JY

Rhongho Jang

Tenure-Track Assistant Professor
Department of Computer Science, Wayne State University
Address: 14101.30 5057 Woodward Ave, Detroit, MI 48202
Research Interests: Security & Privacy, Algorithm, Applied Machine Learning, AI security.

Experience and Education

2020-, Assistant Professor at Wayne State University, CS
2020, Ph.D., CS, University of Central Florida, USA
2019, Visiting Research Assistant, USC ISI

Services

TPC member: ICDCS 2022-current, IEEE MSN 2021-2022, CSoNET 2021-current, AdvML Frontiers (@ICML) 2022-current
Virtual Conference Chair: ACM CCS 2021
Student Travel Grant Chair: IEEE CNS 2023
Demo Chair: EAI SmartSP 2023
Publicity chair: IEEE ICDCS 2021
Web Chair: IEEE/ACM CoNEXT 2019

Fundings

  • [PI] NSF Student Travel Grant for 2023 IEEE Conference on Communications and Network Security, 2023
  • [Co-PI] Collaborative Research: HCC: Small: Understanding Online-to-Offline Sexual Violence through Data Donation from Users, 2022~2026, NSF No. 2211897

Teaching

  • CSC 5991 - ST: In-network Computing (winter 2021, 2022, 2023, 2024): The Intel® Tofino™ series of P4-programmable Ethernet switch ASICs deliver more flexibility for data centers. Monitor and control packet processing and update protocols in software to deliver customized performance for specific workloads at scale. More control and visibility in the network open a variety of opportunities including easy network optimization, cost efficiency, and rich visibility. This class will cover the foundations and advanced topics in network programmability, helping students understand a variety of real-world challenges that future networking encounters and state-of-the-art solutions. [Syllabus]
  • CSC 5290 - Cyber Security Practice (fall 2020, 2022, 2023): This course will explore board security topics in the areas of network and operating systems. In particular, this course focus on providing hands-on experience leveraging various security tools, aiming to help students understand real-world security threats. It will cover both offensive and defensive methods in a laboratory environment. Students are expected to finish lab assignments using real-world exploits and defense tools.
  • CSC 7260 - Distributed Systems (winter 2023, 2024): Both basic distributed computing ideas and system designs that support distributed applications will be covered in this course. The following learning outcomes are part of the course: a thorough understanding of the fundamentals of distributed computing, construction of distributed system components, and comprehension of the current state of the art in various areas of distributed systems. This includes studying abstract concepts and practical methods for creating system support for distributed applications.[Syllabus]


  • Publications

    • S. Kim, C. Jung, *R. Jang, D. Mohaisen, *D. Nyang, "A Robust Counting Sketch for Data Plane Intrusion Detection," in Proceedings of Network and Distributed System Security Symposium, NDSS 2023. *co-corresponding authors [PDF]
    • Y. Qiang, D. Pan, C. Li, X. Li, R. Jang, D. Zhu, "AttCAT: Explaining Transformers via Attentive Class Activation Tokens," in Proceedings of Conference on Neural Information Processing Systems, NeurIPS 2022.
    • C. Jung, S. Kim, *R. Jang, D. Mohaisen, *D. Nyang, "A Scalable and Dynamic ACL System for In-Network Defense," in Proceedings of ACM Conference on Computer and Communications Security, CCS 2022. *co-corresponding authors
    • A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R.Jang, D. Nyang, D. Mohaisen, "Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems," in Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022.
    • D.N. Dao. R. Jang, C. Jung, D. Mohaisen, D. Nyang, "Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows," in Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022.
    • A. Alabduljabbary, R. Ma, S. Choi, R. Jang, S. Chen, D. Mohaisen, "Understanding the Security of Free ContentWebsites by Analyzing their SSL Certificates: A Comparative Study," CySSS 2022.
    • A. Abusnainay, A. Anwary, S. Alshamraniy, A. Alabduljabbary, R. Jang, D. Mohaisen, "Systemically Evaluating the Robustness of ML-based IoT Malware Detectors," in Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, DSN'21 Fast Abstracts. Best Paper Award
    • J. Park, R. Jang, M. Mohaisen, D. Mohaisen. "A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet," IEEE Transactions on Networking (ToN), 2021
    • A. Abusnaina, M. Abuhamad, H. Alasmary, A. Anwar, R. Jang, S. Salem, D. Nyang, D. Mohaisen, "Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification," IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
    • C. Jung, J. Choi, R. Jang, D. Mohaisen, D. Nyang, "A Network-independent Tool-based Usable Authentication System for Internet of Things Devices," Computer and Security (COSE), 2021.
    • R. Jang, C. Jung, D. Mohaisen, K. Lee, D. Nyang, "A One-Page Text Entry Method Optimized for Rectangle Smartwatches," IEEE Transactions on Mobile Computing (TMC), 2021.
    • R. Jang, "Towards Scalable Network Traffic Measurement With Sketches," Dissertation, UCF, Summer 2020.
    • R. Jang, D. Min, S. Moon, D. Mohaisen, D. Nyang, “SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event,” in Proceedings of the 39th IEEE International Conference on Computer Communications, INFOCOM 2020.
    • A. Abusnaina†, R. Jang†, A. Khormali, D. Nyang, D. Mohaisen, “Deep Fingerprinting Defender: Adversarial Learning-based Approach to Defend Against Website Fingerprinting,” in Proceedings of the 39th IEEE International Conference on Computer Communications, INFOCOM 2020. †equivalent contributors
    • H. Alasmary†, A. Abusnaina†, R. Jang†, M. Abuhamad, A. Anwar, D. Nyang, and D. Mohaisen “Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers,” in Proceedings of 40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020. †equivalent contributors
    • R. Jang, J. Kang, A. Mohaisen, D. Nyang, “Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference,” IEEE Transactions on Mobile Computing (TMC), 2020.
    • R. Jang, S. Moon, Y. Noh, A. Mohaisen, D. Nyang, “InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows,” in Proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019.
    • R. Jang, J. Kang, A. Mohaisen, D. Nyang, “Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n,” in Proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017.
    • R. Jang, D. Cho, Y. Noh, D. Nyang, “RFlow+: An SDN-based WLAN Monitoring and Management Framework,” in Proceedings of the 36th IEEE International Conference on Computer Communications, INFOCOM 2017.