Jinchun Choi
Cited by
Cited by
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, D Nyang, A Mohaisen
Computational Data and Social Networks: 7th International Conference, CSoNet …, 2018
Blockchain-based man-in-the-middle (MITM) attack detection for photovoltaic systems
J Choi, B Ahn, G Bere, S Ahmad, HA Mantooth, T Kim
2021 IEEE Design Methodologies Conference (DMC), 1-6, 2021
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
An advanced persistent threat (apt)-style cyberattack testbed for distributed energy resources (der)
K Park, B Ahn, J Kim, D Won, Y Noh, J Choi, T Kim
2021 IEEE Design Methodologies Conference (DMC), 1-5, 2021
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
An overview of quantum security for distributed energy resources
J Ahn, J Chung, T Kim, B Ahn, J Choi
2021 IEEE 12th International Symposium on Power Electronics for Distributed …, 2021
Blockchain-based firmware security check and recovery for smart inverters
G Bere, B Ahn, JJ Ochoa, T Kim, AA Hadi, J Choi
2021 IEEE Applied Power Electronics Conference and Exposition (APEC), 675-679, 2021
Blockchain-enabled security module for transforming conventional inverters toward firmware security-enhanced smart inverters
B Ahn, G Bere, S Ahmad, J Choi, T Kim, S Park
2021 IEEE Energy Conversion Congress and Exposition (ECCE), 1307-1312, 2021
A real-time hardware-in-the-loop (HIL) cybersecurity testbed for power electronics devices and systems in cyber-physical environments
J Choi, D Narayanasamy, B Ahn, S Ahmad, J Zeng, T Kim
2021 IEEE 12th International Symposium on Power Electronics for Distributed …, 2021
A cyber kill chain model for distributed energy resources (DER) aggregation systems
BH Ahn, T Kim, J Choi, S Park, K Park, D Won
2021 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2021
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing, 2019
Analyzing, comparing, and detecting emerging malware: a graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
Relaying rogue AP detection scheme using SVM
S Kang, DH Nyang, JC Choi, SJ Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 …, 2013
Secure firmware update and device authentication for smart inverters using blockchain and phyiscally uncloable function (puf)-embedded security module
J Choi, B Ahn, S Pedavalli, S Ahmad, A Villasenor, T Kim
2021 6th IEEE Workshop on the Electronic Grid (eGRID), 01-04, 2021
Real-time hardware-in-the-loop distributed energy resources system testbed using IEEE 2030.5 standard
J Kim, K Park, B Ahn, J Choi, Y Noh, D Won, T Kim
2021 IEEE PES innovative smart grid technologies-Asia (ISGT Asia), 1-5, 2021
Understanding Internet of Things malware by analyzing endpoints in their static artifacts
J Choi, A Anwar, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ...
Computer Networks 206, 108768, 2022
A network-independent tool-based usable authentication system for Internet of Things devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security 108, 102338, 2021
The system can't perform the operation now. Try again later.
Articles 1–20