default search action
Sang-Yoon Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Trajectory-Driven Deep Learning for UAV Location Integrity Checks. IEEE Access 12: 178789-178804 (2024) - [j13]Sang-Yoon Chang, Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Xiaobo Zhou:
Base station gateway to secure user channel access at the first hop edge. Comput. Networks 240: 110165 (2024) - [j12]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
Secure and Efficient Authentication using Linkage for permissionless Bitcoin network. Comput. Networks 254: 110840 (2024) - [c93]Simeon Wuthier, Nazmus Sakib, Sang-Yoon Chang:
Positive Reputation Score for Bitcoin P2P Network. CCNC 2024: 519-524 - [c92]Nazmus Sakib, Simeon Wuthier, Kelei Zhang, Xiaobo Zhou, Sang-Yoon Chang:
From Slow Propagation to Partition: Analyzing Bitcoin Over Anonymous Routing. ICBC 2024: 377-385 - [c91]Manohar Raavi, Simeon Wuthier, Sang-Yoon Chang:
Securing Post-Quantum DNSSEC Against Fragmentation Mis-Association Threat. ICC 2024: 97-102 - [c90]Sourav Purification, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Fake Base Station Detection and Blacklisting. ICCCN 2024: 1-9 - [c89]Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Intelligent Trajectory-based Approach to UAV Location Integrity Checks. ICCCN 2024: 1-9 - [c88]Kelei Zhang, Sang-Yoon Chang:
Performance or Anonymity? Source-Driven Tor Relay Selection for Performance Enhancement. ICCCN 2024: 1-9 - [c87]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks. ICIN 2024: 114-121 - [c86]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Flying Base Station Channel Capacity. SNTA@HPDC 2024: 24-31 - [c85]Rono Cheruiyot, Sourav Purification, Simeon Wuthier, Sang-Yoon Chang:
5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery. SVCC 2024: 1-3 - [c84]Amanul Islam, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim:
Anomaly Detection in 5G using Variational Autoencoders. SVCC 2024: 1-6 - [c83]Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Toward Post-Quantum Digital Certificate for eSIM. SVCC 2024: 1-3 - [c82]Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Wireless Link Routing to Secure Against Fake Base Station in 5G. SVCC 2024: 1-3 - [c81]Kelei Zhang, Sang-Yoon Chang:
Exploring Reinforcement Learning to Aid Tor Latency Performance. SVCC 2024: 1-3 - [i10]Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
PT-symmetric mapping of three states and its implementation on a cloud quantum processor. IACR Cryptol. ePrint Arch. 2024: 17 (2024) - 2023
- [j11]Chiho Kim, Sang-Yoon Chang, Dongeun Lee, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Reliable Detection of Location Spoofing and Variation Attacks. IEEE Access 11: 10813-10825 (2023) - [j10]Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou:
Auto-tune: An efficient autonomous multi-path payment routing algorithm for Payment Channel Networks. Comput. Networks 225: 109659 (2023) - [j9]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Securing UAV Flying Base Station for Mobile Networking: A Review. Future Internet 15(5): 176 (2023) - [j8]Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1302-1318 (2023) - [j7]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Dongeun Lee, Jinoh Kim:
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture. IEEE Trans. Netw. Serv. Manag. 20(3): 3900-3914 (2023) - [c80]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++: Cryptocurrency Blockchain Handshaking With Software Assurance. CCNC 2023: 804-809 - [c79]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance. CCNC 2023: 915-916 - [c78]Manohar Raavi, Simeon Wuthier, Xiaobo Zhou, Sang-Yoon Chang:
Post-Quantum QUIC Protocol in Cloud Networking. EuCNC/6G Summit 2023: 573-578 - [c77]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power. SNTA@HPDC 2023: 3-8 - [c76]Junxian Zhao, Xiaobo Zhou, Sang-Yoon Chang, Chengzhong Xu:
Let It Go: Relieving Garbage Collection Pain for Latency Critical Applications in Golang. HPDC 2023: 169-180 - [c75]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Jinoh Kim:
An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection. ICMLA 2023: 574-579 - [c74]SangHyun Byun, Arijet Sarker, Ken Lew, Jugal Kalita, Sang-Yoon Chang:
Privacy-Preserving Trust Management For Vehicular Communications and Federated Learning. SVCC 2023: 1-8 - [c73]Yueyang Li, Luyi Li, Ruxue Luo, Yuzhen Chen, Arijet Sarker, Sang-Yoon Chang, Wenjun Fan:
