Researcher Page

사진
Kim, Yongdae (김용대)
교수, School of Electrical Engineering(전기및전자공학부)
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing

    Noh, Juhwan; Kwon, Yujin; Son, Yunmok; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.22, no.2, 2019-04

    2
    Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -

    Hong, Byeong Do; Park, Shinjo; Kim, Hongil; et al, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.17, no.10, pp.2366 - 2380, 2018-10

    3
    Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

    Choi, Hyunwoo; Kim, Yongdaeresearcher, SECURITY AND COMMUNICATION NETWORKS, 2018-04

    4
    GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes

    Son, Yunmok; Noh, Juhwan; Choi, Jaeyoung; et al, ACM Transactions on Privacy and Security, v.21, no.2, 2018-02

    5
    Crime Scene Reconstruction: Online Gold Farming Network Analysis

    Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

    6
    Private Over-Threshold Aggregation Protocols over Distributed Datasets

    Kim, Myungsun; Mohaisen, Aziz; Cheon, Jung Hee; et al, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

    7
    Supply-Chain Security for Cyberinfrastructure

    Forte, Domenic; Perez, Ron; Kim, Yongdaeresearcher; et al, COMPUTER, v.49, no.8, pp.12 - 16, 2016-08

    8
    Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

    Mohaisen, Aziz; Mekky, Hesham; Zhang, Xinwen; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

    9
    Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

    Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; et al, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

    10
    Hijacking the Vuze BitTorrent network: all your hop are belong to us

    Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, IET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

    11
    Revisiting security of proportional fair scheduler in wireless cellular networks

    Park, Han Jin; Yi, Yungresearcher; Kim, Yongdaeresearcher, COMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

    12
    Trustworthy Distributed Computing on Social Networks

    Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; et al, IEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

    13
    Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

    14
    The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

    Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

    15
    SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

    Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdaeresearcher; et al, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

    16
    On Homomorphic Signatures for Network Coding

    Yun, Aaram; Cheon, Jung Hee; Kim, Yongdaeresearcher, IEEE TRANSACTIONS ON COMPUTERS, v.59, no.9, pp.1295 - 1296, 2010-09

    17
    Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks

    Hwang, Joengmin; He, Tian; Kim, Yongdaeresearcher, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.21, no.4, pp.547 - 561, 2010-04

    18
    Secure localization with phantom node detection

    Hwang, Joengmin; He, Tian; Kim, Yongdaeresearcher, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

    19
    Provably secure timed-release public key encryption

    Cheon, JH; Hopper, N; Kim, Yongdaeresearcher; et al, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

    20
    Design and implementation of a secure multi-agent marketplace

    Jaiswal, Ashutosh; Kim, Yongdaeresearcher; Gini, Maria, Electronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0