RhongHo Jang

Orcid: 0000-0002-3417-6851

According to our database1, RhongHo Jang authored at least 29 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Measuring and Modeling the Free Content Web.
CoRR, 2023

A Robust Counting Sketch for Data Plane Intrusion Detection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Untargeted Code Authorship Evasion with Seq2Seq Transformation.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

2022
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.
IEEE/ACM Trans. Netw., 2022

A One-Page Text Entry Method Optimized for Rectangle Smartwatches.
IEEE Trans. Mob. Comput., 2022

DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

AttCAT: Explaining Transformers via Attentive Class Activation Tokens.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

A Scalable and Dynamic ACL System for In-Network Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches.
CoRR, 2021

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR, 2021

A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2017
Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

RFlow<sup>+</sup>: An SDN-based WLAN monitoring and management framework.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017


  Loading...