default search action
DaeHun Nyang
Person information
- unicode name: 양대헌
- affiliation: Ewha Womans University, Information Security Research Laboratory, Seoul, South Korea
- affiliation: Inha University, Information Security Research Laboratory, Incheon, Republic of Korea
- affiliation (PhD 2000): Yonsei University, Seoul, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j52]Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh:
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches. IEEE Access 10: 5801-5823 (2022) - [j51]Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. IEEE Access 10: 86038-86056 (2022) - [j50]Changhun Jung, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang:
WBC image classification and generative models based on convolutional neural network. BMC Medical Imaging 22(1): 94 (2022) - [j49]Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j48]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [j47]Ashar Ahmad, Muhammad Saad, Mohammed A. AlGhamdi, DaeHun Nyang, David Mohaisen:
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails. IEEE Syst. J. 16(1): 1367-1378 (2022) - [j46]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3432-3447 (2022) - [j45]Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang:
A One-Page Text Entry Method Optimized for Rectangle Smartwatches. IEEE Trans. Mob. Comput. 21(10): 3443-3454 (2022) - 2021
- [j44]Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A network-independent tool-based usable authentication system for Internet of Things devices. Comput. Secur. 108: 102338 (2021) - [j43]Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen:
Empirically comparing the performance of blockchain's consensus algorithms. IET Blockchain 1(1): 56-64 (2021) - [j42]Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet Things J. 8(1): 65-84 (2021) - [j41]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools. J. Netw. Comput. Appl. 179: 102971 (2021) - [j40]SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang:
SSD-Assisted Ransomware Detection and Data Recovery Techniques. IEEE Trans. Computers 70(10): 1762-1776 (2021) - [j39]Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. ACM Trans. Priv. Secur. 24(4): 23:1-23:35 (2021) - [j38]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - 2020
- [j37]Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen:
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet. IEEE Access 8: 111368-111380 (2020) - [j36]Jeman Park, Manar Mohaisen, DaeHun Nyang, Aziz Mohaisen:
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions. Comput. Networks 173: 107146 (2020) - [j35]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j34]Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang:
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 7(6): 5008-5020 (2020) - [j33]Mohammed Abuhamad, Tamer AbuHmed, DaeHun Nyang, David Mohaisen:
Multi-χ: Identifying Multiple Authors from Source Code Files. Proc. Priv. Enhancing Technol. 2020(3): 25-41 (2020) - [j32]Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. EAI Endorsed Trans. Security Safety 7(23): e1 (2020) - [j31]Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz Mohaisen:
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions. IEEE Syst. J. 14(1): 321-332 (2020) - [j30]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j29]Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference. IEEE Trans. Mob. Comput. 19(5): 1056-1071 (2020) - 2019
- [j28]Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j27]Mohammed Abuhamad, Ji-su Rhim, Tamer AbuHmed, Sana Ullah, Sanggil Kang, DaeHun Nyang:
Code authorship identification using convolutional neural networks. Future Gener. Comput. Syst. 95: 104-115 (2019) - [j26]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - [j25]Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. IEEE Trans. Netw. Serv. Manag. 16(4): 1782-1796 (2019) - 2018
- [j24]DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j23]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. EAI Endorsed Trans. Security Safety 5(16): e2 (2018) - 2017
- [j22]Jeonil Kang, DaeHun Nyang:
A Privacy-Preserving Mobile Payment System for Mass Transit. IEEE Trans. Intell. Transp. Syst. 18(8): 2192-2205 (2017) - 2016
- [j21]Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, DaeHun Nyang:
A simple proof of optimality for the MIN cache replacement policy. Inf. Process. Lett. 116(2): 168-170 (2016) - [j20]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-based authenticated key agreement with full binding property. J. Commun. Networks 18(2): 190-200 (2016) - [j19]DaeHun Nyang, DongOh Shin:
Recyclable Counter With Confinement for Real-Time Per-Flow Measurement. IEEE/ACM Trans. Netw. 24(5): 3191-3203 (2016) - 2015
- [j18]YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. Comput. Secur. 48: 167-181 (2015) - [j17]Tamer AbuHmed, KyungHee Lee, DaeHun Nyang:
UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices. IEEE Trans. Hum. Mach. Syst. 45(6): 782-789 (2015) - [j16]Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - 2014
- [j15]Jeonil Kang, DaeHun Nyang, KyungHee Lee:
Two-factor face authentication using matrix permutation transformation and a user password. Inf. Sci. 269: 1-20 (2014) - [j14]DaeHun Nyang, Aziz Mohaisen, Jeonil Kang:
Keylogging-Resistant Visual Authentication Protocols. IEEE Trans. Mob. Comput. 13(11): 2566-2579 (2014) - 2013
- [j13]Jung Yeon Hwang, Sokjoon Lee, Byung-Ho Chung, Hyun Sook Cho, DaeHun Nyang:
Group signatures with controllable linkability for dynamic membership. Inf. Sci. 222: 761-778 (2013) - 2011
- [j12]Tamer AbuHmed, Jeonil Kang, DaeHun Nyang, KyungHee Lee:
A Software-Based Group Attestation for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 13(1-2): 121-154 (2011) - [j11]Kitae Kim, Ikkwon Yie, Seongan Lim, Daehun Nyang:
Batch Verification and Finding Invalid Signatures in a Group Signature Scheme. Int. J. Netw. Secur. 13(2): 61-70 (2011) - 2010
- [j10]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. IEICE Trans. Inf. Syst. 93-D(2): 315-325 (2010) - [j9]Kitae Kim, Ikkwon Yie, Daehun Nyang:
On the Security of Two Group Signature Schemes with Forward Security. Informatica (Slovenia) 34(2): 237-242 (2010) - [j8]Abedelaziz Mohaisen, DaeHun Nyang:
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network. J. Commun. 5(2): 164-168 (2010) - 2009
- [j7]DaeHun Nyang, Akihiro Yamamura:
More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7): 1720-1723 (2009) - [j6]Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks. Int. J. Netw. Secur. 8(3): 282-292 (2009) - [j5]Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong:
Grid-Based Key Pre-Distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(2): 195-208 (2009) - 2008
- [j4]Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed:
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 2(5): 222-238 (2008) - 2007
- [j3]Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song:
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. J. Comput. Sci. Technol. 22(3): 476-480 (2007) - 2000
- [j2]DaeHun Nyang, Joo-Seok Song:
Knowledge-proof based versatile smart card verification protocol. Comput. Commun. Rev. 30(3): 39-44 (2000) - 1999
- [j1]DaeHun Nyang, S. Y. Lim, JooSeok Song:
A complete test sequence using cyclic sequence for conformance testing. Comput. Commun. 22(15-16): 1447-1456 (1999)
Conference and Workshop Papers
- 2024
- [c69]Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang:
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System. USENIX Security Symposium 2024 - 2023
- [c68]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CSoNet 2023: 83-92 - [c67]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. ICCCN 2023: 1-10 - [c66]Soohyeon Choi, Manar Mohaisen, Daehun Nyang, David Mohaisen:
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors. ICICS 2023: 399-417 - [c65]Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. NDSS 2023 - [c64]Hattan Althebeiti, Ran Gedawy, Ahod Alghuried, Daehun Nyang, David Mohaisen:
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation. WISA 2023: 159-174 - 2022
- [c63]Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. CCS 2022: 1679-1693 - [c62]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? CSoNet 2022: 141-154 - [c61]Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen:
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts. CySSS@AsiaCCS 2022: 3-9 - [c60]Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang:
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. DSN 2022: 331-342 - [c59]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. RAID 2022: 308-320 - 2021
- [c58]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. DSN (Supplements) 2021: 3-4 - [c57]Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems. ICOIN 2021: 654-656 - [c56]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. WWW (Companion Volume) 2021: 508-515 - 2020
- [c55]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Anho Lee, DaeHun Nyang, David Mohaisen:
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments. CSoNet 2020: 73-86 - [c54]Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. ICDCS 2020: 888-898 - [c53]Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang:
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. INFOCOM 2020: 1339-1348 - [c52]Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. INFOCOM 2020: 2459-2468 - [c51]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
From Blue-Sky to Practical Adversarial Learning. TPS-ISA 2020: 118-127 - [c50]Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen:
