Federated learning-based cognitive detection of jamming attack in flying ad-hoc network NI Mowla, NH Tran, I Doh, K Chae IEEE Access 8, 4338-4350, 2019 | 132 | 2019 |
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET NI Mowla, NH Tran, I Doh, K Chae Journal of Communications and Networks 22 (3), 244-258, 2020 | 120 | 2020 |
An energy-efficient sensor routing scheme for home automation networks H Oh, H Bahn, KJ Chae IEEE Transactions on Consumer Electronics 51 (3), 836-839, 2005 | 84 | 2005 |
Integrated transport layer security: end-to-end security model between WTLS and TLS EK Kwon, YG Cho, KJ Chae Proceedings 15th International Conference on Information Networking, 65-71, 2001 | 57 | 2001 |
Intrusion detection of NSM based DoS attacks using data mining in smart grid K Choi, X Chen, S Li, M Kim, K Chae, JC Na Energies 5 (10), 4091-4109, 2012 | 53 | 2012 |
An energy-efficient sensor routing with low latency, scalability in wireless sensor networks H Oh, K Chae 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007 | 45 | 2007 |
A combined data mining approach for DDoS attack detection M Kim, H Na, K Chae, H Bang, J Na Information Networking. Networking Technologies for Broadband and Mobile …, 2004 | 45 | 2004 |
Secure authentication for structured smart grid system I Doh, J Lim, K Chae 2015 9th International Conference on Innovative Mobile and Internet Services …, 2015 | 37 | 2015 |
A secure and efficient key authentication using bilinear pairing for NFC mobile payment service X Chen, K Choi, K Chae Wireless Personal Communications 97, 1-17, 2017 | 31 | 2017 |
A ticket-based AAA security mechanism in mobile IP network JM Park, EH Bae, HJ Pyeon, K Chae Computational Science and Its Applications—ICCSA 2003: International …, 2003 | 28 | 2003 |
Efficient and secure blockchain system for digital content trading G Heo, D Yang, I Doh, K Chae IEEE Access 9, 77438-77450, 2021 | 27 | 2021 |
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. H Oh, I Doh, K Chae Int. J. Comput. Sci. Appl. 6 (3), 20-32, 2009 | 27 | 2009 |
An enhanced key management using ZigBee Pro for wireless sensor networks K Choi, M Yun, K Chae, M Kim The International Conference on Information Network 2012, 399-403, 2012 | 24 | 2012 |
Improved raft algorithm exploiting federated learning for private blockchain performance enhancement D Kim, I Doh, K Chae 2021 international conference on information networking (ICOIN), 828-832, 2021 | 23 | 2021 |
RMBC: Randomized mesh blockchain using DBFT consensus algorithm S Jeon, I Doh, K Chae 2018 International Conference on Information Networking (ICOIN), 712-717, 2018 | 23 | 2018 |
An efficient defense mechanism for spoofed IP attack in SDN based CDNi NI Mowla, I Doh, KJ Chae 2015 International Conference on Information Networking (ICOIN), 92-97, 2015 | 23 | 2015 |
Selective blockchain system for secure and efficient D2D communication D Yang, S Yoo, I Doh, K Chae Journal of Network and Computer Applications 173, 102817, 2021 | 22 | 2021 |
Evolving neural network intrusion detection system for MCPS N Mowla, I Doh, K Chae 2018 20th International Conference on Advanced Communication Technology …, 2018 | 21 | 2018 |
Denial-of-service (dos) detection through practical entropy estimation on hierarchical sensor networks M Kim, I Doh, K Chae 2006 8th International Conference Advanced Communication Technology 3, 5 pp …, 2006 | 21 | 2006 |
Multi-defense mechanism against DDoS in SDN based CDNi NI Mowla, I Doh, K Chae 2014 Eighth International Conference on Innovative Mobile and Internet …, 2014 | 20 | 2014 |