Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
publications
Highly-accurate rogue access point detection using intentional channel interference: poster
Published in ACM WISEC, 2017
Use Google Scholar for full citation
Citation: RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Highly-accurate rogue access point detection using intentional channel interference: poster." ACM WISEC, 2017.
RFlow+: An SDN-based WLAN monitoring and management framework
Published in IEEE INFOCOM, 2017
Use Google Scholar for full citation
Citation: RhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang, "RFlow(^mbox+): An SDN-based WLAN monitoring and management framework." IEEE INFOCOM, 2017.
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
Published in IEEE ICDCS, 2017
Use Google Scholar for full citation
Citation: RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n." IEEE Computer Society ICDCS, 2017.
Two-level network monitoring and management in WLAN using software-defined networking: poster
Published in ACM WISEC, 2017
Use Google Scholar for full citation
Citation: RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang, "Two-level network monitoring and management in WLAN using software-defined networking: poster." ACM WISEC, 2017.
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster
Published in ACM WiSec, 2019
Use Google Scholar for full citation
Citation: Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang, "A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster." ACM WiSec, 2019.
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
Published in IEEE ICDCS, 2019
Use Google Scholar for full citation
Citation: Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang, "InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows." IEEE ICDCS, 2019.
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
Published in IEEE Trans. Mob. Comput., 2020
Use Google Scholar for full citation
Citation: Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang, "Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference." IEEE Trans. Mob. Comput., 2020.
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
Published in IEEE INFOCOM, 2020
Use Google Scholar for full citation
Citation: Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen, "DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting." IEEE INFOCOM, 2020.
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
Published in IEEE INFOCOM, 2020
Use Google Scholar for full citation
Citation: Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang, "SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event." IEEE INFOCOM, 2020.
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
Published in IEEE ICDCS, 2020
Use Google Scholar for full citation
Citation: Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen, "Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers." IEEE ICDCS, 2020.
A network-independent tool-based usable authentication system for Internet of Things devices
Published in Comput. Secur., 2021
Use Google Scholar for full citation
Citation: Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A network-independent tool-based usable authentication system for Internet of Things devices." Comput. Secur., 2021.
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
Published in IEEE DSN (Supplements), 2021
Use Google Scholar for full citation
Citation: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Systemically Evaluating the Robustness of ML-based IoT Malware Detectors." IEEE DSN (Supplements), 2021.
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
Published in IEEE/ACM Trans. Netw., 2022
Use Google Scholar for full citation
Citation: Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen, "A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet." IEEE/ACM Trans. Netw., 2022.
A One-Page Text Entry Method Optimized for Rectangle Smartwatches
Published in IEEE Trans. Mob. Comput., 2022
Use Google Scholar for full citation
Citation: Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang, "A One-Page Text Entry Method Optimized for Rectangle Smartwatches." IEEE Trans. Mob. Comput., 2022.
A Scalable and Dynamic ACL System for In-Network Defense
Published in ACM CCS, 2022
Use Google Scholar for full citation
Citation: Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A Scalable and Dynamic ACL System for In-Network Defense." ACM CCS, 2022.
AttCAT: Explaining Transformers via Attentive Class Activation Tokens
Published in NeurIPS, 2022
Use Google Scholar for full citation
Citation: Yao Qiang, Deng Pan, Chengyin Li, Xin Li, Rhongho Jang, Dongxiao Zhu, "AttCAT: Explaining Transformers via Attentive Class Activation Tokens." In the proceedings of NeurIPS, 2022.
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
Published in IEEE Trans. Dependable Secur. Comput., 2022
Use Google Scholar for full citation
Citation: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen, "DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification." IEEE Trans. Dependable Secur. Comput., 2022.
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
Published in IEEE DSN, 2022
Use Google Scholar for full citation
Citation: Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang, "Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows." IEEE DSN, 2022.
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
Published in ACM RAID, 2022
Use Google Scholar for full citation
Citation: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen, "Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems." ACM RAID, 2022.
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
Published in ACM CySSS@AsiaCCS, 2022
Use Google Scholar for full citation
Citation: Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen, "Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study." ACM CySSS@AsiaCCS, 2022.
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study
Published in IEEE ICCCN, 2023
Use Google Scholar for full citation
Citation: Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study." IEEE ICCCN, 2023.
Untargeted Code Authorship Evasion with Seq2Seq Transformation
Published in Springer CSoNet, 2023
Use Google Scholar for full citation
Citation: Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Untargeted Code Authorship Evasion with Seq2Seq Transformation." Springer CSoNet, 2023.
A Robust Counting Sketch for Data Plane Intrusion Detection
Published in ISOC NDSS, 2023
Use Google Scholar for full citation
Citation: Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, "A Robust Counting Sketch for Data Plane Intrusion Detection." The Internet Society NDSS, 2023.
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System
Published in USENIX Security, 2024
Use Google Scholar for full citation
Citation:
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
CSC 5290 - Cyber Security Practice
Every Fall, Department of Computer Science, Wayne State University, Last Update, 2024
This course will explore board security topics in the areas of network and operating systems. In particular, this course focus on providing hands-on experience leveraging various security tools, aiming to help students understand real-world security threats. It will cover both offensive and defensive methods in a laboratory environment. Students are expected to finish lab assignments using real-world exploits and defense tools.
CSC 5991 In-network Computing
Every Winter, Department of Computer Science, Wayne State University, Last Update, 2024
The Intel® Tofino™ series of P4-programmable Ethernet switch ASICs deliver more flexibility for data centers. Monitor and control packet processing and update protocols in software to deliver customized performance for specific workloads at scale. More control and visibility in the network open a variety of opportunities including easy network optimization, cost efficiency, and rich visibility. This class will cover the foundations and advanced topics in network programmability, helping students understand a variety of real-world challenges that future networking encounters and state-of-the-art solutions.
CSC 7260 - Distributed Systems
Every Winter, Department of Computer Science, Wayne State University, 2024
Both basic distributed computing ideas and system designs that support distributed applications will be covered in this course. The following learning outcomes are part of the course: a thorough understanding of the fundamentals of distributed computing, construction of distributed system components, and comprehension of the current state of the art in various areas of distributed systems. This includes studying abstract concepts and practical methods for creating system support for distributed applications.