DaeHun Nyang
Orcid: 0000-0001-5183-891XAffiliations:
- Ewha Womans University, Information Security Research Laboratory, Seoul, South Korea
- Inha University, Information Security Research Laboratory, Incheon, Republic of Korea
- Yonsei University, Seoul, South Korea (PhD 2000)
According to our database1,
DaeHun Nyang
authored at least 142 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
2022
IEEE Trans. Mob. Comput., 2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Syst. J., 2022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis.
CoRR, 2022
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022
WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
ACM Trans. Priv. Secur., 2021
IEEE Trans. Computers, 2021
J. Netw. Comput. Appl., 2021
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021
IET Blockchain, 2021
CoRR, 2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021
A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020
EAI Endorsed Trans. Security Safety, 2020
Proc. Priv. Enhancing Technol., 2020
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020
CoRR, 2020
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019
CoRR, 2019
CoRR, 2019
CoRR, 2019
CoRR, 2019
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018
Comput. Secur., 2018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
2016
IEEE/ACM Trans. Netw., 2016
J. Commun. Networks, 2016
Inf. Process. Lett., 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Hum. Mach. Syst., 2015
2014
Two-factor face authentication using matrix permutation transformation and a user password.
Inf. Sci., 2014
2013
Inf. Sci., 2013
2011
Int. J. Netw. Secur., 2011
CoRR, 2011
Ad Hoc Sens. Wirel. Networks, 2011
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010
Informatica (Slovenia), 2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
2009
KSII Trans. Internet Inf. Syst., 2009
Int. J. Netw. Secur., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
J. Comput. Sci. Technol., 2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Computational Science and Its Applications, 2006
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Proceedings of the Advances in Biometric Person Authentication, 2005
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005
2004
Proceedings of the Information Networking, 2004
Proceedings of the Information Networking, 2004
2000
Comput. Commun. Rev., 2000
1999
Comput. Commun., 1999
Proceedings of the Information Security and Cryptology, 1999