Edward Jung

Orcid: 0000-0002-3237-3894

According to our database1, Edward Jung authored at least 19 papers between 1995 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome.
Proceedings of the 30th USENIX Security Symposium, 2021

2016
Identification of IP control units by state encoding and side channel verification.
Microprocess. Microsystems, 2016

2015
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks.
Secur. Commun. Networks, 2015

Identification of embedded control units by state encoding and power consumption analysis.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Identification of IP Control Units by State Encoding.
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015

2014
IP watermark verification based on power consumption analysis.
Proceedings of the 27th IEEE International System-on-Chip Conference, 2014

FSM watermarks based on ordering of flip flops.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

2013
A Quantum-Modeled Fuzzy C-Means clustering algorithm for remotely sensed multi-band image segmentation.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

A Quantum-Modeled Artificial Bee Colony clustering algorithm for remotely sensed multi-band image segmentation.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

2012
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization.
Int. J. Inf. Secur. Priv., 2012

An efficient security framework for mobile WiMAX.
Proceedings of the ACM Symposium on Applied Computing, 2012

An efficient locking and unlocking method of sequential systems.
Proceedings of the Research in Applied Computation Symposium, 2012

A quantum-modeled K-means clustering algorithm for multi-band image segmentation.
Proceedings of the Research in Applied Computation Symposium, 2012

2011
Measuring Levels of Abstraction in Software Development.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

An empirical study on the effectiveness of hyperspectral image classification algorithms with dimensionality reduction.
Proceedings of the Research in Applied Computation Symposium, 2011

A unified design method utilizing decomposability and composability for secure systems.
Proceedings of the Research in Applied Computation Symposium, 2011

The investigation of the structural properties of machines for the design of secure and trustworthy systems.
Proceedings of the Research in Applied Computation Symposium, 2011

2009
An IBC and certificate based hybrid approach to WiMAX security.
J. Commun. Networks, 2009

1995
Configuring Multiple Boundary Scan Chains for Board Testing.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995


  Loading...