


Остановите войну!
for scientists:


default search action
DaeHun Nyang
Daehun Nyang – 양대헌
Person information

- unicode name: 양대헌
- affiliation: Ewha Womans University, Information Security Research Laboratory, Seoul, South Korea
- affiliation: Inha University, Information Security Research Laboratory, Incheon, Republic of Korea
- affiliation (PhD 2000): Yonsei University, Seoul, South Korea
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c64]Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. NDSS 2023 - [i29]Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang:
SHIELD: Thwarting Code Authorship Attribution. CoRR abs/2304.13255 (2023) - [i28]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. CoRR abs/2304.13278 (2023) - [i27]Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen:
Measuring and Modeling the Free Content Web. CoRR abs/2304.14359 (2023) - 2022
- [j52]Jumabek Alikhanov
, Rhongho Jang
, Mohammed Abuhamad
, David Mohaisen
, Daehun Nyang
, Youngtae Noh
:
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches. IEEE Access 10: 5801-5823 (2022) - [j51]Marwan Omar, Soohyeon Choi, Daehun Nyang
, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. IEEE Access 10: 86038-86056 (2022) - [j50]Changhun Jung, Mohammed Abuhamad
, David Mohaisen, Kyungja Han, DaeHun Nyang:
WBC image classification and generative models based on convolutional neural network. BMC Medical Imaging 22(1): 94 (2022) - [j49]Jinchun Choi
, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary
, Jeffrey Spaulding
, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j48]Hisham Alasmary
, Afsah Anwar, Ahmed Abusnaina
, Abdulrahman Alabduljabbar
, Mohammed Abuhamad
, An Wang
, Daehun Nyang
, Amro Awad
, David Mohaisen
:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [j47]Ashar Ahmad, Muhammad Saad
, Mohammed A. AlGhamdi
, DaeHun Nyang
, David Mohaisen
:
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails. IEEE Syst. J. 16(1): 1367-1378 (2022) - [j46]Ahmed Abusnaina
, Mohammed Abuhamad
, Hisham Alasmary
, Afsah Anwar, Rhongho Jang
, Saeed Salem, DaeHun Nyang
, David Mohaisen
:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3432-3447 (2022) - [j45]Rhongho Jang
, Changhun Jung
, David Mohaisen
, KyungHee Lee, DaeHun Nyang
:
A One-Page Text Entry Method Optimized for Rectangle Smartwatches. IEEE Trans. Mob. Comput. 21(10): 3443-3454 (2022) - [c63]Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. CCS 2022: 1679-1693 - [c62]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? CSoNet 2022: 141-154 - [c61]Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen:
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts. CySSS@AsiaCCS 2022: 3-9 - [c60]Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang:
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. DSN 2022: 331-342 - [c59]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. RAID 2022: 308-320 - [i26]Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. CoRR abs/2201.00768 (2022) - [i25]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis. CoRR abs/2210.12083 (2022) - 2021
- [j44]Changhun Jung
, Jinchun Choi, Rhongho Jang, David Mohaisen
, DaeHun Nyang:
A network-independent tool-based usable authentication system for Internet of Things devices. Comput. Secur. 108: 102338 (2021) - [j43]Ashar Ahmad, Abdulrahman Alabduljabbar
, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen
:
Empirically comparing the performance of blockchain's consensus algorithms. IET Blockchain 1(1): 56-64 (2021) - [j42]Mohammed Abuhamad
, Ahmed Abusnaina
, Daehun Nyang
, David Mohaisen
:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet Things J. 8(1): 65-84 (2021) - [j41]Muhammad Saad, Joongheon Kim, DaeHun Nyang
, David Mohaisen:
Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools. J. Netw. Comput. Appl. 179: 102971 (2021) - [j40]SungHa Baek, Youngdon Jung, David Mohaisen
, Sungjin Lee
, DaeHun Nyang:
SSD-Assisted Ransomware Detection and Data Recovery Techniques. IEEE Trans. Computers 70(10): 1762-1776 (2021) - [j39]Mohammed Abuhamad
, Tamer AbuHmed
, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. ACM Trans. Priv. Secur. 24(4): 23:1-23:35 (2021) - [j38]Muhammad Saad
, Zhan Qin, Kui Ren, DaeHun Nyang
, David Mohaisen
:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c58]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar
, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. DSN (Supplements) 2021: 3-4 - [c57]Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems. ICOIN 2021: 654-656 - [c56]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad
, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. WWW (Companion Volume) 2021: 508-515 - [i24]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i23]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. CoRR abs/2103.09050 (2021) - [i22]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i21]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - [i20]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen:
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation. CoRR abs/2108.13373 (2021) - [i19]Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches. CoRR abs/2111.02759 (2021) - 2020
- [j37]Jinchun Choi, Mohammed Abuhamad
, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen
:
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet. IEEE Access 8: 111368-111380 (2020) - [j36]Jeman Park, Manar Mohaisen, DaeHun Nyang, Aziz Mohaisen:
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions. Comput. Networks 173: 107146 (2020) - [j35]Muhammad Saad
, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty
, DaeHun Nyang
, David Mohaisen
:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j34]Mohammed Abuhamad
, Tamer AbuHmed
, David Mohaisen
, DaeHun Nyang
:
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 7(6): 5008-5020 (2020) - [j33]Mohammed Abuhamad, Tamer AbuHmed
, DaeHun Nyang, David Mohaisen:
Multi-χ: Identifying Multiple Authors from Source Code Files. Proc. Priv. Enhancing Technol. 2020(3): 25-41 (2020) - [j32]Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary
, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. EAI Endorsed Trans. Security Safety 7(23): e1 (2020) - [j31]Muhammad Saad
, Jinchun Choi, DaeHun Nyang
, Joongheon Kim
, Aziz Mohaisen
:
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions. IEEE Syst. J. 14(1): 321-332 (2020) - [j30]Aziz Mohaisen
, Zhongshu Gu
, Kui Ren, Zhenhua Li
, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang
:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j29]Rhongho Jang
, Jeonil Kang, Aziz Mohaisen
, DaeHun Nyang
:
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference. IEEE Trans. Mob. Comput. 19(5): 1056-1071 (2020) - [c55]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad
, Anho Lee, DaeHun Nyang, David Mohaisen:
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments. CSoNet 2020: 73-86 - [c54]Hisham Alasmary
, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad
, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. ICDCS 2020: 888-898 - [c53]Rhongho Jang
, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang:
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. INFOCOM 2020: 1339-1348 - [c52]Ahmed Abusnaina, Rhongho Jang
, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. INFOCOM 2020: 2459-2468 - [c51]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
From Blue-Sky to Practical Adversarial Learning. TPS-ISA 2020: 118-127 - [c50]Ahmed Abusnaina, Mohammed Abuhamad
, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen:
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks. WISA 2020: 362-374 - [i18]Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen:
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey. CoRR abs/2001.08578 (2020) - [i17]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools. CoRR abs/2005.04842 (2020) - [i16]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification. CoRR abs/2005.07145 (2020) - [i15]Aminollah Khormali, DaeHun Nyang, David Mohaisen:
Generating Adversarial Examples with an Optimized Quality. CoRR abs/2007.00146 (2020)
2010 – 2019
- 2019
- [j28]Jeffrey Spaulding
, Jeman Park, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j27]Mohammed Abuhamad
, Ji-su Rhim
, Tamer AbuHmed
, Sana Ullah, Sanggil Kang, DaeHun Nyang:
Code authorship identification using convolutional neural networks. Future Gener. Comput. Syst. 95: 104-115 (2019) - [j26]Hisham Alasmary
, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina
, Amro Awad
, DaeHun Nyang
, Aziz Mohaisen
:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - [j25]Jeman Park, Jinchun Choi, DaeHun Nyang
, Aziz Mohaisen
:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. IEEE Trans. Netw. Serv. Manag. 16(4): 1782-1796 (2019) - [c49]Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Security of DDoS Detection Systems in Software Defined Networks. CoNEXT Companion 2019: 49-50 - [c48]Ahmed Abusnaina, Hisham Alasmary
, Mohammed Abuhamad
, Saeed Salem, DaeHun Nyang, Aziz Mohaisen:
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. CSoNet 2019: 268-281 - [c47]Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. DSC 2019: 1-8 - [c46]Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. DSC 2019: 1-8 - [c45]Jinchun Choi, Afsah Anwar, Hisham Alasmary
, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
IoT malware ecosystem in the wild: a glimpse into analysis and exposures. SEC 2019: 413-418 - [c44]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c43]Rhongho Jang
, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows. ICDCS 2019: 2047-2056 - [c42]Jinho Son, Hyunwoo Jo, DaeHun Nyang, Youngtae Noh:
Distributed Network Resource Sharing AP in Inter-WLAN Environments. MobiSys 2019: 584-585 - [c41]Rhongho Jang
, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. WiSec 2019: 286-287 - [c40]Jinchun Choi, Afsah Anwar, Hisham Alasmary
, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. WiSec 2019: 288-289 - [i14]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. CoRR abs/1901.01185 (2019) - [i13]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing Endpoints in the Internet of Things Malware. CoRR abs/1902.03531 (2019) - [i12]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. CoRR abs/1902.03955 (2019) - [i11]RhongHo Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table. CoRR abs/1902.04143 (2019) - [i10]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i9]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection. CoRR abs/1909.09735 (2019) - [i8]Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov
, Aziz Mohaisen, Kyungja Han, DaeHun Nyang:
W-Net: A CNN-based Architecture for White Blood Cells Image Classification. CoRR abs/1910.01091 (2019) - 2018
- [j24]DaeHun Nyang, Hyoungshick Kim
, Woojoo Lee, Sung-bae Kang, Geumhwan Cho
, Mun-Kyu Lee
, Aziz Mohaisen
:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j23]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. EAI Endorsed Trans. Security Safety 5(16): e2 (2018) - [c39]Mohammed Abuhamad
, Tamer AbuHmed
, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. CCS 2018: 101-114 - [c38]Hisham Alasmary
, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. CSoNet 2018: 259-272 - [c37]Changhun Jung, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions. ICASSP 2018: 6956-6960 - [c36]SungHa Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee, DaeHun Nyang:
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery. ICDCS 2018: 875-884 - [c35]Jeman Park, DaeHun Nyang, Aziz Mohaisen:
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. PST 2018: 1-10 - [c34]Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. SecureComm (1) 2018: 377-395 - [i7]DaeHun Nyang:
Gruut: A Fully-Decentralized P2P Public Ledger. CoRR abs/1806.11263 (2018) - 2017
- [j22]Jeonil Kang, DaeHun Nyang
:
A Privacy-Preserving Mobile Payment System for Mass Transit. IEEE Trans. Intell. Transp. Syst. 18(8): 2192-2205 (2017) - [c33]Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Understanding the effectiveness of typosquatting techniques. HotWeb 2017: 9:1-9:8 - [c32]RhongHo Jang
, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n. ICDCS 2017: 2515-2520 - [c31]RhongHo Jang
, DongGyu Cho, Youngtae Noh, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. INFOCOM 2017: 1-9 - [c30]Joongheon Kim, Yeong Jong Mo, Woojoo Lee, DaeHun Nyang:
Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications. PAC 2017: 192-193 - [c29]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [c28]RhongHo Jang
, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. WISEC 2017: 277-278 - [c27]RhongHo Jang
, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. WISEC 2017: 279-280 - 2016
- [j21]Mun-Kyu Lee, Pierre Michaud
, Jeong Seop Sim, DaeHun Nyang:
A simple proof of optimality for the MIN cache replacement policy. Inf. Process. Lett. 116(2): 168-170 (2016) - [j20]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-based authenticated key agreement with full binding property. J. Commun. Networks 18(2): 190-200 (2016) - [j19]DaeHun Nyang, DongOh Shin:
Recyclable Counter With Confinement for Real-Time Per-Flow Measurement. IEEE/ACM Trans. Netw. 24(5): 3191-3203 (2016) - [c26]Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, Mun-Kyu Lee:
Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption. DASC/PiCom/DataCom/CyberSciTech 2016: 878-881 - 2015
- [j18]YoungJae Maeng
, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. Comput. Secur. 48: 167-181 (2015) - [j17]Tamer AbuHmed
, KyungHee Lee, DaeHun Nyang:
UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices. IEEE Trans. Hum. Mach. Syst. 45(6): 782-789 (2015) - [j16]Jung Yeon Hwang, Liqun Chen
, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - 2014
- [j15]Jeonil Kang, DaeHun Nyang, KyungHee Lee:
Two-factor face authentication using matrix permutation transformation and a user password. Inf. Sci. 269: 1-20 (2014) - [j14]DaeHun Nyang
, Aziz Mohaisen, Jeonil Kang:
Keylogging-Resistant Visual Authentication Protocols. IEEE Trans. Mob. Comput. 13(11): 2566-2579 (2014) - 2013
- [j13]Jung Yeon Hwang, Sokjoon Lee
, Byung-Ho Chung, Hyun Sook Cho, DaeHun Nyang:
Group signatures with controllable linkability for dynamic membership. Inf. Sci. 222: 761-778 (2013) - 2012
- [c25]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-Based Authenticated Key Agreement with Full Binding Property. WISA 2012: 177-191 - 2011
- [j12]Tamer AbuHmed, Jeonil Kang, DaeHun Nyang, KyungHee Lee:
A Software-Based Group Attestation for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 13(1-2): 121-154 (2011) - [j11]Kitae Kim, Ikkwon Yie, Seongan Lim, Daehun Nyang:
Batch Verification and Finding Invalid Signatures in a Group Signature Scheme. Int. J. Netw. Secur. 13(2): 61-70 (2011) - [c24]JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jongin Lim:
Privacy-Enhanced Deniable Authentication E-Mail Service. DEIS 2011: 16-29 - [c23]Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim
, DaeHun Nyang:
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. ICUIMC 2011: 28 - [e1]Kyung Hyune Rhee, DaeHun Nyang:
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6829, Springer 2011, ISBN 978-3-642-24208-3 [contents] - [i6]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - 2010
- [j10]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong
, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. IEICE Trans. Inf. Syst. 93-D(2): 315-325 (2010) - [j9]