Sang-Yoon Chang
Cited by
Cited by
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
SY Chang, YC Hu, H Anderson, T Fu, EYL Huang
HealthSec, 5-5, 2012
Fast IP hopping randomization to secure hop-by-hop access in SDN
SY Chang, Y Park, BBA Babu
IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners
SY Chang, Y Park, S Wuthier, CW Chen
Applied Cryptography and Network Security: 17th International Conference …, 2019
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
S Samarakoon, Y Siriwardhana, P Porambage, M Liyanage, SY Chang, ...
arXiv preprint arXiv:2212.01298, 2022
Enabling dynamic access control for controller applications in software-defined networks
H Padekar, Y Park, H Hu, SY Chang
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
Anomaly detection based on traffic monitoring for secure blockchain networking
J Kim, M Nakashima, W Fan, S Wuthier, X Zhou, I Kim, SY Chang
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021
Security comparisons and performance analyses of post-quantum signature algorithms
M Raavi, S Wuthier, P Chandramouli, Y Balytskyi, X Zhou, SY Chang
International Conference on Applied Cryptography and Network Security, 424-447, 2021
SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination
SY Chang, YC Hu, N Laurenti
Proceedings of the 18th annual international conference on Mobile computing …, 2012
Signal jamming attacks against communication-based train control: Attack impact and countermeasure
S Lakshminarayana, JS Karachiwala, SY Chang, G Revadigar, ...
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
SecureMAC: Securing wireless medium access control against insider denial-of-service attacks
SY Chang, YC Hu
IEEE Transactions on Mobile Computing 16 (12), 3527-3540, 2017
Silent timestamping for blockchain mining pool security
SY Chang, Y Park
2019 International Conference on Computing, Networking and Communications …, 2019
Distributed Security Network Functions against Botnet Attacks in Software-defined Networks
Y Park, NNV Kengalahalli, SY Chang
IEEE Conference on Network Function Virtualization and Software Defined …, 2018
Performance characterization of post-quantum digital certificates
M Raavi, P Chandramouli, S Wuthier, X Zhou, SY Chang
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks
SY Chang, SLS Kumar, YC Hu, Y Park
ACM Transactions on Sensor Networks (TOSN) 15 (3), 1-25, 2019
Insider-attacks on physical-layer group secret-key generation in wireless networks
J Harshan, SY Chang, YC Hu
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
Watermarking for detecting freeloader misbehavior in software-defined networks
Y Park, SY Chang, LM Krishnamurthy
2016 International conference on computing, networking and communications …, 2016
Secure MAC-layer protocol for captive portals in wireless hotspots
J Choi, SY Chang, D Ko, YC Hu
2011 IEEE international conference on communications (ICC), 1-5, 2011
A machine learning approach to anomaly detection based on traffic monitoring for secure blockchain networking
J Kim, M Nakashima, W Fan, S Wuthier, X Zhou, I Kim, SY Chang
IEEE Transactions on Network and Service Management 19 (3), 3619-3632, 2022
Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks
SY Chang, SLS Kumar, BAN Tran, S Viswanathan, Y Park, YC Hu
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
A lightweight encryption and secure protocol for smartphone cloud
W Zegers, SY Chang, Y Park, J Gao
2015 IEEE Symposium on Service-Oriented System Engineering, 259-266, 2015
The system can't perform the operation now. Try again later.
Articles 1–20