Yu Seung Kim

According to our database1, Yu Seung Kim authored at least 16 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Off is Not Off: On the Security of Parked Vehicles.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Multi-Radio-Based Vehicle Pseudonym Association.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Extended Abstract: Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

2015
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control.
Wirel. Networks, 2015

2014
Proximity-based wireless access control through considerate jamming.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

IdentityLink: user-device linking through visual and RF-signal cues.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

JADE: Jamming-averse routing on cognitive radio mesh networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

UnLocIn: Unauthorized location inference on smartphones without being caught.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Wireless Mesh Network Simulator for Studying Cross-Layer Jamming Effects.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Stochastic optimization of flow-jamming attacks in multichannel wireless networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
STIR-ing the wireless medium with self-tuned, inference-based, real-time jamming.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

All your jammers belong to us - Localization of wireless sensors under jamming attack.
Proceedings of IEEE International Conference on Communications, 2012

Carving secure wi-fi zones with defensive jamming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012


  Loading...