl., 2017

Software-Defined LTE Evolution Testbed Enabling Rapid Prototyping and Controlled Experimentation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Coexistence of DSRC and Wi-Fi: Impact on the performance of vehicular safety applications.
Proceedings of the IEEE International Conference on Communications, 2017

Co-Existence of NB-IoT and Radar in Shared Spectrum: An Experimental Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

TESSO: An analytical tool for characterizing aggregate interference and enabling spatial spectrum sharing.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

2016
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement.
IEEE Trans. Inf. Forensics Secur., 2016

An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research.
IEEE Trans. Cogn. Commun. Netw., 2016

Incentivizing spectrum sensing in database-driven dynamic spectrum sharing.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Location Privacy of Non-Stationary Incumbent Systems in Spectrum Sharing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
PSUN: An OFDM scheme for coexistence with pulsed radar.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Multi-tier exclusion zones for dynamic spectrum sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Defining incumbent protection zones on the fly: Dynamic boundaries for spectrum sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems.
IEEE Trans. Wirel. Commun., 2014

Addressing the Hidden Terminal Problem for Heterogeneous Coexistence Between TDM and CSMA Networks in White Space.
IEEE Trans. Veh. Technol., 2014

Uplink Soft Frequency Reuse for Self-Coexistence of Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2014

Security and Enforcement in Spectrum Sharing.
Proc. IEEE, 2014

Supporting mobile users in database-driven opportunistic spectrum access.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A group-theoretic framework for rendezvous in heterogeneous cognitive radio networks.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Securing a distributed policy-based cognitive radio.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

PHY-layer authentication using hierarchical modulation and duobinary signaling.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Protecting the primary users' operational privacy in spectrum sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

Blind Transmitter Authentication for Spectrum Security and Enforcement.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2013

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention.
IEEE Netw., 2013

POCKET: A tool for protecting children's privacy online.
Decis. Support Syst., 2013

Security of Spectrum Learning in Cognitive Radios
CoRR, 2013

A feature partitioning approach to casebased reasoning in cognitive radios.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

PHY-layer authentication by introducing controlled inter symbol interference.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces.
IEEE Wirel. Commun., 2012

Spectrum Access Technologies: The Past, the Present, and the Future.
Proc. IEEE, 2012

Robustness against Byzantine Failures in Distributed Spectrum Sensing.
Comput. Commun., 2012

Spectrum access policy reasoning for policy-based cognitive radios.
Comput. Networks, 2012

Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Physical layer authentication using controlled inter symbol interference.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

Ontology-based spectrum access policies for policy-based cognitive radios.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Security of Cognitive Radios.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Control Channel Establishment in Cognitive Radio Networks using Channel Hopping.
IEEE J. Sel. Areas Commun., 2011

Asynchronous channel hopping for establishing rendezvous in cognitive radio networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Channel Aggregation in Cognitive Radio Networks with Practical Considerations.
Proceedings of IEEE International Conference on Communications, 2011

2009
Cognitive Radio and Networking Research at Virginia Tech.
Proc. IEEE, 2009

Evaluation of Online Resources in Assisting Phishing Detection.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

A quorum-based framework for establishing control channels in dynamic spectrum access networks.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009

A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Tamper Resistance for Software Defined Radio Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Defense against Primary User Emulation Attacks in Cognitive Radio Networks.
IEEE J. Sel. Areas Commun., 2008

Toward secure distributed spectrum sensing in cognitive radio networks.
IEEE Commun. Mag., 2008

Security vulnerabilities in IEEE 802.22.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Robust Distributed Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

On Providing Automatic Parental Consent over Information Collection from Children.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks.
IEEE Trans. Parallel Distributed Syst., 2007

Key management for long-lived sensor networks in hostile environments.
Comput. Commun., 2007

Network anomaly detection with incomplete audit data.
Comput. Networks, 2007

An overview of anomaly detection techniques: Existing solutions and latest technological trends.
Comput. Networks, 2007

Link-Layer Traceback in Ethernet Networks.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

Segment-Based Channel Assignment in Cognitive Radio Ad Hoc Networks.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

Parents and the Internet: Privacy Awareness, Practices and Control.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks.
Int. J. Netw. Secur., 2006

An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

CARE: Enhancing Denial-of-Service Resilience in Mobile Ad Hoc Networks.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

RIM: Router Interface Marking for IP Traceback.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Allocation of QoS connections in MF-TDMA satellite systems: a two-phase approach.
IEEE Trans. Veh. Technol., 2005

Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

SECK: survivable and efficient clustered keying for wireless sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Detecting denial-of-service attacks with incomplete audit data.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2003
Efficient multicast stream authentication using erasure codes.
ACM Trans. Inf. Syst. Secur., 2003

Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

A certified e-mail protocol suitable for mobile environments.
Proceedings of the Global Telecommunications Conference, 2003

2002
Efficient Multicast Packet Authentication Using Signature Amortization.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002


  Loading...