Researcher Page

사진
Kim, Yongdae (김용대)
교수, (전기및전자공학부)
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

    Kim, Dohyun; Cho, Mangi; Shin, Hocheol; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.26, no.4, 2023-11

    2
    Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned

    Kim, Dongkwan; Kim, Eunsoo; Cha, Sang Kil; et al, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.4, pp.1661 - 1682, 2023-04

    3
    Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds

    Kim, Dongkwan; Kim, Eunsoo; Kim, Mingeun; et al, IEEE SECURITY & PRIVACY, v.19, no.6, pp.26 - 35, 2021-11

    4
    Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks

    Seol, Hoseok; Kim, Minhye; Kim, Taesoo; et al, IEEE TRANSACTIONS ON COMPUTERS, v.70, no.4, pp.539 - 551, 2021-04

    5
    블록체인 데이터 공유를 통한 블록체인 시뮬레이터 성능 개선 연구

    김현진; 김용곤; 한동수; et al, 정보과학회 컴퓨팅의 실제 논문지, v.27, no.1, pp.55 - 61, 2021-01

    6
    Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing

    Noh, Juhwan; Kwon, Yujin; Son, Yunmok; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.22, no.2, 2019-04

    7
    Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -

    Hong, Byeong Do; Park, Shinjo; Kim, Hongil; et al, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.17, no.10, pp.2366 - 2380, 2018-10

    8
    Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

    Choi, Hyunwoo; Kim, Yongdae, SECURITY AND COMMUNICATION NETWORKS, 2018-04

    9
    GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes

    Son, Yunmok; Noh, Juhwan; Choi, Jaeyoung; et al, ACM Transactions on Privacy and Security, v.21, no.2, 2018-02

    10
    Crime Scene Reconstruction: Online Gold Farming Network Analysis

    Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

    11
    Private Over-Threshold Aggregation Protocols over Distributed Datasets

    Kim, Myungsun; Mohaisen, Aziz; Cheon, Jung Hee; et al, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

    12
    Supply-Chain Security for Cyberinfrastructure

    Forte, Domenic; Perez, Ron; Kim, Yongdae; et al, COMPUTER, v.49, no.8, pp.12 - 16, 2016-08

    13
    Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

    Mohaisen, Aziz; Mekky, Hesham; Zhang, Xinwen; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

    14
    Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

    Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; et al, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

    15
    Hijacking the Vuze BitTorrent network: all your hop are belong to us

    Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, IET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

    16
    Revisiting security of proportional fair scheduler in wireless cellular networks

    Park, Han Jin; Yi, Yung; Kim, Yongdae, COMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

    17
    Trustworthy Distributed Computing on Social Networks

    Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; et al, IEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

    18
    Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

    19
    The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

    Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

    20
    SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

    Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdae; et al, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0