Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ... IEEE ICDCS 2020, 2020 | 58 | 2020 |
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen IEEE INFOCOM 2020, 2020 | 56 | 2020 |
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021 | 53 | 2021 |
AttCAT: Explaining Transformers via Attentive Class Activation Tokens Y Qiang, D Pan, C Li, X Li, R Jang, D Zhu NeurIPS 2022, 2022 | 49 | 2022 |
Rflow+: An SDN-based WLAN Monitoring and Management Framework R Jang, D Cho, Y Noh, DH Nyang IEEE INFOCOM 2017, 2017 | 39 | 2017 |
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event R Jang, DH Min, SK Moon, D Mohaisen, DH Nyang IEEE INFOCOM 2020, 2020 | 28 | 2020 |
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference R Jang, J Kang, A Mohaisen, DH Nyang IEEE Transactions on Mobile Computing 19 (5), 1056-1071, 2019 | 27 | 2019 |
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study A Alabduljabbar, R Ma, S Choi, R Jang, S Chen, D Mohaisen CySSS 2022@AsiaCCS, 2022 | 24 | 2022 |
Investigating the Effect of Traffic Sampling on Machine Learning-based Network Intrusion Detection Approaches J Alikhanov, R Jang, M Abuhamad, D Mohaisen, D Nyang, Y Noh IEEE Access 10, 5801-5823, 2021 | 23 | 2021 |
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet J Park, R Jang, M Mohaisen, D Mohaisen IEEE/ACM Transactions on Networking 30 (01), 1-14, 2022 | 18 | 2022 |
Poster: Measuring and Assessing the Risks of Free Content Websites A Alabduljabbar, R Ma, S Alshamrani, R Jang, S Chen, D Mohaisen ISOC NDSS 2022, 2022 | 17 | 2022 |
A Robust Counting Sketch for Data Plane Intrusion Detection S Kim, C Jung, R Jang, D Mohaisen, DH Nyang ISOC NDSS 2023, 2023 | 14* | 2023 |
Rogue Access Point Detector using Characteristics of Channel Overlapping in 802.11n R Jang, J Kang, A Mohaisen, DH Nyang IEEE ICDCS 2017, 2017 | 14 | 2017 |
A Scalable and Dynamic ACL System for In-Network Defense C Jung, S Kim, R Jang, D Mohaisen, DH Nyang ACM CCS 2022, 2022 | 13 | 2022 |
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems A Abusnaina, A Anwar, S Alshamrani, A Alabduljabbar, R Jang, ... Proceedings of the 25th International Symposium on Research in Attacks ¡¦, 2022 | 9 | 2022 |
A One-Page Text Entry Method Optimized for Rectangle Smartwatches R Jang, C Jung, D Mohaisen, K Lee, DH Nyang IEEE Transactions on Mobile Computing 21 (10), 2021 | 9 | 2021 |
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique C Jung, Z Dagvatur, R Jang, DH Nyang, KH Lee KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018 | 8 | 2018 |
A Network-independent Tool-based Usable Authentication System for Internet of Things Devices C Jung, J Choi, R Jang, D Mohaisen, DH Nyang Computers & Security 108, 102338, 2021 | 7 | 2021 |
Systemically evaluating the robustness of ML-based IoT malware detectors A Abusnaina, A Anwar, S Alshamrani, A Alabduljabbar, R Jang, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2021 | 7 | 2021 |
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang IEEE ICDCS 2019, 2019 | 7 | 2019 |