DaeHun Nyang
Cited by
Cited by
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Method of providing completely automated public turing test to tell computer and human apart based on image
D Nyang, JI Kang
US Patent 8,352,598, 2013
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
SSD-insider: Internal defense of solid-state drive against ransomware with perfect data recovery
SH Baek, Y Jung, A Mohaisen, S Lee, DH Nyang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
Group signatures with controllable linkability for dynamic membership
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
Information Sciences 222, 761-778, 2013
Software-based remote code attestation in wireless sensor network
T AbuHmed, N Nyamaa, DH Nyang
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009
Short dynamic group signature scheme supporting controllable linkability
JY Hwang, L Chen, HS Cho, DH Nyang
IEEE Transactions on Information Forensics and Security 10 (6), 1109-1124, 2015
Keylogging-resistant visual authentication protocols
DH Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing 13 (11), 2566-2579, 2014
e-PoS: Making Proof-of-Stake Decentralized and Fair
M Saad, Z Qin, K Ren, DH Nyang, D Mohaisen
IEEE Transactions on Parallel and Distributed Systems 32 (8), 1961-1973, 2021
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
Proactive code verification protocol in wireless sensor network
YG Choi, J Kang, DH Nyang
International Conference on Computational Science and Its Applications, 1085 …, 2007
Short group signatures with controllable linkability
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
Two-factor face authentication using matrix permutation transformation and a user password
J Kang, DH Nyang, KH Lee
Information Sciences 269, 1-20, 2014
The system can't perform the operation now. Try again later.
Articles 1–20