Publications
2025
Website Identification Feasibility of QUIC Encrypted Traffic Using FlowPic Representation
Proceedings of the Korea Software Congress 2025 (KSC 2025)
·
19 Dec 2025
·
[no id info]
Evaluating Detection Robustness and Generalization of HyperVision in a Heterogeneous Traffic Environment
Proceedings of the Korea Software Congress 2025 (KSC 2025)
·
19 Dec 2025
·
[no id info]
Per-Flow Split Evaluation for Packet Representation Learning: Data Snooping and Payload Dependency in Encrypted Traffic Classification
Proceedings of the Korea Software Congress 2025 (KSC 2025)
·
19 Dec 2025
·
[no id info]
Encrypted Traffic Classification based on Multi-Task Learning with Multi-modal representations
Proceedings of the Korea Software Congress 2025 (KSC 2025)
·
19 Dec 2025
·
[no id info]
2024
Evaluating SPLT-based and nPrint-based AutoML Classifiers on an Encrypted Application Traffic over VPN Dataset
Proceedings of the Korea Software Congress 2024 (KSC 2024)
·
18 Dec 2024
·
[no id info]
Feasibility of Adopting Multipath TCP to BitTorrent-based Applications with Mininet
Proceedings of the 2024 KICS Summer Conference
·
19 Jun 2024
·
[no id info]
QUIC website fingerprinting based on automated machine learning
ICT Express
·
01 Jun 2024
·
doi:10.1016/j.icte.2023.12.008
A method to speed up container deployments on edge clouds
Annual Conference of KIPS
·
23 May 2024
·
[no id info]
2023
A Survey of Sequential Feature Representation Techniques in Encrypted Network Traffic Analysis
Proceedings of the KIISE Korea Software Congress 2023 (KSC 2023)
·
20 Dec 2023
·
[no id info]
A Survey on Website Fingerprinting Techniques Based on Machine Learning
Proceedings of the 2023 Korea institute of Information Security and Cryptology Choongchung Chapter Conference (KIISC CC 2023)
·
22 Jun 2023
·
[no id info]
A Survey on Traffic Data Preprocessing for Encrypted Traffic Analysis Based on Machine Learning
Proceedings of the KIISC Conference on Information Security and Cryptography Summer 2023 (CISC-S 2023)
·
22 Jun 2023
·
[no id info]
On the Effectiveness of nPrint to an Encrypted Malware Traffic Dataset
Proceedings of the KIISE Korea Computer Congress 2023 (KCC 2023)
·
17 Jun 2023
·
[no id info]
Reproducibility Analysis of Linux 802.11n CSI Tool-based Wireless Network Experiments through AoA/AoD Estimation
Proceedings of the KIISE Korea Computer Congress 2023 (KCC 2023)
·
17 Jun 2023
·
[no id info]
A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic
Journal of the Korea Institute of Information Security & Cryptology
·
01 Jan 2023
·
[no id info]
2022
Revisiting TLS-Encrypted Traffic Fingerprinting Methods for Malware Family Classification
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
·
19 Oct 2022
·
doi:10.1109/ICTC55196.2022.9952872
Trends in Machine Learning Models for Encrypted Traffic Classification
Proceedings of the 2022 Korea institute of Information Security and Cryptology Choongchung Chapter Conference (KIISC CC 2022)
·
14 Oct 2022
·
[no id info]
Impact of Destination Context of TLS-Encrypted Traffic in Malware Family Classification
Proceedings of the 32nd Joint Conference on Communications and Information (JCCI 2022)
·
27 Apr 2022
·
[no id info]
Combating Adversarial Covert Channels in Wi-Fi Networks
IEEE Access
·
01 Jan 2022
·
doi:10.1109/ACCESS.2022.3201648
2021
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Applied Sciences
·
24 Dec 2021
·
doi:10.3390/app12010155
Experimental Evaluation of Malware Family Classification Methods from Sequential Information of TLS-Encrypted Traffic
Electronics
·
20 Dec 2021
·
