Follow
Sanghak Oh
Title
Cited by
Cited by
Year
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
252017
A comparative study of time series anomaly detection models for industrial control systems
B Kim, MA Alawami, E Kim, S Oh, J Park, H Kim
Sensors 23 (3), 1310, 2023
222023
A flexible architecture for orchestrating network security functions to support high-level security policies
S Oh, E Kim, J Jeong, H Ko, H Kim
Proceedings of the 11th International Conference on Ubiquitous Information …, 2017
82017
AppSniffer: Towards robust mobile app fingerprinting against VPN
S Oh, M Lee, H Lee, E Bertino, H Kim
Proceedings of the ACM Web Conference 2023, 2318-2328, 2023
42023
Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?
S Oh, E Kim, H Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
42017
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models
S Oh, K Lee, S Park, D Kim, H Kim
arXiv preprint arXiv:2312.06227, 2023
12023
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks
K Lee, S Oh, H Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–7