Rhongho Jang
Title
Cited by
Cited by
Year
RFlow+: An SDN-based WLAN monitoring and management framework
RH Jang, DG Cho, Y Noh, DH Nyang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
252017
Rogue access point detector using characteristics of channel overlapping in 802.11 n
RH Jang, J Kang, A Mohaisen, DH Nyang
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
102017
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
C Jung, Z Dagvatur, RH Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018
52018
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
40th IEEE International Conference on Distributed Computing Systems, ICDCS …, 2020
42020
Two-level network monitoring and management in WLAN using software-defined networking: poster
RH Jang, DG Cho, A Mohaisen, Y Noh, DH Nyang
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
42017
Catch me if you can: Rogue access point detection using intentional channel interference
R Jang, J Kang, A Mohaisen, DH Nyang
IEEE Transactions on Mobile Computing 19 (5), 1056-1071, 2019
32019
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
R Jang, DH Min, SK Moon, D Mohaisen, DH Nyang
IEEE INFOCOM 2020, 2020
12020
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
IEEE Conference on Distributed Computing Systems (ICDCS 2019), 2019
12019
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Highly-accurate rogue access point detection using intentional channel interference: poster
RH Jang, J Kang, A Mohaisen, DH Nyang
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
12017
A One-Page Text Entry Method Optimized for Rectangle Smartwatches
R Jang, C Jung, D Mohaisen, K Lee, D Nyang
IEEE Transactions on Mobile Computing, 2021
2021
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020, 2020
2020
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
arXiv preprint arXiv:2005.07145, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–13