doi:10.3390/electronics10243180
A Survey on TLS Fingerprinting for Cyber Threat Intelligence
The Korea Institute of Information Security and Cryptology
·
30 Oct 2021
·
[no id info]
BuSAR: Bluetooth Slot Availability Randomization for Better Coexistence With Dense Wi-Fi Networks
IEEE Transactions on Mobile Computing
·
01 Mar 2021
·
doi:10.1109/tmc.2019.2955080
Predictive Prefetching Based on User Interaction for Web Applications
IEEE Communications Letters
·
01 Mar 2021
·
doi:10.1109/LCOMM.2020.3038255
Revisiting Adaptive Frequency Hopping Map Prediction in Bluetooth with Machine Learning Classifiers
Energies
·
10 Feb 2021
·
doi:10.3390/en14040928
Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth
2021 International Conference on Information Networking (ICOIN)
·
13 Jan 2021
·
doi:10.1109/ICOIN50884.2021.9333996
2020
Poster: Feasibility of Malware Traffic Analysis through TLS-Encrypted Flow Visualization
2020 IEEE 28th International Conference on Network Protocols (ICNP)
·
13 Oct 2020
·
doi:10.1109/ICNP49622.2020.9259387
PolarScout: Wi-Fi Interference-Resilient ZigBee Communication via Shell-Shaping
IEEE/ACM Transactions on Networking
·
01 Aug 2020
·
doi:10.1109/TNET.2020.2989387
Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via Precoding
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Jul 2020
·
doi:10.1109/INFOCOMWKSHPS50562.2020.9162658
Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Jul 2020
·
doi:10.1109/INFOCOMWKSHPS50562.2020.9162971
Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach
IEEE Internet of Things Journal
·
01 Apr 2020
·
doi:10.1109/JIOT.2020.2972915
2019
DOTA: Physical-Layer Decomposing and Threading for ZigBee/Wi-Fi Co-Transmission
IEEE Wireless Communications Letters
·
01 Feb 2019
·
doi:10.1109/LWC.2018.2863294
Secure and Lightweight Subflow Establishment of Multipath-TCP
IEEE Access
·
01 Jan 2019
·
doi:10.1109/access.2019.2957434
2018
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives
Journal of Network and Computer Applications
·
01 Dec 2018
·
doi:10.1016/j.jnca.2018.08.011
2017
RSSI의 표준편차를 활용한 실내 측위 기법 (Indoor Localization using RSSI Standard Deviation)
제 24회 통신정보 합동학술대회
·
24 Sep 2017
·
[no id info]
SCBF: Exploiting a Collision for Authentication in Backscatter Networks
IEEE Communications Letters
·
01 Jun 2017
·
doi:10.1109/LCOMM.2017.2676773
Joint flow and virtual machine placement in hybrid cloud data centers
Journal of Network and Computer Applications
·
01 May 2017
·
doi:10.1016/j.jnca.2016.12.006
Cooperative Bridges: Towards Energy-Efficient Topology Control for Cooperative Wireless Ad Hoc Networks
the 14th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom'2008)
·
20 Apr 2017
·
[no id info]
모바일 테더링 기반 협력 네트워크 구성의 가능성 분석 (Feasibility Analysis of Mobile Tethering-based Cooperative Networks)
한국정보과학회 학술발표논문집
·
20 Apr 2017
·
[no id info]
모바일 테더링 기반 협력 이종 네트워크의 효용 최대화 (Utility Maximization in Mobile Tethering-based Cooperative Heterogeneous Networks)
정보과학회논문지: 컴퓨팅의 실제 및 레터
·
20 Apr 2017
·
[no id info]
VM-CDS를 이용한 VANET에서의 효율적인 브로드캐스팅 기법 (An Efficient Broadcasting Method based on VM-CDS in Vehicular Ad-hoc Networks)
Journal of KIISE: Information Networking
·
20 Apr 2017
·
[no id info]
Joint Gateway and Relay Foadside Unit Placement in Vehicular Networks
한국멀티미디어 학회지 (Korea Multimedia Society Magazine)
·
20 Apr 2017
·
[no id info]
노드 간 거리 인자 설계 장치 및 방법 (Apparatus and Method for Distance Metric Design between Nodes)
[no publisher info]
·
20 Apr 2017
·
[no id info]
Method and Apparatus for Controlling Client Connection in MU-MIMO Networks
[no publisher info]
·
20 Apr 2017
