Hyunwoo Lee

ORCID: 0000-0001-7490-9936
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Image and Video Quality Assessment
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Video Coding and Compression Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Information and Cyber Security
  • Advanced Graph Theory Research
  • Multimedia Communication and Technology
  • Peer-to-Peer Network Technologies
  • Advanced Data Compression Techniques
  • Advanced Malware Detection Techniques
  • Advanced Image Processing Techniques
  • Network Traffic and Congestion Control
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Remote Desktop Technologies
  • Limits and Structures in Graph Theory
  • Anomaly Detection Techniques and Applications
  • Context-Aware Activity Recognition Systems
  • IoT and Edge/Fog Computing
  • Mobile Agent-Based Network Management
  • Service-Oriented Architecture and Web Services
  • Education and Learning Interventions
  • Bluetooth and Wireless Communication Technologies
  • Advanced Vision and Imaging

Korea Advanced Institute of Science and Technology
1996-2025

National Institute for Mathematical Sciences
2025

Institute for Basic Science
2025

Virginia Tech
2024

Korea Institute of Energy Research
2023

Purdue University West Lafayette
2021-2023

Texas A&M University
2023

Samsung (South Korea)
2023

Dankook University
2023

Kentech Instruments (United Kingdom)
2023

In the blooming era of Internet Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, large number challenges still remain unsolved due to ambiguity concept well variety divergent models in different contexts. this research, we augment concept, definition provide general conceptual model context Social IoT (SIoT) environment by breaking down all attributes influencing trust. Then, propose evaluation called...

10.3390/s17061346 article EN cc-by Sensors 2017-06-09

Despite growing interest in studying the metaverse, a theory-driven investigation into factors that contribute to an enjoyable metaverse experience remains scarce. The current study examined impacts of avatar identification, social engagement, and customization on users' enjoyment based impression management theory. A total 301 users were recruited for study. hypothesized models mediation effect engagement moderation tested between identification enjoyment. Results indicated mediates...

10.1089/cyber.2022.0257 article EN Cyberpsychology Behavior and Social Networking 2023-03-31

Recently, the demand for multi-chip solutions, such as chip-on-wafer-on-substrate (CoWoS) and embedded multi-die interconnect bridge (EMIB), is increasing they reduce chip size cost high-performance computing (HPC), artificial intelligence (AI), big data applications [1]. Following this trend, industry establishing standard specifications die-to-die interfaces, Universal Chiplet Interconnet Express (UCle) Open High-Bandwidth Interface (OpenHBI), developing various chiplets with high...

10.1109/isscc42615.2023.10067477 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2023-02-19

In this note, we obtain a quantitative improvement on the hypergraph variant of Balog-Szemer\'{e}di-Gowers theorem due to Sudakov, Szemer\'{e}di, and Vu [Duke Math. J.129.1 (2005): 129-155]. Additionally, prove ``almost all'' version Balog-Szemer\'{e}redi-Gowers theorem.

10.48550/arxiv.2501.06131 preprint EN arXiv (Cornell University) 2025-01-10

By utilizing the recently developed hypergraph analogue of Godsil's identity by second author, we prove that for all $n \geq k 2$, one can reconstruct matching polynomial an $n$-vertex $k$-uniform from multiset induced sub-hypergraphs on $\lfloor \frac{k-1}{k}n \rfloor + 1$ vertices. This generalizes well-known result Godsil graphs in 1981 to every uniform hypergraph. As a corollary, show graph $F$, number $F$-factors under analogous conditions. We also constructed examples imply is best...

10.48550/arxiv.2501.19081 preprint EN arXiv (Cornell University) 2025-01-31

10.1137/24m1659509 article EN SIAM Journal on Discrete Mathematics 2025-04-09

ABSTRACT For a given collection of graphs on common vertex set , which we call graph system is called rainbow subgraph if there exists an injective function such that for each . The maximum value over ‐vertex systems having no isomorphic to the Turán number In this article, study density tree While classical lies in exhibits different behaviors because it can even be irrational number. Nevertheless, conjecture always algebraic We provide evidence by proving To show this, identify structure...

10.1002/rsa.70005 article EN cc-by Random Structures and Algorithms 2025-04-16

10.1137/24m1659467 article EN SIAM Journal on Discrete Mathematics 2025-04-21

Application fingerprinting is a useful data analysis technique for network administrators, marketing agencies, and security analysts. For example, an administrator can adopt application techniques to determine whether user's access allowed. Several mobile (e.g., FlowPrint, AppScanner, ET-BERT) were recently introduced identify applications using the characteristics of traffic. However, we find that performance existing systems significantly degrades when virtual private (VPN) used. To...

