Sihyung Lee

Orcid: 0000-0001-7945-3763

According to our database1, Sihyung Lee authored at least 23 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Implementation of Grover's Iterator for Quantum Searching With an Arbitrary Number of Qubits.
IEEE Access, 2024

2023
Quantum Program Synthesis Through Operator Learning and Selection.
IEEE Access, 2023

Transfer Learning-Based Intrusion Detection System for a Controller Area Network.
IEEE Access, 2023

Event Message Clustering Algorithm for Selection of Majority Message in VANETs.
IEEE Access, 2023

2022
Smart Roads for Autonomous Accident Detection and Warnings.
Sensors, 2022

Program Synthesis Through Learning the Input-Output Behavior of Commands.
IEEE Access, 2022

2019
Detection of Political Manipulation through Unsupervised Learning.
KSII Trans. Internet Inf. Syst., 2019

2015
Detection of Political Manipulation in Online Communities through Measures of Effort and Collaboration.
ACM Trans. Web, 2015

2014
Network monitoring: Present and future.
Comput. Networks, 2014

Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Estimation of the available bandwidth ratio of a remote link or path segments.
Comput. Networks, 2013

2012
Improving manageability through reorganization of routing-policy configurations.
Comput. Networks, 2012

Impact analysis of BGP sessions for prioritization of maintenance operations.
Comput. Networks, 2012

End-user perspectives of Internet connectivity problems.
Comput. Networks, 2012

Mining diverse opinions.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
On Reducing the Impact of Interdomain Route Changes.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

2010
Correlation, visualization, and usability analysis of routing policy configurations.
IEEE Trans. Netw. Serv. Manag., 2010

2009
Detecting network-wide and router-specific misconfigurations through data mining.
IEEE/ACM Trans. Netw., 2009

Netpiler: detection of ineffective router configurations.
IEEE J. Sel. Areas Commun., 2009

2008
To Automate or Not to Automate: On the Complexity of Network Configuration.
Proceedings of IEEE International Conference on Communications, 2008

Improving dependability of network configuration through policy classification.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2006
Minerals: using data mining to detect router misconfigurations.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006


  Loading...