Sang-Yoon Chang

Orcid: 0000-0002-5736-5823

According to our database1, Sang-Yoon Chang authored at least 116 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PT-symmetric mapping of three states and its implementation on a cloud quantum processor.
IACR Cryptol. ePrint Arch., 2024

Secure and Efficient Authentication using Linkage for permissionless Bitcoin network.
Comput. Networks, 2024

Base station gateway to secure user channel access at the first hop edge.
Comput. Networks, 2024

Exploring Reinforcement Learning to Aid Tor Latency Performance.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Wireless Link Routing to Secure Against Fake Base Station in 5G.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Toward Post-Quantum Digital Certificate for eSIM.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Anomaly Detection in 5G using Variational Autoencoders.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Flying Base Station Channel Capacity.
Proceedings of the Seventh International Workshop on Systems and Network Telemetry and Analytics, 2024

SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024

Performance or Anonymity? Source-Driven Tor Relay Selection for Performance Enhancement.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Intelligent Trajectory-based Approach to UAV Location Integrity Checks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Fake Base Station Detection and Blacklisting.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Securing Post-Quantum DNSSEC Against Fragmentation Mis-Association Threat.
Proceedings of the IEEE International Conference on Communications, 2024

From Slow Propagation to Partition: Analyzing Bitcoin Over Anonymous Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Positive Reputation Score for Bitcoin P2P Network.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture.
IEEE Trans. Netw. Serv. Manag., September, 2023

Securing UAV Flying Base Station for Mobile Networking: A Review.
Future Internet, May, 2023

Auto-tune: An efficient autonomous multi-path payment routing algorithm for Payment Channel Networks.
Comput. Networks, April, 2023

Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Reliable Detection of Location Spoofing and Variation Attacks.
IEEE Access, 2023

Investigation and Countermeasure toward Unintentional Access to Docker Container.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

Privacy-Preserving Trust Management For Vehicular Communications and Federated Learning.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Let It Go: Relieving Garbage Collection Pain for Latency Critical Applications in Golang.
Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed Computing, 2023

Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023

Post-Quantum QUIC Protocol in Cloud Networking.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Version++: Cryptocurrency Blockchain Handshaking With Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
Dataset, December, 2022

A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022

5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
CoRR, 2022

Capture the Flag for Team Construction in Cybersecurity.
CoRR, 2022

Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022

Post-Quantum Cipher Power Analysis in Lightweight Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Lightweight Code Assurance Proof for Wireless Software.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

Greedy Networking in Cryptocurrency Blockchain.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Improving Concurrent GC for Latency Critical Services in Multi-tenant Systems.
Proceedings of the Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7, 2022

Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

QUIC Protocol with Post-quantum Authentication.
Proceedings of the Information Security - 25th International Conference, 2022

The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

P T-symmetric Bayesian parameter estimation on a superconducting quantum processor.
Proceedings of the IEEE International Conference on Communications, 2022

Designing and Using Capture The Flag for Coordination and Interaction in Engineering Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2021
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution.
IACR Cryptol. ePrint Arch., 2021

$\mathcal{PT}$-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution.
CoRR, 2021

Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

Encryption Scheme Based on the Generalized Suzuki 2-groups and Homomorphic Encryption.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

Towards Detection of AI-Generated Texts and Misinformation.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

Blockchain-based root of trust management in security credential management system for vehicular communications.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

P T-Enhanced Bayesian Parameter Estimation.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021

Blockchain-based Secure Coordination for Distributed SDN Control Plane.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Robust P2P Connectivity Estimation for Permissionless Bitcoin Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Demo: Proof-of-Work Network Simulator for Blockchain and Cryptocurrency Research.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Performance Characterization of Post-Quantum Digital Certificates.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

A Generic Blockchain Framework to Secure Decentralized Applications.
Proceedings of the ICC 2021, 2021

Detecting Bias in Randomness by PT-Symmetric Quantum State Discrimination.
Proceedings of the ICC 2021, 2021

Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Security Analyses of Misbehavior Tracking in Bitcoin Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Performance Analyses for Applying Machine Learning on Bitcoin Miners.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Teaching Team Collaboration in Cybersecurity: A Case Study from the Transactive Memory Systems Perspective.
Proceedings of the IEEE Global Engineering Education Conference, 2021

ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Securing Tire Pressure Monitoring System for Vehicular Privacy.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Zero-day Malware Detection using Threshold-free Autoencoding Architecture.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
$\mathcal{PT}$-Symmetric Unambiguous Distinguishing of Three Quantum States.
CoRR, 2020

Share Withholding Attack in Blockchain Mining: Technical Report.
CoRR, 2020

Discriminating an Arbitrary Number of Pure Quantum States by the Combined CPT and Hermitian Measurements.
CoRR, 2020

Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

A Privacy Preserving E-Voting System Based on Blockchain.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Share Withholding in Blockchain Mining.
Proceedings of the Security and Privacy in Communication Networks, 2020

Mining Power Misestimation in PoW Blockchain.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Voting Credential Management System for Electronic Voting Privacy.
Proceedings of the 2020 IFIP Networking Conference, 2020

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Dynamic power control for rational cryptocurrency mining.
Proceedings of the CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2020

Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Query-Crafting DoS Threats Against Internet DNS.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019

Fast IP Hopping Randomization to Secure Hop-by-Hop Access in SDN.
IEEE Trans. Netw. Serv. Manag., 2019

Addressing Skewness in Iterative ML Jobs with Parameter Partition.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Silent Timestamping for Blockchain Mining Pool Security.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Anti-Withholding Reward System to Secure Blockchain Mining Pools.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Resilient SDN-Based Communication in Vehicular Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Distributed Security Network Functions against Botnet Attacks in Software-defined Networks.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks.
IEEE Trans. Mob. Comput., 2017

Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Graphic model analysis of frauds in online consumer reviews.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Dynamic cost-effective emergency network provision.
Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief, 2017

Securing balise-based train control systems using cryptographic random fountains.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Protecting vehicular networks privacy in the presence of a single adversarial authority.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016

Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Fast address hopping at the switches: Securing access for packet forwarding in SDN.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Demo: Free Data Communication Using Wireless Charging.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Watermarking for detecting freeloader misbehavior in software-defined networks.
Proceedings of the 2016 International Conference on Computing, 2016

2015
A Lightweight Encryption and Secure Protocol for Smartphone Cloud.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

Noah: Keyed Noise Flooding for Wireless Confidentiality.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Improving Encryption Performance Using MapReduce.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Securing wireless medium access control against insider denial-of-service attackers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
Secure protocols for wireless availability
PhD thesis, 2013

Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013

2012
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

2011
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...