Investigation and Countermeasure toward Unintentional Access to Docker Container. SVCC 2023: 1-6 - 2022
- [j6]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency. Comput. Networks 219: 109436 (2022) - [j5]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. IEEE Trans. Netw. Serv. Manag. 19(3): 3619-3632 (2022) - [c72]Kelei Zhang, Simeon Wuthier, Kay Yoon, Sang-Yoon Chang:
Designing and Using Capture The Flag for Coordination and Interaction in Engineering Education. EDUCON 2022: 1555-1560 - [c71]Yaroslav Balytskyi, Manohar Raavi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
P T-symmetric Bayesian parameter estimation on a superconducting quantum processor. ICC 2022: 3257-3262 - [c70]Wenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network. ICDCS 2022: 191-201 - [c69]Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
QUIC Protocol with Post-quantum Authentication. ISC 2022: 84-91 - [c68]Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou:
Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks. LCN 2022: 347-350 - [c67]Junxian Zhao, Aidi Pi, Xiaobo Zhou, Sang-Yoon Chang, Chengzhong Xu:
Improving Concurrent GC for Latency Critical Services in Multi-tenant Systems. Middleware 2022: 43-55 - [c66]Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
Greedy Networking in Cryptocurrency Blockchain. SEC 2022: 343-359 - [c65]Wenjun Fan, Shubham Kumar, Sang-Yoon Chang, Younghee Park:
A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection. SVCC 2022: 57-73 - [c64]Nikhil Sai Kanuri, Sang-Yoon Chang, Younghee Park, Jonghyun Kim, Jinoh Kim:
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks. SVCC 2022: 107-119 - [c63]Kathryn Hines, Manohar Raavi, John-Michael Villeneuve, Simeon Wuthier, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang:
Post-Quantum Cipher Power Analysis in Lightweight Devices. WISEC 2022: 282-284 - [c62]Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Lightweight Code Assurance Proof for Wireless Software. WISEC 2022: 285-287 - [e1]Sang-Yoon Chang, Luis Angel D. Bathen, Fabio Di Troia, Thomas H. Austin, Alex J. Nelson:
Silicon Valley Cybersecurity Conference - Second Conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, Revised Selected Papers. Communications in Computer and Information Science 1536, Springer 2022, ISBN 978-3-030-96056-8 [contents] - [d1]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. IEEE DataPort, 2022 - [i9]Sang-Yoon Chang, Kay Yoon, Simeon Wuthier, Kelei Zhang:
Capture the Flag for Team Construction in Cybersecurity. CoRR abs/2206.08971 (2022) - [i8]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. CoRR abs/2212.01298 (2022) - 2021
- [c61]Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou, Sang-Yoon Chang:
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms. ACNS (2) 2021: 424-447 - [c60]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Dongeun Lee, Jinoh Kim:
Zero-day Malware Detection using Threshold-free Autoencoding Architecture. IEEE BigData 2021: 1279-1284 - [c59]Mark Vaszary, Andreas Slovacek, Yanyan Zhuang, Sang-Yoon Chang:
Securing Tire Pressure Monitoring System for Vehicular Privacy. CCNC 2021: 1-6 - [c58]Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. CNS 2021: 101-109 - [c57]Kay Yoon, Sang-Yoon Chang:
Teaching Team Collaboration in Cybersecurity: A Case Study from the Transactive Memory Systems Perspective. EDUCON 2021: 841-845 - [c56]Wenjun Fan, Jinoh Kim, Ikkyun Kim, Xiaobo Zhou, Sang-Yoon Chang:
Performance Analyses for Applying Machine Learning on Bitcoin Miners. ICEIC 2021: 1-4 - [c55]Wenjun Fan, Hsiang-Jen Hong, Simeon Wuthier, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
Security Analyses of Misbehavior Tracking in Bitcoin Network. IEEE ICBC 2021: 1-3 - [c54]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. IEEE ICBC 2021: 1-9 - [c53]Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:
Detecting Bias in Randomness by PT-Symmetric Quantum State Discrimination. ICC 2021: 1-6 - [c52]Wenjun Fan, Hsiang-Jen Hong, Xiaobo Zhou, Sang-Yoon Chang:
A Generic Blockchain Framework to Secure Decentralized Applications. ICC 2021: 1-7 - [c51]Manohar Raavi, Pranav Chandramouli, Simeon Wuthier, Xiaobo Zhou, Sang-Yoon Chang:
Performance Characterization of Post-Quantum Digital Certificates. ICCCN 2021: 1-9 - [c50]Simeon Wuthier, Sang-Yoon Chang:
Demo: Proof-of-Work Network Simulator for Blockchain and Cryptocurrency Research. ICDCS 2021: 1098-1101 - [c49]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, Xiaobo Zhou, C. Edward Chow, Sang-Yoon Chang:
Robust P2P Connectivity Estimation for Permissionless Bitcoin Network. IWQoS 2021: 1-6 - [c48]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking. LCN 2021: 319-322 - [c47]Wenjun Fan, Sang-Yoon Chang, Shubham Kumar, Xiaobo Zhou, Younghee Park:
Blockchain-based Secure Coordination for Distributed SDN Control Plane. NetSoft 2021: 253-257 - [c46]Yaroslav Balytskyi, Manohar Raavi, Sang-Yoon Chang:
P T-Enhanced Bayesian Parameter Estimation. QCE 2021: 60-70 - [c45]Arijet Sarker, SangHyun Byun, Wenjun Fan, Sang-Yoon Chang:
Blockchain-based root of trust management in security credential management system for vehicular communications. SAC 2021: 223-231 - [c44]Ahmad Najee-Ullah, Luis Landeros, Yaroslav Balytskyi, Sang-Yoon Chang:
Towards Detection of AI-Generated Texts and Misinformation. STAST 2021: 194-205 - [c43]Gennady Khalimov, Yevgen Kotukh, Sang-Yoon Chang, Yaroslav Balytskyi, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Marukhnenko:
Encryption Scheme Based on the Generalized Suzuki 2-groups and Homomorphic Encryption. SVCC 2021: 59-76 - [c42]Manohar Raavi, Simeon Wuthier, Arijet Sarker, Jinoh Kim, Jong Hyun Kim, Sang-Yoon Chang:
Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network. SVCC 2021: 143-154 - [i7]Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:
$\mathcal{PT}$-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution. CoRR abs/2102.10228 (2021) - [i6]Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution. IACR Cryptol. ePrint Arch. 2021: 191 (2021) - 2020
- [c41]Sang-Yoon Chang, Younghee Park, Nikhil Vijayakumar Kengalahalli, Xiaobo Zhou:
Query-Crafting DoS Threats Against Internet DNS. CNS 2020: 1-9 - [c40]Li-e Wang, Shan Lin, Yan Bai, Sang-Yoon Chang, Xianxian Li, Peng Liu:
A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network. ICC 2020: 1-7 - [c39]Wenjun Fan, Sang-Yoon Chang, Shawn Emery, Xiaobo Zhou:
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing. ICCCN 2020: 1-9 - [c38]Sang-Yoon Chang, Simeon Wuthier:
Dynamic power control for rational cryptocurrency mining. CryBlock@MOBICOM 2020: 47-52 - [c37]Hsiang-Jen Hong, Wenjun Fan, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing. Networking 2020: 524-528 - [c36]Arijet Sarker, SangHyun Byun, Wenjun Fan, Maria Psarakis, Sang-Yoon Chang:
Voting Credential Management System for Electronic Voting Privacy. Networking 2020: 589-593 - [c35]Sang-Yoon Chang:
Mining Power Misestimation in PoW Blockchain. QRS Companion 2020: 148-152 - [c34]Sang-Yoon Chang:
Share Withholding in Blockchain Mining. SecureComm (2) 2020: 161-187 - [c33]Brett Meadows, Nathan Edwards, Sang-Yoon Chang:
On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM. SP (Workshops) 2020: 171-180 - [c32]Wenjun Fan, Shubham Kumar, Vrushali Jadhav, Sang-Yoon Chang, Younghee Park:
A Privacy Preserving E-Voting System Based on Blockchain. SVCC 2020: 148-159 - [c31]Chungsik Song, Wenjun Fan, Sang-Yoon Chang, Younghee Park:
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity. SVCC 2020: 169-187 - [c30]Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang:
Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks. TrustCom 2020: 967-974 - [i5]Yaroslav Balytskyi, Sang-Yoon Chang, Anatoliy Pinchuk, Manohar Raavi:
Discriminating an Arbitrary Number of Pure Quantum States by the Combined CPT and Hermitian Measurements. CoRR abs/2008.06503 (2020) - [i4]Sang-Yoon Chang:
Share Withholding Attack in Blockchain Mining: Technical Report. CoRR abs/2008.13317 (2020) - [i3]Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:
$\mathcal{PT}$-Symmetric Unambiguous Distinguishing of Three Quantum States. CoRR abs/2012.14897 (2020)
2010 – 2019
- 2019
- [j4]Sang-Yoon Chang, Younghee Park, Bhavana Babu Ashok Babu:
Fast IP Hopping Randomization to Secure Hop-by-Hop Access in SDN. IEEE Trans. Netw. Serv. Manag. 16(1): 308-320 (2019) - [j3]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu, Younghee Park:
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks. ACM Trans. Sens. Networks 15(3): 27:1-27:25 (2019) - [c29]Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen:
Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. ACNS 2019: 241-258 - [c28]Arijet Sarker, Simeon Wuthier, Sang-Yoon Chang:
Anti-Withholding Reward System to Secure Blockchain Mining Pools. CVCBT 2019: 43-46 - [c27]Sang-Yoon Chang, Younghee Park:
Silent Timestamping for Blockchain Mining Pool Security. ICNC 2019: 1-5 - [c26]Shaoqi Wang, Wei Chen, Xiaobo Zhou, Sang-Yoon Chang, Mike Ji:
Addressing Skewness in Iterative ML Jobs with Parameter Partition. INFOCOM 2019: 1261-1269 - 2018
- [c25]Younghee Park, Nikhil Vijayakumar Kengalahalli, Sang-Yoon Chang:
Distributed Security Network Functions against Botnet Attacks in Software-defined Networks. NFV-SDN 2018: 1-7 - [c24]Kamran Naseem Kalokhe, Younghee Park, Sang-Yoon Chang:
Resilient SDN-Based Communication in Vehicular Network. WASA 2018: 865-873 - [c23]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. WISEC 2018: 160-171 - [i2]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. CoRR abs/1808.01723 (2018) - 2017
- [j2]Sang-Yoon Chang, Yih-Chun Hu:
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks. IEEE Trans. Mob. Comput. 16(12): 3527-3540 (2017) - [c22]Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. CNS 2017: 1-9 - [c21]Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:
Securing balise-based train control systems using cryptographic random fountains. CNS 2017: 405-410 - [c20]Roop K. Sriramulu, Younghee Park, Sang-Yoon Chang, Kaikai Liu:
Dynamic cost-effective emergency network provision. I-TENDER@CoNEXT 2017: 37-43 - [c19]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. ICDCS 2017: 2302-2307 - [c18]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging. ICDCS 2017: 2555-2556 - [c17]Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo:
Graphic model analysis of frauds in online consumer reviews. ICC 2017: 47:1-47:7 - [c16]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. WCNC 2017: 1-6 - [c15]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. WISEC 2017: 52-57 - [i1]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. CoRR abs/1701.03568 (2017) - 2016
- [j1]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. IEEE/ACM Trans. Netw. 24(2): 1095-1108 (2016) - [c14]Younghee Park, Sang-Yoon Chang, Lavanya M. Krishnamurthy:
Watermarking for detecting freeloader misbehavior in software-defined networks. ICNC 2016: 1-6 - [c13]Sristi Lakshmi Sravana Kumar, Sang-Yoon Chang, Sreejaya Viswanathan, Yih-Chun Hu:
Demo: Free Data Communication Using Wireless Charging. MobiSys (Companion Volume) 2016: 121 - [c12]Sang-Yoon Chang, Younghee Park, Akshaya Muralidharan:
Fast address hopping at the switches: Securing access for packet forwarding in SDN. NOMS 2016: 454-460 - [c11]Hitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang:
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks. SACMAT 2016: 51-61 - [c10]Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu:
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. SecureComm 2016: 125-143 - 2015
- [c9]Sang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu:
Securing wireless medium access control against insider denial-of-service attackers. CNS 2015: 370-378 - [c8]Sanket Desai, Younghee Park, Jerry Zeyu Gao, Sang-Yoon Chang, Chungsik Song:
Improving Encryption Performance Using MapReduce. HPCC/CSS/ICESS 2015: 1350-1355 - [c7]Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, Douglas L. Jones:
Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems. ICPADS 2015: 37-43 - [c6]Sang-Yoon Chang, Jemin Lee, Yih-Chun Hu:
Noah: Keyed Noise Flooding for Wireless Confidentiality. Q2SWinet@MSWiM 2015: 141-148 - [c5]William Zegers, Sang-Yoon Chang, Younghee Park, Jerry Gao:
A Lightweight Encryption and Secure Protocol for Smartphone Cloud. SOSE 2015: 259-266 - 2013
- [b1]Sang-Yoon Chang:
Secure protocols for wireless availability. University of Illinois Urbana-Champaign, USA, 2013 - [c4]Sang-Yoon Chang, Yih-Chun Hu, Jerry T. Chiang, Soo-Young Chang:
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming. MOBIWAC 2013: 51-58 - 2012
- [c3]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination. MobiCom 2012: 77-88 - [c2]Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Y. L. Huang:
Body Area Network Security: Robust Key Establishment Using Human Body Channel. HealthSec 2012 - 2011
- [c1]Jihyuk Choi, Sang-Yoon Chang, Diko Ko, Yih-Chun Hu:
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. ICC 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint