Publications
Highlighted
[no title info]
[no publisher info]
·
[no date info]
·
[no id info]
All
2024
Evaluating SPLT-based and nPrint-based AutoML Classifiers on an Encrypted Application Traffic over VPN Dataset
Proceedings of the Korea Software Congress 2024 (KSC 2024)
·
18 Dec 2024
·
[no id info]
Feasibility of Adopting Multipath TCP to BitTorrent-based Applications with Mininet
Proceedings of the 2024 KICS Summer Conference
·
19 Jun 2024
·
[no id info]
QUIC website fingerprinting based on automated machine learning
ICT Express
·
01 Jun 2024
·
doi:10.1016/j.icte.2023.12.008
A method to speed up container deployments on edge clouds
Annual Conference of KIPS
·
23 May 2024
·
doi:10.3745/PKIPS.y2024m05a.114
2023
A Survey of Sequential Feature Representation Techniques in Encrypted Network Traffic Analysis
Proceedings of the KIISE Korea Software Congress 2023 (KSC 2023)
·
20 Dec 2023
·
[no id info]
A Survey on Website Fingerprinting Techniques Based on Machine Learning
Proceedings of the 2023 Korea institute of Information Security and Cryptology Choongchung Chapter Conference (KIISC CC 2023)
·
22 Jun 2023
·
[no id info]
A Survey on Traffic Data Preprocessing for Encrypted Traffic Analysis Based on Machine Learning
Proceedings of the KIISC Conference on Information Security and Cryptography Summer 2023 (CISC-S 2023)
·
22 Jun 2023
·
[no id info]
On the Effectiveness of nPrint to an Encrypted Malware Traffic Dataset
Proceedings of the KIISE Korea Computer Congress 2023 (KCC 2023)
·
17 Jun 2023
·
[no id info]
Reproducibility Analysis of Linux 802.11n CSI Tool-based Wireless Network Experiments through AoA/AoD Estimation
Proceedings of the KIISE Korea Computer Congress 2023 (KCC 2023)
·
17 Jun 2023
·
[no id info]
A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic
Journal of the Korea Institute of Information Security & Cryptology
·
30 Apr 2023
·
doi:10.13089/JKIISC.2023.33.2.267
2022
Revisiting TLS-Encrypted Traffic Fingerprinting Methods for Malware Family Classification
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
·
19 Oct 2022
·
doi:10.1109/ICTC55196.2022.9952872
Trends in Machine Learning Models for Encrypted Traffic Classification
Proceedings of the 2022 Korea institute of Information Security and Cryptology Choongchung Chapter Conference (KIISC CC 2022)
·
14 Oct 2022
·
[no id info]
Impact of Destination Context of TLS-Encrypted Traffic in Malware Family Classification
Proceedings of the 32nd Joint Conference on Communications and Information (JCCI 2022)
·
27 Apr 2022
·
[no id info]
Combating Adversarial Covert Channels in Wi-Fi Networks
IEEE Access
·
01 Jan 2022
·
doi:10.1109/ACCESS.2022.3201648
2021
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Applied Sciences
·
24 Dec 2021
·
doi:10.3390/app12010155
Experimental Evaluation of Malware Family Classification Methods from Sequential Information of TLS-Encrypted Traffic
Electronics
·
20 Dec 2021
·
doi:10.3390/electronics10243180
A Survey on TLS Fingerprinting for Cyber Threat Intelligence
The Korea Institute of Information Security and Cryptology
·
30 Oct 2021
·
[no id info]
BuSAR: Bluetooth Slot Availability Randomization for Better Coexistence With Dense Wi-Fi Networks
IEEE Transactions on Mobile Computing
·
01 Mar 2021
·
doi:10.1109/tmc.2019.2955080
Predictive Prefetching Based on User Interaction for Web Applications
IEEE Communications Letters
·
01 Mar 2021
·
doi:10.1109/LCOMM.2020.3038255
Revisiting Adaptive Frequency Hopping Map Prediction in Bluetooth with Machine Learning Classifiers
Energies
·
10 Feb 2021
·
doi:10.3390/en14040928
Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth
2021 International Conference on Information Networking (ICOIN)
·
13 Jan 2021
·
doi:10.1109/ICOIN50884.2021.9333996
2020
Poster: Feasibility of Malware Traffic Analysis through TLS-Encrypted Flow Visualization
2020 IEEE 28th International Conference on Network Protocols (ICNP)
·
13 Oct 2020
·
doi:10.1109/ICNP49622.2020.9259387
PolarScout: Wi-Fi Interference-Resilient ZigBee Communication via Shell-Shaping
IEEE/ACM Transactions on Networking
·
01 Aug 2020
·
doi:10.1109/TNET.2020.2989387
Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via Precoding
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Jul 2020
·
doi:10.1109/INFOCOMWKSHPS50562.2020.9162658
Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Jul 2020
·
doi:10.1109/INFOCOMWKSHPS50562.2020.9162971
Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach
IEEE Internet of Things Journal
·
01 Apr 2020
·
doi:10.1109/JIOT.2020.2972915
2019
DOTA: Physical-Layer Decomposing and Threading for ZigBee/Wi-Fi Co-Transmission
IEEE Wireless Communications Letters
·
01 Feb 2019
·
doi:10.1109/LWC.2018.2863294
Secure and Lightweight Subflow Establishment of Multipath-TCP
IEEE Access
·
01 Jan 2019
·
doi:10.1109/access.2019.2957434
2018
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives
Journal of Network and Computer Applications
·
01 Dec 2018
·
doi:10.1016/j.jnca.2018.08.011
2017
SCBF: Exploiting a Collision for Authentication in Backscatter Networks
IEEE Communications Letters
·
01 Jun 2017
·
doi:10.1109/LCOMM.2017.2676773
Joint flow and virtual machine placement in hybrid cloud data centers
Journal of Network and Computer Applications
·
01 May 2017
·
doi:10.1016/j.jnca.2016.12.006
The Useful Impact of Carrier Aggregation: A Measurement Study in South Korea for Commercial LTE-Advanced Networks
IEEE Vehicular Technology Magazine
·
01 Mar 2017
·
doi:10.1109/MVT.2016.2604409
Flow and Virtual Machine Placement in Wireless Cloud Data Centers
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
·
01 Jan 2017
·
doi:10.1007/978-3-319-60717-7_14
A Software-Based Monitoring Framework for Time-Space Partitioned Avionics Systems
IEEE Access
·
01 Jan 2017
·
doi:10.1109/ACCESS.2017.2755638
2016
Multisource wireless energy harvesting-based medium access control for rechargeable sensors
IEEE Transactions on Consumer Electronics
·
01 May 2016
·
doi:10.1109/TCE.2016.7514670
2015
Client selection for coordinated IEEE 802.11ac multi-user MIMO-enabled access points
2015 International Conference on Information and Communication Technology Convergence (ICTC)
·
01 Oct 2015
·
doi:10.1109/ICTC.2015.7354607
Feasibility of a low-cost Tx-Rx separated reader system for RF-powered computers
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Apr 2015
·
doi:10.1109/INFCOMW.2015.7179338
2014
Aspiration Level-Based Strategy Dynamics on the Coexistence of Spectrum Cooperation and Leasing
IEEE Communications Letters
·
01 Jan 2014
·
doi:10.1109/LCOMM.2013.112613.132085
2013
PND: a p‐persistent neighbor discovery protocol in wireless networks
Wireless Communications and Mobile Computing
·
01 May 2013
·
doi:10.1002/wcm.1128
Secondary user games with spectrum leasing market in cooperative cognitive radio networks
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Apr 2013
·
doi:10.1109/INFCOMW.2013.6970752
Resource pricing game in geo-distributed clouds
2013 Proceedings IEEE INFOCOM
·
01 Apr 2013
·
doi:10.1109/INFCOM.2013.6566947
Price-based tethering for cooperative networking
The International Conference on Information Networking 2013 (ICOIN)
·
01 Jan 2013
·
doi: 10.1109/ICOIN.2013.6496408
A stackelberg game for cooperative cognitive radio network with active SUs
2013 International Conference on Computing, Networking and Communications (ICNC)
·
01 Jan 2013
·
doi:10.1109/ICCNC.2013.6504211
2012
Topology Control in Cooperative Wireless Ad-Hoc Networks
IEEE Journal on Selected Areas in Communications
·
01 Oct 2012
·
doi:10.1109/JSAC.2012.121022
Tree-Based Neighbor Discovery in Urban Vehicular Sensor Networks
International Journal of Distributed Sensor Networks
·
01 Jan 2012
·
doi:10.1155/2012/156590
A Price-Based Spectrum Management Scheme with Stackelberg Game in Cooperative Cognitive Radio Networks
IEICE Transactions on Communications
·
01 Jan 2012
·
doi:10.1587/transcom.E95.B.2956
2011
A Stackelberg game for spectrum investment and pricing in cooperative cognitive radio networks
Proceedings of The ACM CoNEXT Student Workshop
·
06 Dec 2011
·
doi:10.1145/2079327.2079335
2010
CMAC-ORS
ACM SIGMOBILE Mobile Computing and Communications Review
·
27 Dec 2010
·
doi:10.1145/1923641.1923651
Minimizing the joining delay for cooperation in mobile robot networks
2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)
·
01 Jun 2010
·
doi:10.1109/ICUFN.2010.5547228
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
2010 Proceedings IEEE INFOCOM
·
01 Mar 2010
·
doi:10.1109/INFCOM.2010.5462126
Topology Control for Increasing Connectivity in Cooperative Wireless Ad Hoc Networks
IEICE Transactions on Communications
·
01 Jan 2010
·
doi:10.1587/transcom.E93.B.1029
Delay Minimization of Tree-Based Neighbor Discovery in Mobile Robot Networks
Lecture Notes in Computer Science
·
01 Jan 2010
·
doi:10.1007/978-3-642-14654-1_21