Juhwan Noh

ORCID: 0000-0001-6730-1893
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Fire Detection and Safety Systems
  • Smart Grid Security and Resilience
  • Cryptographic Implementations and Security
  • Adversarial Robustness in Machine Learning
  • Network Time Synchronization Technologies
  • Robotics and Sensor-Based Localization
  • Advanced Computational Techniques and Applications
  • UAV Applications and Optimization
  • Robotic Path Planning Algorithms
  • User Authentication and Security Systems
  • Power System Optimization and Stability
  • Bacillus and Francisella bacterial research
  • Security and Verification in Computing
  • Computational Physics and Python Applications
  • Vehicular Ad Hoc Networks (VANETs)
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Network Security and Intrusion Detection
  • Evacuation and Crowd Dynamics
  • Inertial Sensor and Navigation
  • Fault Detection and Control Systems
  • Autonomous Vehicle Technology and Safety
  • GNSS positioning and interference
  • Power Systems Fault Detection

Korea Advanced Institute of Science and Technology
2015-2025

The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of autopilot technology. Unfortunately, terrorists have also begun to kamikaze bombing and reconnaissance. To protect against such threats, several companies started “anti-drone” services that primarily focus on disrupting or incapacitating operations. However, the approaches employed inadequate, they make any intruded stop remain over protected...

10.1145/3309735 article EN ACM Transactions on Privacy and Security 2019-04-09

Accurate timing services are important for effectively operating power grids. Traditionally, supervisory control and data acquisition (SCADA) systems make use of time stamps to quickly identify respond faults in the event incidents. However, with increasing penetration renewable energy sources such as solar wind, grid has become more susceptible even minor disturbances. In response, utilities have begun deploying wide-area monitoring (WAMS) monitor real-time voltage frequency oscillations,...

10.1109/mpe.2024.3430888 article EN IEEE Power and Energy Magazine 2025-01-01

Phasor Measurement Units (PMUs) are critical devices in modern power grids, providing precise voltage and current phasor measurements (synchrophasors) for real-time monitoring, fault detection, stability assessment. While previous research suggested that arbitrary time manipulation through GPS spoofing could disrupt grid operations, our study reveals successful attacks require specific conditions, contrary to earlier assumptions. Through careful analysis of the synchrophasor data...

10.1145/3720543 article EN ACM Transactions on Privacy and Security 2025-02-28

Drones are widely used for various purposes such as delivery, aerial photography, and surveillance. Considering the increasing drone-related services, tracking locations of drones can cause security threats escaping from drone surveillance, disturbing capturing drones. For wirelessly monitoring status drones, telemetry is used, this information contains data latitude longitude, calibrated sensor outputs, offsets. Because most implementation supports neither authentication nor encryption, an...

10.1145/3177751 article EN ACM Transactions on Privacy and Security 2018-02-05

IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly various Internet of Things (IoT) devices. Customized are usually publicly disclosed nor standardized. Moreover, unlike textual (e.g., HTTP, SMTP, POP3.), IoT devices provide no clues strings or keywords that useful analysis. Instead, they use bits bytes to represent header body...

10.1145/2939918.2939921 article EN other-oa 2016-07-15

Fire alarm and signaling systems are a networked system of fire detectors, control units, automated extinguishers, notification appliances. Malfunction these safety-critical cyber-physical may lead to chaotic evacuations, property damage, even loss human life. Therefore, reliability is one the most crucial factors for detectors. Indeed, single report cannot be ignored, considering importance early detection suppression. In this article, we show that wide-area smoke which globally installed...

10.1145/3393926 article EN ACM Transactions on Privacy and Security 2020-06-12

Photoelectric sensors are utilized in a range of safety-critical applications, such as medical devices and autonomous vehicles. However, the public exposure input channel photoelectric sensor makes it vulnerable to malicious inputs. Several studies have suggested possible attacks on by injecting signals. While few defense techniques been proposed against attacks, they could be either bypassed or used for limited purposes. In this study, we propose Lightbox, novel system detect based signal...

10.1145/3615867 article EN ACM Transactions on Privacy and Security 2023-08-17
Coming Soon ...