Follow
Heejun Roh
Heejun Roh
Dept. of Cyber Security, Graduate School, Korea University, Sejong, Rep. of Korea
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Resource pricing game in geo-distributed clouds
H Roh, C Jung, W Lee, DZ Du
Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE …, 2013
522013
Cooperative bridges: topology control in cooperative wireless ad hoc networks
J Yu, H Roh, W Lee, S Pack, DZ Du
Proceedings of the 29th IEEE Conference on Computer Communications (IEEE …, 2010
412010
Topology Control in Cooperative Wireless Ad-Hoc Networks
J Yu, H Roh, W Lee, S Pack, DZ Du
IEEE Journal on Selected Areas in Communications 30 (9), 1771-1779, 2012
362012
A Stackelberg Game for Cooperative Cognitive Radio Network with Active SUs
H Roh, C Jung, W Lee, DZ Du
Proceedings of the 2013 2nd International Conference on Computing …, 2013
33*2013
The useful impact of carrier aggregation: A measurement study in South Korea for commercial LTE-Advanced networks
S Lee, S Hyeon, J Kim, H Roh, W Lee
IEEE vehicular technology magazine 12 (1), 55-62, 2017
172017
Multisource wireless energy harvesting-based medium access control for rechargeable sensors
C Shao, H Roh, T Kim, W Lee
IEEE Transactions on Consumer Electronics 62 (2), 119-127, 2016
172016
Method for establishing protocol data unit session in communication system
B Young-Kyo, JJ Son, SH Kim, SH Pack, HY Lee, HE Ko, WJ Lee, ...
US Patent 10,798,761, 2020
142020
Joint flow and virtual machine placement in hybrid cloud data centers
H Roh, C Jung, K Kim, S Pack, W Lee
Journal of Network and Computer Applications 85, 4-13, 2017
132017
PolarScout: Wi-fi interference-resilient ZigBee communication via shell-shaping
C Shao, H Park, H Roh, W Lee, H Kim
IEEE/ACM Transactions on Networking 28 (4), 1587-1600, 2020
122020
Aspiration Level-Based Strategy Dynamics on the Coexistence of Spectrum Cooperation and Leasing
C Shao, H Roh, W Lee
IEEE Communications Letters 18 (1), 70-73, 2014
112014
Price-based tethering for cooperative networking
J Lee, C Shao, H Roh, W Lee
Proceedings of the 27th International Conference on Information Networking …, 2013
112013
Encrypted malware traffic detection using incremental learning
I Lee, H Roh, W Lee
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
102020
Tagora: A collision-exploitative RFID authentication protocol based on cross-layer approach
H Park, H Roh, W Lee
IEEE Internet of Things Journal 7 (4), 3571-3585, 2020
102020
BuSAR: Bluetooth slot availability randomization for better coexistence with dense Wi-Fi networks
C Shao, H Roh, W Lee
IEEE Transactions on Mobile Computing 20 (3), 846-860, 2019
102019
Poster: Feasibility of malware traffic analysis through tls-encrypted flow visualization
D Kim, J Han, J Lee, H Roh, W Lee
2020 IEEE 28th International Conference on Network Protocols (ICNP), 1-2, 2020
92020
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives
C Shao, H Roh, W Lee
Journal of Network and Computer Applications 123, 23-31, 2018
92018
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
C Oh, J Ha, H Roh
Applied Sciences 12 (1), 155, 2021
72021
Secure and lightweight subflow establishment of multipath-TCP
G Noh, H Park, H Roh, W Lee
IEEE Access 7, 177438-177448, 2019
72019
PND: a p‐persistent neighbor discovery protocol in wireless networks
K Kim, H Roh, W Lee, S Lee, DZ Du
Wireless Communications and Mobile Computing 13 (7), 650-662, 2013
72013
DOTA: Physical-layer decomposing and threading for ZigBee/Wi-Fi co-transmission
C Shao, H Park, H Roh, W Lee
IEEE Wireless Communications Letters 8 (1), 133-136, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20