Sang-Yoon Chang

According to our database1, Sang-Yoon Chang authored at least 47 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
$\mathcal{PT}$-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution.
CoRR, 2021

2020
$\mathcal{PT}$-Symmetric Unambiguous Distinguishing of Three Quantum States.
CoRR, 2020

Share Withholding Attack in Blockchain Mining: Technical Report.
CoRR, 2020

Discriminating an Arbitrary Number of Pure Quantum States by the Combined CPT and Hermitian Measurements.
CoRR, 2020

Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Share Withholding in Blockchain Mining.
Proceedings of the Security and Privacy in Communication Networks, 2020

Mining Power Misestimation in PoW Blockchain.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Voting Credential Management System for Electronic Voting Privacy.
Proceedings of the 2020 IFIP Networking Conference, 2020

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Dynamic power control for rational cryptocurrency mining.
Proceedings of the CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2020

Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Query-Crafting DoS Threats Against Internet DNS.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019

Fast IP Hopping Randomization to Secure Hop-by-Hop Access in SDN.
IEEE Trans. Netw. Serv. Manag., 2019

Addressing Skewness in Iterative ML Jobs with Parameter Partition.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Silent Timestamping for Blockchain Mining Pool Security.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Anti-Withholding Reward System to Secure Blockchain Mining Pools.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Resilient SDN-Based Communication in Vehicular Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Distributed Security Network Functions against Botnet Attacks in Software-defined Networks.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks.
IEEE Trans. Mob. Comput., 2017

Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Graphic model analysis of frauds in online consumer reviews.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Dynamic cost-effective emergency network provision.
Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief, 2017

Securing balise-based train control systems using cryptographic random fountains.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Protecting vehicular networks privacy in the presence of a single adversarial authority.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016

Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Fast address hopping at the switches: Securing access for packet forwarding in SDN.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Demo: Free Data Communication Using Wireless Charging.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Watermarking for detecting freeloader misbehavior in software-defined networks.
Proceedings of the 2016 International Conference on Computing, 2016

2015
A Lightweight Encryption and Secure Protocol for Smartphone Cloud.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

Noah: Keyed Noise Flooding for Wireless Confidentiality.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Improving Encryption Performance Using MapReduce.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Securing wireless medium access control against insider denial-of-service attackers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013

2012
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

2011
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...