Sang-Yoon Chang
Title
Cited by
Cited by
Year
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
SY Chang, YC Hu, H Anderson, T Fu, EYL Huang
HealthSec, 5-5, 2012
672012
Enabling dynamic access control for controller applications in software-defined networks
H Padekar, Y Park, H Hu, SY Chang
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
212016
SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination
SY Chang, YC Hu, N Laurenti
Proceedings of the 18th annual international conference on Mobile computing …, 2012
182012
Secure MAC-layer protocol for captive portals in wireless hotspots
J Choi, SY Chang, D Ko, YC Hu
2011 IEEE international conference on communications (ICC), 1-5, 2011
152011
Insider-attacks on physical-layer group secret-key generation in wireless networks
J Harshan, SY Chang, YC Hu
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
142017
Watermarking for detecting freeloader misbehavior in software-defined networks
Y Park, SY Chang, LM Krishnamurthy
2016 International conference on computing, networking and communications …, 2016
142016
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners
SY Chang, Y Park, S Wuthier, CW Chen
International Conference on Applied Cryptography and Network Security, 241-258, 2019
132019
Signal jamming attacks against communication-based train control: Attack impact and countermeasure
S Lakshminarayana, JS Karachiwala, SY Chang, G Revadigar, ...
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
132018
SecureMAC: Securing wireless medium access control against insider denial-of-service attacks
SY Chang, YC Hu
IEEE Transactions on Mobile Computing 16 (12), 3527-3540, 2017
122017
Fast IP hopping randomization to secure hop-by-hop access in SDN
SY Chang, Y Park, BBA Babu
IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018
112018
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks
SY Chang, SLS Kumar, BAN Tran, S Viswanathan, Y Park, YC Hu
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
92017
Silent timestamping for blockchain mining pool security
SY Chang, Y Park
2019 International Conference on Computing, Networking and Communications …, 2019
82019
A lightweight encryption and secure protocol for smartphone cloud
W Zegers, SY Chang, Y Park, J Gao
2015 IEEE Symposium on Service-Oriented System Engineering, 259-266, 2015
82015
Fast address hopping at the switches: Securing access for packet forwarding in SDN
SY Chang, Y Park, A Muralidharan
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 454-460, 2016
72016
Securing wireless medium access control against insider denial-of-service attackers
SY Chang, YC Hu, Z Liu
2015 IEEE Conference on Communications and Network Security (CNS), 370-378, 2015
72015
Simplemac: A simple wireless MAC-layer countermeasure to intelligent and insider jammers
SY Chang, YC Hu, N Laurenti
IEEE/ACM Transactions on Networking 24 (2), 1095-1108, 2015
72015
Anti-withholding reward system to secure blockchain mining pools
A Sarker, S Wuthier, SY Chang
2019 Crypto Valley Conference on Blockchain Technology (CVCBT), 43-46, 2019
62019
Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks
SY Chang, SLS Kumar, YC Hu, Y Park
ACM Transactions on Sensor Networks (TOSN) 15 (3), 1-25, 2019
62019
Cognitive wireless charger: Sensing-based real-time frequency control for near-field wireless charging
SY Chang, SLS Kumar, YC Hu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
62017
Key update at train stations: Two-layer dynamic key update scheme for secure train communications
SY Chang, S Cai, H Seo, YC Hu
International Conference on Security and Privacy in Communication Systems …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20