- Network Security and Intrusion Detection
- Image and Video Quality Assessment
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Video Coding and Compression Technologies
- IPv6, Mobility, Handover, Networks, Security
- Information and Cyber Security
- Advanced Graph Theory Research
- Multimedia Communication and Technology
- Peer-to-Peer Network Technologies
- Advanced Data Compression Techniques
- Advanced Malware Detection Techniques
- Advanced Image Processing Techniques
- Network Traffic and Congestion Control
- Internet Traffic Analysis and Secure E-voting
- Cloud Computing and Remote Desktop Technologies
- Limits and Structures in Graph Theory
- Anomaly Detection Techniques and Applications
- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Mobile Agent-Based Network Management
- Service-Oriented Architecture and Web Services
- Education and Learning Interventions
- Bluetooth and Wireless Communication Technologies
- Advanced Vision and Imaging
Korea Advanced Institute of Science and Technology
1996-2025
National Institute for Mathematical Sciences
2025
Institute for Basic Science
2025
Virginia Tech
2024
Korea Institute of Energy Research
2023
Purdue University West Lafayette
2021-2023
Texas A&M University
2023
Samsung (South Korea)
2023
Dankook University
2023
Kentech Instruments (United Kingdom)
2023
In the blooming era of Internet Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, large number challenges still remain unsolved due to ambiguity concept well variety divergent models in different contexts. this research, we augment concept, definition provide general conceptual model context Social IoT (SIoT) environment by breaking down all attributes influencing trust. Then, propose evaluation called...
Despite growing interest in studying the metaverse, a theory-driven investigation into factors that contribute to an enjoyable metaverse experience remains scarce. The current study examined impacts of avatar identification, social engagement, and customization on users' enjoyment based impression management theory. A total 301 users were recruited for study. hypothesized models mediation effect engagement moderation tested between identification enjoyment. Results indicated mediates...
Recently, the demand for multi-chip solutions, such as chip-on-wafer-on-substrate (CoWoS) and embedded multi-die interconnect bridge (EMIB), is increasing they reduce chip size cost high-performance computing (HPC), artificial intelligence (AI), big data applications [1]. Following this trend, industry establishing standard specifications die-to-die interfaces, Universal Chiplet Interconnet Express (UCle) Open High-Bandwidth Interface (OpenHBI), developing various chiplets with high...
In this note, we obtain a quantitative improvement on the hypergraph variant of Balog-Szemer\'{e}di-Gowers theorem due to Sudakov, Szemer\'{e}di, and Vu [Duke Math. J.129.1 (2005): 129-155]. Additionally, prove ``almost all'' version Balog-Szemer\'{e}redi-Gowers theorem.
By utilizing the recently developed hypergraph analogue of Godsil's identity by second author, we prove that for all $n \geq k 2$, one can reconstruct matching polynomial an $n$-vertex $k$-uniform from multiset induced sub-hypergraphs on $\lfloor \frac{k-1}{k}n \rfloor + 1$ vertices. This generalizes well-known result Godsil graphs in 1981 to every uniform hypergraph. As a corollary, show graph $F$, number $F$-factors under analogous conditions. We also constructed examples imply is best...
ABSTRACT For a given collection of graphs on common vertex set , which we call graph system is called rainbow subgraph if there exists an injective function such that for each . The maximum value over ‐vertex systems having no isomorphic to the Turán number In this article, study density tree While classical lies in exhibits different behaviors because it can even be irrational number. Nevertheless, conjecture always algebraic We provide evidence by proving To show this, identify structure...
Application fingerprinting is a useful data analysis technique for network administrators, marketing agencies, and security analysts. For example, an administrator can adopt application techniques to determine whether user's access allowed. Several mobile (e.g., FlowPrint, AppScanner, ET-BERT) were recently introduced identify applications using the characteristics of traffic. However, we find that performance existing systems significantly degrades when virtual private (VPN) used. To...
