Recent advances in smart contracts: A technical overview and state of the art VY Kemmoe, W Stone, J Kim, D Kim, J Son IEEE Access 8, 117782-117801, 2020 | 92 | 2020 |
Digestive neural networks: A novel defense strategy against inference attacks in federated learning H Lee, J Kim, S Ahn, R Hussain, S Cho, J Son computers & security 109, 102378, 2021 | 52 | 2021 |
Autonomous power allocation based on distributed deep learning for device-to-device communication underlaying cellular network J Kim, J Park, J Noh, S Cho IEEE access 8, 107853-107864, 2020 | 36* | 2020 |
Explaining deep learning-based traffic classification using a genetic algorithm S Ahn, J Kim, SY Park, S Cho IEEE Access 9, 4738-4751, 2020 | 33 | 2020 |
Bluetooth low energy security vulnerability and improvement method G Kwon, J Kim, J Noh, S Cho 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2016 | 33 | 2016 |
An interference mitigation scheme of device-to-device communications for sensor networks underlying LTE-A J Kim, NA Karim, S Cho Sensors 17 (5), 1088, 2017 | 29 | 2017 |
Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks J Noh, J Kim, S Cho IEEE Access 6, 16539-16548, 2018 | 21 | 2018 |
REACH: An efficient MAC protocol for RF energy harvesting in wireless sensor network T Kim, J Park, J Kim, J Noh, S Cho Wireless Communications and Mobile Computing 2017, 2017 | 20 | 2017 |
Fractional frequency reuse scheme for device to device communication underlaying cellular on wireless multimedia sensor networks J Kim, T Kim, J Noh, S Cho Sensors 18 (8), 2661, 2018 | 19 | 2018 |
Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography J Noh, J Kim, G Kwon, S Cho 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2016 | 19 | 2016 |
Resource allocation for NOMA based D2D system using genetic algorithm with continuous pool S Lee, J Kim, S Cho 2019 International Conference on Information and Communication Technology …, 2019 | 11 | 2019 |
Grant-free resource allocation for NOMA V2X uplink systems using a genetic algorithm approach S Lee, J Kim, J Park, S Cho Electronics 9 (7), 1111, 2020 | 10 | 2020 |
On defensive neural networks against inference attack in federated learning H Lee, J Kim, R Hussain, S Cho, J Son ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 8 | 2021 |
A novel resource allocation scheme for NOMA-V2X-femtocell with channel aggregation J Kim, J Son, W Stone, H Kim, J Noh, S Cho GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 5 | 2020 |
SuperB: superior behavior-based anomaly detection defining authorized users’ traffic patterns DY Karasek, J Kim, VY Kemmoe, MZA Bhuiyan, S Cho, J Son 2020 29th International Conference on Computer Communications and Networks …, 2020 | 2 | 2020 |
Strong privacy preserving authentication scheme for unmanned cars S Jeon, J Noh, J Kim, S Cho 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2018 | 2 | 2018 |
Lightweight smart home security system using multiple RSS-based voting T Kim, J Kim, J Noh, S Cho 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2018 | 1 | 2018 |
Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming L Cranfill, J Kim, H Lee, VY Kemmoe, S Cho, J Son Security and Communication Networks 2021, 1-14, 2021 | | 2021 |
Rogue Access Point Detection Using Peripheral Beacon Frame Cyclical Fingerprint in Real-time J Kim, J Noh, J Park, S Cho 대한전자공학회 학술대회, 490-493, 2017 | | 2017 |
A Study on the Security Vulnerability of Bluetooth Low Energy and Improvement Method 조성현 2017 International Conference on Electronics, Information, and Communication …, 2017 | | 2017 |