Younghee Park

Orcid: 0000-0003-0651-2384

According to our database1, Younghee Park authored at least 66 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Communication in the Internet of Drones.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

A Real-Time Anonymous Traffic Detection Based on Reinforcement Learning.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices.
IEEE Access, 2023

A Curriculum Framework for Autonomous Network Defense using Multi-agent Reinforcement Learning.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

2022
Flexible and Robust Real-Time Intrusion Detection Systems to Network Dynamics.
IEEE Access, 2022

Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

2021
Hyperglycemia Identification Using ECG in Deep Learning Era.
Sensors, 2021

Adaptive Network Security Service Orchestration Based on SDN/NFV.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Blockchain-based Secure Coordination for Distributed SDN Control Plane.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

ECG biometric using 2D Deep Convolutional Neural Network.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

2020
ECG Biometric Authentication: A Comparative Analysis.
IEEE Access, 2020

Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

A Privacy Preserving E-Voting System Based on Blockchain.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

Resilient and Efficient Blockchain Consensus Protocol for Internet-of-Things.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Secure Data Management in Internet-of-Things Based on Blockchain.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Query-Crafting DoS Threats Against Internet DNS.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019

Fast IP Hopping Randomization to Secure Hop-by-Hop Access in SDN.
IEEE Trans. Netw. Serv. Manag., 2019

A similarity measure based on Kullback-Leibler divergence for collaborative filtering in sparse data.
J. Inf. Sci., 2019

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing.
J. Inf. Process. Syst., 2019

Security Labs for Software Defined Networks in CloudLab.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Silent Timestamping for Blockchain Mining Pool Security.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Lock and Load: A Model for Free Blockchain Transactions through Token Locking.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Resilient SDN-Based Communication in Vehicular Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Enhancing Security Education Through Designing SDN Security Labs in CloudLab.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Distributed Security Network Functions against Botnet Attacks in Software-defined Networks.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

P4Guard: Designing P4 Based Firewall.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Fault Tolerant Traffic Engineering in Software-defined WAN.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Impact of reviewer social interaction on online consumer review fraud detection.
J. Big Data, 2017

Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Graphic model analysis of frauds in online consumer reviews.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

CNN-Based Android Malware Detection.
Proceedings of the International Conference on Software Security and Assurance, 2017

Machine-Learning Based Threat-Aware System in Software Defined Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Dynamic cost-effective emergency network provision.
Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief, 2017

Towards Effective Virtualization of Intrusion Detection Systems.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Dynamic Defense Provision via Network Functions Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Intelligent Learning Systems Design for Self-Defense Education.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Development of Cloud-Based UAV Monitoring and Management System.
Sensors, 2016

Integrated Data Management System for Data Center.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Fast address hopping at the switches: Securing access for packet forwarding in SDN.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

IoTGuard: Scalable and agile safeguards for Internet of Things.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Watermarking for detecting freeloader misbehavior in software-defined networks.
Proceedings of the 2016 International Conference on Computing, 2016

2015
A Lightweight Encryption and Secure Protocol for Smartphone Cloud.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Improving Encryption Performance Using MapReduce.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Favored Encryption Techniques for Cloud Storage.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

A Sticky Policy Framework for Big Data Security.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Eigenvalue analysis for metamorphic detection.
J. Comput. Virol. Hacking Tech., 2014

Identifying Malicious Metering Data in Advanced Metering Infrastructure.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

2013
Deriving common malware behavior through graph clustering.
Comput. Secur., 2013

Prevention of malware propagation in AMI.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

2012
Interval-based flow watermarking for tracing interactive traffic.
Comput. Networks, 2012

Software decoys for insider threat.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Deriving common malware behavior through graph clustering.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Theoretical studies on the formation mechanism and explosive performance of nitro-substituted 1, 3, 5-triazines.
J. Comput. Chem., 2010

Suppression of Edge Effects Based on Analytic Model for Leakage Current Reduction of Sub-40 nm DRAM Device.
IEICE Trans. Electron., 2010

Fast malware classification by automated behavioral graph matching.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

AntiBot: Clustering Common Semantic Patterns for Bot Detection.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Identification of Bot Commands by Run-Time Execution Monitoring.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
ARPS: Active recognition photography system for child-care robot.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2008

2007
Tracing Traffic through Intermediate Hosts that Repacketize Flows.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Relationships between Structures of Hydroxyflavone Derivatives and their Anti-oxidative Activities.
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007


  Loading...