2021 | A network-independent tool-based usable authentication system for Internet of Things devices | 양대헌 | Article |
2022 | A One-Page Text Entry Method Optimized for Rectangle Smartwatches | 양대헌 | Article |
2020 | Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions | 양대헌 | Article |
2020 | AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors | 양대헌 | Article |
2021 | Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools | 양대헌 | Article |
2023 | Count-Min HyperLogLog | 강신정 | Master's Thesis |
2022 | DDoS Detection System in Programmable Switches with Machine Learning Model using Entropy of Traffics | 김시안 | Master's Thesis |
2022 | DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification | 양대헌 | Article |
2021 | E-PoS: Making Proof-of-Stake Decentralized and Fair | 양대헌 | Article |
2020 | Exploring the Attack Surface of Blockchain: A Comprehensive Survey | 양대헌 | Article |
2021 | Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube | 양대헌 | Conference Paper |
2022 | Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches | 양대헌 | Article |
2021 | Large-scale and Robust Code Authorship Identification with Deep Feature Learning | 양대헌 | Article |
2020 | Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation | 양대헌 | Article |
2021 | Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems | 양대헌 | Conference Paper |
2022 | Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions | 양대헌 | Article |
2023 | RRSE-M | 강주희 | Master's Thesis |
2021 | Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey | 양대헌 | Article |
2022 | ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation | 양대헌 | Article |
2021 | SSD-Assisted Ransomware Detection and Data Recovery Techniques | 양대헌 | Article |
2022 | Understanding Internet of Things malware by analyzing endpoints in their static artifacts | 양대헌 | Article |
2020 | Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet | 양대헌 | Article |
2022 | WBC image classification and generative models based on convolutional neural network | 양대헌 | Article |