Rhongho Jang
Title
Cited by
Cited by
Year
RFlow+: An SDN-based WLAN monitoring and management framework
RH Jang, DG Cho, Y Noh, DH Nyang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
282017
Rogue access point detector using characteristics of channel overlapping in 802.11 n
RH Jang, J Kang, A Mohaisen, DH Nyang
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
102017
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
40th IEEE International Conference on Distributed Computing Systems, ICDCS …, 2020
82020
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
C Jung, Z Dagvatur, RH Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018
62018
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
R Jang, DH Min, SK Moon, D Mohaisen, DH Nyang
IEEE INFOCOM 2020, 2020
42020
Catch me if you can: Rogue access point detection using intentional channel interference
R Jang, J Kang, A Mohaisen, DH Nyang
IEEE Transactions on Mobile Computing 19 (5), 1056-1071, 2019
42019
Two-level network monitoring and management in WLAN using software-defined networking: poster
RH Jang, DG Cho, A Mohaisen, Y Noh, DH Nyang
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
42017
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020, 2020
22020
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
IEEE Conference on Distributed Computing Systems (ICDCS 2019), 2019
22019
Technique for PIN Entry Using an Accelerometer Sensor and a Vibration Sensor on Smartphone
C Jung, RH Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 6 (12), 497-506, 2017
22017
Enhancing RCC (Recyclable counter with confinement) with cuckoo hashing
R Jang, C Jung, K Kim, D Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2016
22016
Analysis of time-based unauthorized AP detection methods according to hardware performance of unauthorized AP
RH Jang, JI Kang, DH Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2015
22015
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Highly-accurate rogue access point detection using intentional channel interference: poster
RH Jang, J Kang, A Mohaisen, DH Nyang
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
12017
Address Auto-Resolution Network System for Neutralizing ARP-Based Attacks
RH Jang, KH Lee, DH Nyang, HY Youm
KIPS Transactions on Computer and Communication Systems 6 (4), 203-210, 2017
12017
Sorting Cuckoo: Enhancing Lookup Performance of Cuckoo Hashing Using Insertion Sort
D Min, R Jang, D Nyang, K Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2017
12017
An ARP-disabled network system for neutralizing ARP-based attack
D Battulga, RH Jang, DH Nyang
Proceedings of the Korea Information Processing Society Conference, 234-237, 2016
12016
DL-FHMC: Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing, 2021
2021
A Network-independent Tool-based Usable Authentication System for Internet of Things Devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security, 102338, 2021
2021
A One-Page Text Entry Method Optimized for Rectangle Smartwatches
R Jang, C Jung, D Mohaisen, K Lee, D Nyang
IEEE Transactions on Mobile Computing, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20