Follow
Suhyeon Lee
Title
Cited by
Cited by
Year
Ransomware protection using the moving target defense perspective
S Lee, HK Kim, K Kim
Computers & Electrical Engineering 78, 288-299, 2019
392019
Countering block withholding attack efficiently
S Lee, S Kim
IEEE INFOCOM 2019 Workshop: The 2nd Workshop on Cryptocurrencies and …, 2019
212019
Short selling attack: A self-destructive but profitable 51% attack on pos blockchains
S Lee, S Kim
Cryptology ePrint Archive, 2020
182020
Blockchain as a cyber defense: opportunities, applications, and challenges
S Lee, S Kim
IEEE Access 10, 2602-2618, 2021
162021
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies
S Lee, S Kim
MobiCom 2020 Workshop:The 3rd Workshop on Cryptocurrencies and Blockchains …, 2020
102020
Pooled mining makes selfish mining tricky
S Lee, S Kim
Cryptology ePrint Archive, 2018
82018
Rethinking selfish mining under pooled mining
S Lee, S Kim
ICT Express 9 (3), 356-361, 2023
72023
Detective mining: Selfish mining becomes unrealistic under mining pool environment
S Lee, S Kim
Cryptology ePrint Archive, 2019
62019
Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File
S Lee, S Lee, J Park, K Kim, K Lee
IEEE Access, 2023
52023
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies
S Lee, S Kim
Concurrency and Computation: Practice and Experience 35 (16), e6585, 2023
22023
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
S Lee, D Lee, S Kim
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial …, 2022
12022
A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection
H Yang, S Lee, S Kim
ICBC '24: The IEEE International Conference on Blockchain and Cryptocurrency …, 2024
2024
Do You Really Need to Disguise Normal Servers as Honeypots?
S Lee, K Cho, S Kim
MILCOM 2022: The IEEE Military Communications Conference (MILCOM) 2022, 166-172, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–13