Education
- Ph.D in Computer Science, University of Central Florida, 2020
- Ph.D in Computer Science and Engineering, INHA University, South Korea, 2020
Work experience
- Spring 2024: Academic Pages Collaborator
- Github University
- Duties includes: Updates and improvements to template
- Supervisor: The Users
- Fall 2015: Research Assistant
- Github University
- Duties included: Merging pull requests
- Supervisor: Professor Hub
- Summer 2015: Research Assistant
- Github University
- Duties included: Tagging issues
- Supervisor: Professor Git
Skills
- Skill 1
- Skill 2
- Sub-skill 2.1
- Sub-skill 2.2
- Sub-skill 2.3
- Skill 3
Publications
A Robust Counting Sketch for Data Plane Intrusion Detection
Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, "A Robust Counting Sketch for Data Plane Intrusion Detection." The Internet Society NDSS, 2023.
Untargeted Code Authorship Evasion with Seq2Seq Transformation
Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Untargeted Code Authorship Evasion with Seq2Seq Transformation." Springer CSoNet, 2023.
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study
Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study." IEEE ICCCN, 2023.
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen, "Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study." ACM CySSS@AsiaCCS, 2022.
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen, "Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems." ACM RAID, 2022.
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang, "Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows." IEEE DSN, 2022.
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen, "DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification." IEEE Trans. Dependable Secur. Comput., 2022.
AttCAT: Explaining Transformers via Attentive Class Activation Tokens
Yao Qiang, Deng Pan, Chengyin Li, Xin Li, Rhongho Jang, Dongxiao Zhu, "AttCAT: Explaining Transformers via Attentive Class Activation Tokens." In the proceedings of NeurIPS, 2022.
A Scalable and Dynamic ACL System for In-Network Defense
Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A Scalable and Dynamic ACL System for In-Network Defense." ACM CCS, 2022.
A One-Page Text Entry Method Optimized for Rectangle Smartwatches
Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang, "A One-Page Text Entry Method Optimized for Rectangle Smartwatches." IEEE Trans. Mob. Comput., 2022.
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen, "A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet." IEEE/ACM Trans. Netw., 2022.
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Systemically Evaluating the Robustness of ML-based IoT Malware Detectors." IEEE DSN (Supplements), 2021.
A network-independent tool-based usable authentication system for Internet of Things devices
Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A network-independent tool-based usable authentication system for Internet of Things devices." Comput. Secur., 2021.
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen, "Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers." IEEE ICDCS, 2020.
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang, "SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event." IEEE INFOCOM, 2020.
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen, "DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting." IEEE INFOCOM, 2020.
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference." IEEE Trans. Mob. Comput., 2020.
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang, "InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows." IEEE ICDCS, 2019.
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster
Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang, "A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster." ACM WiSec, 2019.
Two-level network monitoring and management in WLAN using software-defined networking: poster
RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang, "Two-level network monitoring and management in WLAN using software-defined networking: poster." ACM WISEC, 2017.
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n." IEEE Computer Society ICDCS, 2017.
RFlow+: An SDN-based WLAN monitoring and management framework
RhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang, "RFlow(^mbox+): An SDN-based WLAN monitoring and management framework." IEEE INFOCOM, 2017.
Highly-accurate rogue access point detection using intentional channel interference: poster
RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Highly-accurate rogue access point detection using intentional channel interference: poster." ACM WISEC, 2017.
Talks
Conference Proceeding talk 3 on Relevant Topic in Your Field
Conference proceedings talk at Testing Institute of America 2014 Annual Conference, Los Angeles, CA
Talk 2 on Relevant Topic in Your Field
Talk at London School of Testing, London, UK
Tutorial 1 on Relevant Topic in Your Field
Tutorial at UC-Berkeley Institute for Testing Science, Berkeley CA, USA
Talk 1 on Relevant Topic in Your Field
Talk at UC San Francisco, Department of Testing, San Francisco, California
Teaching
Service and leadership
- Currently signed in to 43 different slack teams