RFlow+: An SDN-based WLAN monitoring and management framework RH Jang, DG Cho, Y Noh, DH Nyang IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 24 | 2017 |
Rogue access point detector using characteristics of channel overlapping in 802.11 n RH Jang, J Kang, A Mohaisen, DH Nyang 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 10 | 2017 |
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique C Jung, Z Dagvatur, RH Jang, DH Nyang, KH Lee KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018 | 5 | 2018 |
Two-level network monitoring and management in WLAN using software-defined networking: poster RH Jang, DG Cho, A Mohaisen, Y Noh, DH Nyang Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 4 | 2017 |
Catch me if you can: Rogue access point detection using intentional channel interference R Jang, J Kang, A Mohaisen, DH Nyang IEEE Transactions on Mobile Computing 19 (5), 1056-1071, 2019 | 3 | 2019 |
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ... 40th IEEE International Conference on Distributed Computing Systems, ICDCS …, 2020 | 2 | 2020 |
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event R Jang, DH Min, SK Moon, D Mohaisen, DH Nyang IEEE INFOCOM 2020, 2020 | 1 | 2020 |
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang IEEE Conference on Distributed Computing Systems (ICDCS 2019), 2019 | 1 | 2019 |
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 1 | 2019 |
Highly-accurate rogue access point detection using intentional channel interference: poster RH Jang, J Kang, A Mohaisen, DH Nyang Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 1 | 2017 |
A One-Page Text Entry Method Optimized for Rectangle Smartwatches R Jang, C Jung, D Mohaisen, K Lee, D Nyang IEEE Transactions on Mobile Computing, 1-1, 2021 | | 2021 |
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen IEEE INFOCOM 2020, 2020 | | 2020 |
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... arXiv preprint arXiv:2005.07145, 2020 | | 2020 |