·
[no id info]
The Useful Impact of Carrier Aggregation: A Measurement Study in South Korea for Commercial LTE-Advanced Networks
IEEE Vehicular Technology Magazine
·
01 Mar 2017
·
doi:10.1109/MVT.2016.2604409
Flow and Virtual Machine Placement in Wireless Cloud Data Centers
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
·
01 Jan 2017
·
doi:10.1007/978-3-319-60717-7_14
A Software-Based Monitoring Framework for Time-Space Partitioned Avionics Systems
IEEE Access
·
01 Jan 2017
·
doi:10.1109/ACCESS.2017.2755638
2016
Multisource wireless energy harvesting-based medium access control for rechargeable sensors
IEEE Transactions on Consumer Electronics
·
01 May 2016
·
doi:10.1109/TCE.2016.7514670
2015
Client selection for coordinated IEEE 802.11ac multi-user MIMO-enabled access points
2015 International Conference on Information and Communication Technology Convergence (ICTC)
·
01 Oct 2015
·
doi:10.1109/ICTC.2015.7354607
Feasibility of a low-cost Tx-Rx separated reader system for RF-powered computers
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Apr 2015
·
doi:10.1109/INFCOMW.2015.7179338
2014
Aspiration Level-Based Strategy Dynamics on the Coexistence of Spectrum Cooperation and Leasing
IEEE Communications Letters
·
01 Jan 2014
·
doi:10.1109/LCOMM.2013.112613.132085
2013
PND: a p‐persistent neighbor discovery protocol in wireless networks
Wireless Communications and Mobile Computing
·
01 May 2013
·
doi:10.1002/wcm.1128
Secondary user games with spectrum leasing market in cooperative cognitive radio networks
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
·
01 Apr 2013
·
doi:10.1109/INFCOMW.2013.6970752
Resource pricing game in geo-distributed clouds
2013 Proceedings IEEE INFOCOM
·
01 Apr 2013
·
doi:10.1109/INFCOM.2013.6566947
Price-based tethering for cooperative networking
The International Conference on Information Networking 2013 (ICOIN)
·
01 Jan 2013
·
doi: 10.1109/ICOIN.2013.6496408
A stackelberg game for cooperative cognitive radio network with active SUs
2013 International Conference on Computing, Networking and Communications (ICNC)
·
01 Jan 2013
·
doi:10.1109/ICCNC.2013.6504211
2012
Topology Control in Cooperative Wireless Ad-Hoc Networks
IEEE Journal on Selected Areas in Communications
·
01 Oct 2012
·
doi:10.1109/JSAC.2012.121022
Tree-Based Neighbor Discovery in Urban Vehicular Sensor Networks
International Journal of Distributed Sensor Networks
·
01 Jan 2012
·
doi:10.1155/2012/156590
A Price-Based Spectrum Management Scheme with Stackelberg Game in Cooperative Cognitive Radio Networks
IEICE Transactions on Communications
·
01 Jan 2012
·
doi:10.1587/transcom.E95.B.2956
2011
A Stackelberg game for spectrum investment and pricing in cooperative cognitive radio networks
Proceedings of The ACM CoNEXT Student Workshop
·
06 Dec 2011
·
doi:10.1145/2079327.2079335
2010
CMAC-ORS
ACM SIGMOBILE Mobile Computing and Communications Review
·
27 Dec 2010
·
doi:10.1145/1923641.1923651
Minimizing the joining delay for cooperation in mobile robot networks
2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)
·
01 Jun 2010
·
doi:10.1109/ICUFN.2010.5547228
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
2010 Proceedings IEEE INFOCOM
·
01 Mar 2010
·
doi:10.1109/INFCOM.2010.5462126
Topology Control for Increasing Connectivity in Cooperative Wireless Ad Hoc Networks
IEICE Transactions on Communications
·
01 Jan 2010
·
doi:10.1587/transcom.E93.B.1029
Delay Minimization of Tree-Based Neighbor Discovery in Mobile Robot Networks
Lecture Notes in Computer Science
·
01 Jan 2010
·
doi:10.1007/978-3-642-14654-1_21