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks. WISA 2020: 362-374 - 2019
- [c49]Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Security of DDoS Detection Systems in Software Defined Networks. CoNEXT Companion 2019: 49-50 - [c48]Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, Aziz Mohaisen:
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. CSoNet 2019: 268-281 - [c47]Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. DSC 2019: 1-8 - [c46]Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. DSC 2019: 1-8 - [c45]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
IoT malware ecosystem in the wild: a glimpse into analysis and exposures. SEC 2019: 413-418 - [c44]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c43]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows. ICDCS 2019: 2047-2056 - [c42]Jinho Son, Hyunwoo Jo, DaeHun Nyang, Youngtae Noh:
Distributed Network Resource Sharing AP in Inter-WLAN Environments. MobiSys 2019: 584-585 - [c41]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. WiSec 2019: 286-287 - [c40]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. WiSec 2019: 288-289 - 2018
- [c39]Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. CCS 2018: 101-114 - [c38]Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. CSoNet 2018: 259-272 - [c37]Changhun Jung, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions. ICASSP 2018: 6956-6960 - [c36]SungHa Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee, DaeHun Nyang:
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery. ICDCS 2018: 875-884 - [c35]Jeman Park, DaeHun Nyang, Aziz Mohaisen:
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. PST 2018: 1-10 - [c34]Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. SecureComm (1) 2018: 377-395 - 2017
- [c33]Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Understanding the effectiveness of typosquatting techniques. HotWeb 2017: 9:1-9:8 - [c32]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n. ICDCS 2017: 2515-2520 - [c31]RhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. INFOCOM 2017: 1-9 - [c30]Joongheon Kim, Yeong Jong Mo, Woojoo Lee, DaeHun Nyang:
Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications. PAC 2017: 192-193 - [c29]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [c28]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. WISEC 2017: 277-278 - [c27]RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. WISEC 2017: 279-280 - 2016
- [c26]Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, Mun-Kyu Lee:
Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption. DASC/PiCom/DataCom/CyberSciTech 2016: 878-881 - 2012
- [c25]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-Based Authenticated Key Agreement with Full Binding Property. WISA 2012: 177-191 - 2011
- [c24]JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jongin Lim:
Privacy-Enhanced Deniable Authentication E-Mail Service. DEIS 2011: 16-29 - [c23]Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, DaeHun Nyang:
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. ICUIMC 2011: 28 - 2009
- [c22]Tamer AbuHmed, Nandinbold Nyamaa, DaeHun Nyang:
Software-Based Remote Code Attestation in Wireless Sensor Network. GLOBECOM 2009: 1-8 - [c21]YongQing Ni, DaeHun Nyang, Xu Wang:
A-Kad: an anonymous P2P protocol based on Kad network. MASS 2009: 747-752 - 2008
- [c20]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. NCM (1) 2008: 572-579 - [c19]Abedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, DaeHun Nyang:
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. UIC 2008: 338-351 - [c18]Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. UIC 2008: 548-562 - 2007
- [c17]DaeHun Nyang, KyungHee Lee:
Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features. HCI (5) 2007: 491-496 - [c16]Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim:
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. ICCSA (3) 2007: 886-899 - [c15]Young-Geun Choi, Jeonil Kang, DaeHun Nyang:
Proactive Code Verification Protocol in Wireless Sensor Network. ICCSA (2) 2007: 1085-1096 - [c14]Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee:
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. MSN 2007: 822-833 - [c13]Abedelaziz Mohaisen, YoungJae Maeng, DaeHun Nyang:
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. PAKDD Workshops 2007: 527-537 - [c12]YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang:
Secret Key Revocation in Sensor Networks. UIC 2007: 1222-1232 - 2006
- [c11]Zhu Lei, DaeHun Nyang, KyungHee Lee, Hyotaek Lim:
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. CIS 2006: 683-693 - [c10]HongKi Lee, DaeHun Nyang, JooSeok Song:
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. EUC Workshops 2006: 281-290 - [c9]Abedelaziz Mohaisen, DaeHun Nyang:
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. EWSN 2006: 83-98 - [c8]Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim:
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. ICCSA (4) 2006: 380-387 - [c7]DaeHun Nyang, Abedelaziz Mohaisen:
Cooperative Public Key Authentication Protocol in Wireless Sensor Network. UIC 2006: 864-873 - 2005
- [c6]Jeonil Kang, DaeHun Nyang:
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. ESAS 2005: 164-175 - [c5]JuSung Park, Jeonil Kang, DaeHun Nyang:
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. EUC Workshops 2005: 383-392 - [c4]Jeonil Kang, DaeHun Nyang, KyungHee Lee:
Two Factor Face Authentication Scheme with Cancelable Feature. IWBRS 2005: 67-76 - 2004
- [c3]Hyotaek Lim, DaeHun Nyang, David Hung-Chang Du:
An Efficient Video Prefix-Caching Scheme in Wide Area Networks. ICOIN 2004: 679-688 - [c2]You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang:
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. ICOIN 2004: 915-924 - 1999
- [c1]DaeHun Nyang, JooSeok Song:
Preventing Double-Spent Coins from Revealing User's Whole Secret. ICISC 1999: 30-37
Parts in Books or Collections
- 2005
- [p1]Hyotaek Lim, Saebom Choi, DaeHun Nyang:
Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks. New Trends in Computer Networks 2005
Editorship
- 2011
- [e1]Kyung Hyune Rhee, DaeHun Nyang:
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6829, Springer 2011, ISBN 978-3-642-24208-3 [contents]
Informal and Other Publications
- 2023
- [i30]Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang:
SHIELD: Thwarting Code Authorship Attribution. CoRR abs/2304.13255 (2023) - [i29]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. CoRR abs/2304.13278 (2023) - [i28]Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen:
Measuring and Modeling the Free Content Web. CoRR abs/2304.14359 (2023) - [i27]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CoRR abs/2311.15366 (2023) - 2022
- [i26]Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. CoRR abs/2201.00768 (2022) - [i25]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis. CoRR abs/2210.12083 (2022) - 2021
- [i24]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i23]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. CoRR abs/2103.09050 (2021) - [i22]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i21]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - [i20]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen:
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation. CoRR abs/2108.13373 (2021) - [i19]Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches. CoRR abs/2111.02759 (2021) - 2020
- [i18]Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen:
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey. CoRR abs/2001.08578 (2020) - [i17]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools. CoRR abs/2005.04842 (2020) - [i16]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification. CoRR abs/2005.07145 (2020) - [i15]Aminollah Khormali, DaeHun Nyang, David Mohaisen:
Generating Adversarial Examples with an Optimized Quality. CoRR abs/2007.00146 (2020) - 2019
- [i14]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. CoRR abs/1901.01185 (2019) - [i13]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing Endpoints in the Internet of Things Malware. CoRR abs/1902.03531 (2019) - [i12]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. CoRR abs/1902.03955 (2019) - [i11]RhongHo Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table. CoRR abs/1902.04143 (2019) - [i10]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i9]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection. CoRR abs/1909.09735 (2019) - [i8]Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang:
W-Net: A CNN-based Architecture for White Blood Cells Image Classification. CoRR abs/1910.01091 (2019) - 2018
- [i7]DaeHun Nyang:
Gruut: A Fully-Decentralized P2P Public Ledger. CoRR abs/1806.11263 (2018) - 2011
- [i6]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - 2010
- [i5]Kitae Kim, Daehun Nyang:
Security Analysis of a Threshold Proxy Signature Scheme. IACR Cryptol. ePrint Arch. 2010: 400 (2010) - 2009
- [i4]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. CoRR abs/0903.2682 (2009) - [i3]DaeHun Nyang, Mun-Kyu Lee:
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2009: 631 (2009) - 2008
- [i2]Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang:
A Survey on Deep Packet Inspection for Intrusion Detection Systems. CoRR abs/0803.0037 (2008) - [i1]Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks. CoRR abs/0803.1111 (2008)
Coauthor Index
aka: Mohammad Abuhamad
aka: Rhongho Jang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint