Search

Your search keyword '"DaeHun Nyang"' showing total 43 results

Search Constraints

Start Over You searched for: Author "DaeHun Nyang" Remove constraint Author: "DaeHun Nyang" Publisher ieee Remove constraint Publisher: ieee
43 results on '"DaeHun Nyang"'

Search Results

1. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

2. Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches

3. Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet

5. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

6. Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

7. Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

8. From Blue-Sky to Practical Adversarial Learning

9. SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event

10. DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

11. Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets

12. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

13. InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows

14. Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems

15. Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks

16. SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery

17. Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions

18. Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications

19. Understanding the Privacy Implications of DNSSEC Look-Aside Validation

20. Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

21. RFlow+: An SDN-based WLAN monitoring and management framework

22. Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption

23. Short Group Signatures with Controllable Linkability

24. Software-Based Remote Code Attestation in Wireless Sensor Network

25. A-Kad: an anonymous P2P protocol based on Kad network

26. Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network

27. Secure cluster based routing protocol incorporating the distributed PKI mechanisms

28. An interactive proof based identification and signature scheme using Euler's totient function

29. Locality based location tracking using virtually hierarchical link in personal communications services

30. An improved location tracking mechanism using call locality relation in personal communications services

31. A test sequence generation scheme satisfying the completeness criteria

32. Armoring password based protocol using zero-knowledge with secret coin tossing

Catalog

Books, media, physical & digital resources