A handover authentication using credentials based on chameleon hashing J Choi, S Jung IEEE communications letters 14 (1), 54-56, 2009 | 115 | 2009 |
A security framework with strong non-repudiation and privacy in VANETs J Choi, S Jung 2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009 | 64 | 2009 |
AdMat: A CNN-on-matrix approach to Android malware detection and classification LN Vu, S Jung IEEE Access 9, 39680-39694, 2021 | 58 | 2021 |
Multi-scale gabor feature based eye localization S Kim, ST Chung, S Jung, D Oh, J Kim, S Cho International Journal of Computer and Information Engineering 1 (9), 2689-2693, 2007 | 51 | 2007 |
Dynamic bandwidth allocation for VBR video traffic using adaptive wavelet prediction X Wang, S Jung, JS Meditch ICC'98. 1998 IEEE International Conference on Communications. Conference …, 1998 | 45 | 1998 |
HRP: A HMAC-based RFID mutual authentication protocol using PUF SW Jung, S Jung The International Conference on Information Networking 2013 (ICOIN), 578-582, 2013 | 44 | 2013 |
Modeling and analysis of the wireless channel formed by LED angle in visible light communication D Tronghop, J Hwang, S Jung, Y Shin, M Yoo The International Conference on Information Network 2012, 354-357, 2012 | 44 | 2012 |
Time-domain approach using multiple Kalman filters and EM algorithm to speech enhancement with nonstationary noise KY Lee, S Jung IEEE Transactions on speech and audio processing 8 (3), 282-291, 2000 | 44 | 2000 |
Android rooting: An arms race between evasion and detection L Nguyen-Vu, NT Chau, S Kang, S Jung Security and Communication Networks 2017, 2017 | 40 | 2017 |
Android fragmentation in malware detection L Nguyen-Vu, J Ahn, S Jung Computers & Security 87, 101573, 2019 | 35 | 2019 |
A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6 J Choi, S Jung IEICE transactions on communications 91 (2), 605-608, 2008 | 34 | 2008 |
Adaptive prediction and smoothing of MPEG video in ATM networks S Jung, JS Meditch Proceedings IEEE International Conference on Communications ICC'95 2, 832-836, 1995 | 29 | 1995 |
ESSE: efficient secure session establishment for internet-integrated wireless sensor networks N Kang, J Park, H Kwon, S Jung International Journal of Distributed Sensor Networks 11 (8), 393754, 2015 | 28 | 2015 |
A demonstration of malicious insider attacks inside cloud iaas vendor MD Nguyen, NT Chau, S Jung, S Jung International Journal of Information and Education Technology 4 (6), 483, 2014 | 27 | 2014 |
Dynamic analysis with Android container: Challenges and opportunities NT Chau, S Jung Digital Investigation 27, 38-46, 2018 | 26 | 2018 |
A fast and efficient handover authentication achieving conditional privacy in V2I networks J Choi, S Jung, Y Kim, M Yoo Conference on Smart Spaces, 291-300, 2009 | 25 | 2009 |
RFID tag authentication system S Jung, SW Jung, YS Youn US Patent 9,842,234, 2017 | 24 | 2017 |
Personal OAuth authorization server and push OAuth for Internet of Things SW Jung, S Jung International Journal of Distributed Sensor Networks 13 (6), 1550147717712627, 2017 | 24 | 2017 |
Evidence collecting system from car black boxes K Chae, D Kim, S Jung, J Choi, S Jung 2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010 | 24 | 2010 |
API and permission-based classification system for Android malware analysis J Park, H Chun, S Jung 2018 International Conference on Information Networking (ICOIN), 930-935, 2018 | 23 | 2018 |