Follow
DaeHun Nyang
Title
Cited by
Cited by
Year
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
520*2020
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
1662019
Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
1512020
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
1272008
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
1262009
Method of providing completely automated public turing test to tell computer and human apart based on image
D Nyang, JI Kang
US Patent 8,352,598, 2013
1252013
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1232019
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
1222020
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1112018
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
842019
SSD-insider: Internal defense of solid-state drive against ransomware with perfect data recovery
SH Baek, Y Jung, A Mohaisen, S Lee, DH Nyang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
712018
Group signatures with controllable linkability for dynamic membership
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
Information Sciences 222, 761-778, 2013
712013
Software-based remote code attestation in wireless sensor network
T AbuHmed, N Nyamaa, DH Nyang
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009
702009
Short dynamic group signature scheme supporting controllable linkability
JY Hwang, L Chen, HS Cho, DH Nyang
IEEE Transactions on Information Forensics and Security 10 (6), 1109-1124, 2015
692015
Keylogging-resistant visual authentication protocols
DH Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing 13 (11), 2566-2579, 2014
682014
e-PoS: Making Proof-of-Stake Decentralized and Fair
M Saad, Z Qin, K Ren, DH Nyang, D Mohaisen
IEEE Transactions on Parallel and Distributed Systems 32 (8), 1961-1973, 2021
592021
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
562019
Proactive code verification protocol in wireless sensor network
YG Choi, J Kang, DH Nyang
International Conference on Computational Science and Its Applications, 1085 …, 2007
552007
Short group signatures with controllable linkability
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
532011
Two-factor face authentication using matrix permutation transformation and a user password
J Kang, DH Nyang, KH Lee
Information Sciences 269, 1-20, 2014
522014
The system can't perform the operation now. Try again later.
Articles 1–20