Follow
DaeHun Nyang
Title
Cited by
Cited by
Year
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
544*2020
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
1812019
Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
1672020
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1422019
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
1332020
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
1302008
Improvement of Das's two-factor authentication protocol in wireless sensor networks
DH Nyang, MK Lee
Cryptology EPrint Archive, 2009
1282009
Method of providing completely automated public turing test to tell computer and human apart based on image
D Nyang, JI Kang
US Patent 8,352,598, 2013
1252013
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1152018
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
932019
SSD-insider: Internal defense of solid-state drive against ransomware with perfect data recovery
SH Baek, Y Jung, A Mohaisen, S Lee, DH Nyang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
742018
Group signatures with controllable linkability for dynamic membership
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
Information Sciences 222, 761-778, 2013
712013
Software-based remote code attestation in wireless sensor network
T AbuHmed, N Nyamaa, DH Nyang
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009
702009
Short dynamic group signature scheme supporting controllable linkability
JY Hwang, L Chen, HS Cho, DH Nyang
IEEE Transactions on Information Forensics and Security 10 (6), 1109-1124, 2015
692015
Keylogging-resistant visual authentication protocols
DH Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing 13 (11), 2566-2579, 2014
692014
e-PoS: Making Proof-of-Stake Decentralized and Fair
M Saad, Z Qin, K Ren, DH Nyang, D Mohaisen
IEEE Transactions on Parallel and Distributed Systems 32 (8), 1961-1973, 2021
642021
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
582019
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
542022
Proactive code verification protocol in wireless sensor network
YG Choi, J Kang, DH Nyang
International Conference on Computational Science and Its Applications, 1085 …, 2007
542007
Short group signatures with controllable linkability
JY Hwang, S Lee, BH Chung, HS Cho, DH Nyang
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
532011
The system can't perform the operation now. Try again later.
Articles 1–20