Wonsuk Choi

Orcid: 0000-0003-3253-4827

According to our database1, Wonsuk Choi authored at least 34 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features.
IEEE Trans. Intell. Transp. Syst., May, 2024

Properties of Sub-THz Propagation Channels and Their Impact on System Behavior: Channel Measurements and Transmission Experiments.
IEEE Wirel. Commun., February, 2024

2023
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System.
IEEE Trans. Intell. Transp. Syst., November, 2023

Protecting SOME/IP Communication via Authentication Ticket.
Sensors, July, 2023

The vibration knows who you are! A further analysis on usable authentication for smartwatch users.
Comput. Secur., 2023

RIDAS: Real-time identification of attack sources on controller area networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures.
IEEE Trans. Intell. Transp. Syst., 2022

TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN).
IEEE Access, 2022

Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing.
IEEE Access, 2022

Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Cybersecurity and Capacity Requirement for Data Storage of Autonomous Driving System.
Proceedings of the 96th Vehicular Technology Conference, 2022

End-to-end 6G Terahertz Wireless Platform with Adaptive Transmit and Receive Beamforming.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

2021
An Enhanced Method for Reverse Engineering CAN Data Payload.
IEEE Trans. Veh. Technol., 2021

End-to-end 140 GHz Wireless Link Demonstration with Fully-Digital Beamformed System.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Usable User Authentication on a Smartwatch using Vibration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks.
IEEE Trans. Veh. Technol., 2020

Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone.
IEEE Access, 2020

Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Implantable Neural-Recording Modules for Monitoring Electrical Neural Activity in the Central and Peripheral Nervous Systems.
Proceedings of the 63rd IEEE International Midwest Symposium on Circuits and Systems, 2020

2019
Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model.
IEEE Access, 2019

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method.
IEEE Access, 2019

How to Securely Record Logs based on ARM TrustZone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System.
IEEE Trans. Inf. Forensics Secur., 2018

Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices.
Secur. Commun. Networks, 2018

Towards the Development of Bidirectional Peripheral Nerve Interface for Long-term Implantation.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2018

2017
Vulnerabilities of Android OS-Based Telematics System.
Wirel. Pers. Commun., 2017

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks.
Wirel. Pers. Commun., 2017

Novel neural interface electrode array for the peripheral nerve.
Proceedings of the International Conference on Rehabilitation Robotics, 2017

2014
Cost-based join processing scheme in a hybrid RDBMS and hive system.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

2010
The Q-Enhanced CMOS Active Bandpass Filter with Two-Stage Self-Calibration.
IEICE Trans. Electron., 2010

2008
Applicability of No-Hands Computer Input Devices for the Certificates for Microsoft Office Software.
Proceedings of the Computers Helping People with Special Needs, 2008


  Loading...