default search action
RhongHo Jang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang:
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System. USENIX Security Symposium 2024 - 2023
- [c18]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CSoNet 2023: 83-92 - [c17]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. ICCCN 2023: 1-10 - [c16]Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. NDSS 2023 - [i7]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. CoRR abs/2304.13278 (2023) - [i6]Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen:
Measuring and Modeling the Free Content Web. CoRR abs/2304.14359 (2023) - [i5]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CoRR abs/2311.15366 (2023) - 2022
- [j6]Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh:
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches. IEEE Access 10: 5801-5823 (2022) - [j5]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3432-3447 (2022) - [j4]Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang:
A One-Page Text Entry Method Optimized for Rectangle Smartwatches. IEEE Trans. Mob. Comput. 21(10): 3443-3454 (2022) - [j3]Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. IEEE/ACM Trans. Netw. 30(1): 76-89 (2022) - [c15]Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. CCS 2022: 1679-1693 - [c14]Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen:
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study. CySSS@AsiaCCS 2022: 19-25 - [c13]Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang:
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. DSN 2022: 331-342 - [c12]Yao Qiang, Deng Pan, Chengyin Li, Xin Li, Rhongho Jang, Dongxiao Zhu:
AttCAT: Explaining Transformers via Attentive Class Activation Tokens. NeurIPS 2022 - [c11]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. RAID 2022: 308-320 - 2021
- [j2]Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A network-independent tool-based usable authentication system for Internet of Things devices. Comput. Secur. 108: 102338 (2021) - [c10]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. DSN (Supplements) 2021: 3-4 - [i4]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen:
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation. CoRR abs/2108.13373 (2021) - [i3]Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches. CoRR abs/2111.02759 (2021) - 2020
- [j1]Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference. IEEE Trans. Mob. Comput. 19(5): 1056-1071 (2020) - [c9]Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. ICDCS 2020: 888-898 - [c8]Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang:
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. INFOCOM 2020: 1339-1348 - [c7]Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. INFOCOM 2020: 2459-2468 - [i2]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification. CoRR abs/2005.07145 (2020)
2010 – 2019
- 2019
- [c6]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows. ICDCS 2019: 2047-2056 - [c5]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. WiSec 2019: 286-287 - [i1]RhongHo Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table. CoRR abs/1902.04143 (2019) - 2017
- [c4]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n. ICDCS 2017: 2515-2520 - [c3]RhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. INFOCOM 2017: 1-9 - [c2]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. WISEC 2017: 277-278 - [c1]RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. WISEC 2017: 279-280
Coauthor Index
aka: Aziz Mohaisen
aka: Daehun Nyang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint