Sang-Yoon Chang
Cited by
Cited by
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
SY Chang, YC Hu, H Anderson, T Fu, EYL Huang
HealthSec, 5-5, 2012
Enabling dynamic access control for controller applications in software-defined networks
H Padekar, Y Park, H Hu, SY Chang
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination
SY Chang, YC Hu, N Laurenti
Proceedings of the 18th annual international conference on Mobile computing …, 2012
Insider-attacks on physical-layer group secret-key generation in wireless networks
J Harshan, SY Chang, YC Hu
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
Secure MAC-layer protocol for captive portals in wireless hotspots
J Choi, SY Chang, D Ko, YC Hu
2011 IEEE international conference on communications (ICC), 1-5, 2011
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners
SY Chang, Y Park, S Wuthier, CW Chen
International Conference on Applied Cryptography and Network Security, 241-258, 2019
Watermarking for detecting freeloader misbehavior in software-defined networks
Y Park, SY Chang, LM Krishnamurthy
2016 International conference on computing, networking and communications …, 2016
Fast IP hopping randomization to secure hop-by-hop access in SDN
SY Chang, Y Park, BBA Babu
IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018
Signal jamming attacks against communication-based train control: Attack impact and countermeasure
S Lakshminarayana, JS Karachiwala, SY Chang, G Revadigar, ...
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
SecureMAC: Securing wireless medium access control against insider denial-of-service attacks
SY Chang, YC Hu
IEEE Transactions on Mobile Computing 16 (12), 3527-3540, 2017
A lightweight encryption and secure protocol for smartphone cloud
W Zegers, SY Chang, Y Park, J Gao
2015 IEEE Symposium on Service-Oriented System Engineering, 259-266, 2015
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks
SY Chang, SLS Kumar, BAN Tran, S Viswanathan, Y Park, YC Hu
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
Silent timestamping for blockchain mining pool security
SY Chang, Y Park
2019 International Conference on Computing, Networking and Communications …, 2019
Fast address hopping at the switches: Securing access for packet forwarding in SDN
SY Chang, Y Park, A Muralidharan
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 454-460, 2016
Securing wireless medium access control against insider denial-of-service attackers
SY Chang, YC Hu, Z Liu
2015 IEEE Conference on Communications and Network Security (CNS), 370-378, 2015
Simplemac: A simple wireless MAC-layer countermeasure to intelligent and insider jammers
SY Chang, YC Hu, N Laurenti
IEEE/ACM Transactions on Networking 24 (2), 1095-1108, 2015
Anti-withholding reward system to secure blockchain mining pools
A Sarker, S Wuthier, SY Chang
2019 Crypto Valley Conference on Blockchain Technology (CVCBT), 43-46, 2019
Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks
SY Chang, SLS Kumar, YC Hu, Y Park
ACM Transactions on Sensor Networks (TOSN) 15 (3), 1-25, 2019
Addressing skewness in iterative ml jobs with parameter partition
S Wang, W Chen, X Zhou, SY Chang, M Ji
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1261-1269, 2019
Protecting vehicular networks privacy in the presence of a single adversarial authority
CW Chen, SY Chang, YC Hu, YW Chen
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
The system can't perform the operation now. Try again later.
Articles 1–20