10.1145/3543507.3583473 article EN Proceedings of the ACM Web Conference 2022 2023-04-26

Transport Layer Security (TLS) has become the norm for secure communication over Internet. In August 2018, TLS 1.3, latest version of TLS, was approved, providing improved security and performance previous version. this paper, we take a closer look at 1.3 deployments in practice regarding adoption rate, security, performance, implementation by applying temporal, spatial, platform-based approaches on 687M connections.

10.1145/3442381.3450057 article EN 2021-04-19

This letter presents a model for dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, vendor lock-in and violation of service level agreements with consumers, also offers collaborative services to consumers. We consider two major challenges. The first challenge is find an appropriate market in order enable the DC platform. second select suitable partners provide services. propose novel combinatorial auction-based enables CPs. new promising...

10.4218/etrij.10.0209.0489 article EN ETRI Journal 2010-08-05

This paper proposes a novel framework for virtual content delivery networks (CDNs) based on cloud computing. The proposed aims to provide multimedia services customized providers by sharing machines (VMs) in the Infrastructure-as-a-Service cloud, while fulfilling service level agreement. Furthermore, it supports elastic CDN services, which enables capabilities of VMs be scaled encompass dynamically changing resource demand aggregated services. For this, we system architecture and relevant...

10.4218/etrij.14.2113.0085 article EN ETRI Journal 2014-03-19

A wide range of studies in various disciplines has focused on the Internet Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize current status establish future directions because each study its own individual goals independent completion all IoT applications. The absence a comprehensive understanding CPS disrupted an efficient resource allocation. To assess changes knowledge structure emerging technologies, this explores dynamic research trends by analyzing...

10.4218/etrij.2018-0059 article EN publisher-specific-oa ETRI Journal 2018-11-15

Since trust among entities can change according to various conditions, it is necessary for ambient services determine when and how the has be updated. Therefore, our contribution in this paper present: 1) a new definition of that extended domains; 2) novel method based on social events patterns trigger refreshment services; 3) web application framework (called SocioScope) collecting analyzing data from multiple sources. Finally, case study suggests proposal could applied trust-aware...

10.1109/access.2017.2677917 article EN cc-by-nc-nd IEEE Access 2017-01-01

In this paper, we evaluate the security of Voice over WiFi (VoWiFi) protocol by proposing VWAnalyzer framework. We model five critical procedures VoWiFi and deploy a model-based testing approach to uncover potential design flaws. Since standards contain underspecifications that can lead vulnerable scenarios, explicitly deals with them. Unlike prior approaches do not consider underspecifications, adopts systematic constructs diverse viable scenarios based on substantially reduces number...

10.1145/3488932.3517425 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022-05-24

Internet of Things (IoT) cyber threats, exemplified by jackware and crypto mining, underscore the vulnerability IoT devices. Due to multi-step nature many attacks, early detection is vital for a swift response preventing malware propagation. However, accurately detecting early-stage attacks challenging, as attackers employ stealthy, zero-day, or adversarial machine learning evade detection. To enhance security, we propose ARIoTEDef, an Adversarially Robust Early Defense system, which...

10.1145/3660646 article EN other-oa ACM Transactions on Internet of Things 2024-04-20

Most prior safety research of large language models (LLMs) has focused on enhancing the alignment LLMs to better suit requirements humans. However, internalizing such safeguard features into larger brought challenges higher training cost and unintended degradation helpfulness. To overcome challenges, a modular approach employing smaller LLM detect harmful user queries is regarded as convenient solution in designing LLM-based system with requirements. In this paper, we leverage for both query...

10.48550/arxiv.2405.19795 preprint EN arXiv (Cornell University) 2024-05-30

Transmission control protocol friendly rate (TFRC) is designed to mainly provide optimal service for unicast applications, such as multimedia streaming in the best-effort Internet environment. However, high bandwidth networks with large delays present an environment where TFRC may have a problem utilizing full bandwidth. inherits slow-start mechanism of TCP Reno, but this time-consuming process that require many round-trip-times (RTTs), until appropriate sending reached. Another disadvantage...

10.1109/jcn.2014.000055 article EN Journal of Communications and Networks 2014-06-01

Often referred to as a supercomputer in the palm of hand, mobile cloud computing is expected be next big trend research. Effective remote display protocols are one essential technology for enabling vision computing. However, existing have been developed non-mobile computers such desktops and not ready fully embrace challenges requirements distinct devices settings. Recognizing importance energy efficiency on devices, this paper investigates correlation between consumption various encoding...

10.1109/tce.2014.6937341 article EN IEEE Transactions on Consumer Electronics 2014-08-01

Over the years, Internet has become a field in which small number of large companies dominate most services. As users get used to using their services, users' generated content and data about online behaviors are concentrated such companies. This phenomenon, called "data consolidation", serious problem, makes society seek decentralize current Internet. The decentralized aims (i) prevent concentration user few giant like Google Facebook, (ii) give full ownership control data. Various...

10.1016/j.comnet.2023.109911 article EN cc-by Computer Networks 2023-07-05
Coming Soon ...