Transport Layer Security (TLS) has become the norm for secure communication over Internet. In August 2018, TLS 1.3, latest version of TLS, was approved, providing improved security and performance previous version. this paper, we take a closer look at 1.3 deployments in practice regarding adoption rate, security, performance, implementation by applying temporal, spatial, platform-based approaches on 687M connections.
This letter presents a model for dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, vendor lock-in and violation of service level agreements with consumers, also offers collaborative services to consumers. We consider two major challenges. The first challenge is find an appropriate market in order enable the DC platform. second select suitable partners provide services. propose novel combinatorial auction-based enables CPs. new promising...
This paper proposes a novel framework for virtual content delivery networks (CDNs) based on cloud computing. The proposed aims to provide multimedia services customized providers by sharing machines (VMs) in the Infrastructure-as-a-Service cloud, while fulfilling service level agreement. Furthermore, it supports elastic CDN services, which enables capabilities of VMs be scaled encompass dynamically changing resource demand aggregated services. For this, we system architecture and relevant...
A wide range of studies in various disciplines has focused on the Internet Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize current status establish future directions because each study its own individual goals independent completion all IoT applications. The absence a comprehensive understanding CPS disrupted an efficient resource allocation. To assess changes knowledge structure emerging technologies, this explores dynamic research trends by analyzing...
Since trust among entities can change according to various conditions, it is necessary for ambient services determine when and how the has be updated. Therefore, our contribution in this paper present: 1) a new definition of that extended domains; 2) novel method based on social events patterns trigger refreshment services; 3) web application framework (called SocioScope) collecting analyzing data from multiple sources. Finally, case study suggests proposal could applied trust-aware...
In this paper, we evaluate the security of Voice over WiFi (VoWiFi) protocol by proposing VWAnalyzer framework. We model five critical procedures VoWiFi and deploy a model-based testing approach to uncover potential design flaws. Since standards contain underspecifications that can lead vulnerable scenarios, explicitly deals with them. Unlike prior approaches do not consider underspecifications, adopts systematic constructs diverse viable scenarios based on substantially reduces number...
Internet of Things (IoT) cyber threats, exemplified by jackware and crypto mining, underscore the vulnerability IoT devices. Due to multi-step nature many attacks, early detection is vital for a swift response preventing malware propagation. However, accurately detecting early-stage attacks challenging, as attackers employ stealthy, zero-day, or adversarial machine learning evade detection. To enhance security, we propose ARIoTEDef, an Adversarially Robust Early Defense system, which...
Most prior safety research of large language models (LLMs) has focused on enhancing the alignment LLMs to better suit requirements humans. However, internalizing such safeguard features into larger brought challenges higher training cost and unintended degradation helpfulness. To overcome challenges, a modular approach employing smaller LLM detect harmful user queries is regarded as convenient solution in designing LLM-based system with requirements. In this paper, we leverage for both query...
Transmission control protocol friendly rate (TFRC) is designed to mainly provide optimal service for unicast applications, such as multimedia streaming in the best-effort Internet environment. However, high bandwidth networks with large delays present an environment where TFRC may have a problem utilizing full bandwidth. inherits slow-start mechanism of TCP Reno, but this time-consuming process that require many round-trip-times (RTTs), until appropriate sending reached. Another disadvantage...
Often referred to as a supercomputer in the palm of hand, mobile cloud computing is expected be next big trend research. Effective remote display protocols are one essential technology for enabling vision computing. However, existing have been developed non-mobile computers such desktops and not ready fully embrace challenges requirements distinct devices settings. Recognizing importance energy efficiency on devices, this paper investigates correlation between consumption various encoding...
Over the years, Internet has become a field in which small number of large companies dominate most services. As users get used to using their services, users' generated content and data about online behaviors are concentrated such companies. This phenomenon, called "data consolidation", serious problem, makes society seek decentralize current Internet. The decentralized aims (i) prevent concentration user few giant like Google Facebook, (ii) give full ownership control data. Various...