Jin-Hee Cho

ORCID: 0000-0002-5908-4662
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Complex Network Analysis Techniques
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Access Control and Trust
  • Software-Defined Networks and 5G
  • Opinion Dynamics and Social Influence
  • Bayesian Modeling and Causal Inference
  • Misinformation and Its Impacts
  • Security in Wireless Sensor Networks
  • Adversarial Robustness in Machine Learning
  • Smart Grid Security and Resilience
  • Distributed systems and fault tolerance
  • Topic Modeling
  • Anomaly Detection Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Advanced Graph Neural Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Internet Traffic Analysis and Secure E-voting
  • Explainable Artificial Intelligence (XAI)
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks

Virginia Tech
2006-2024

National Security Agency
2024

The University of Western Australia
2021

Federico II University Hospital
2021

Institut Polytechnique de Paris
2021

The University of Queensland
2021

ORCID
2020

Ulsan National Institute of Science and Technology
2017-2019

DEVCOM Army Research Laboratory
2009-2018

SK Group (South Korea)
2014-2017

Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation critical to achieving mission and system goals such as reliability, availability, scalability, reconfigurability. In defining managing military MANET, we must consider the interactions between composite cognitive, social, information communication networks, take into account severe resource constraints (e.g., computing power, energy, bandwidth, time), dynamics topology changes, node...

10.1109/surv.2011.092110.00088 article EN IEEE Communications Surveys & Tutorials 2010-10-19

We propose a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional attributes derived from communication and social evaluate the overall of node. By means novel probability model, describe heterogeneous WSN comprising large number nodes vastly different quality service (QoS) behaviors objective yield "ground truth" node status. This serves as...

10.1109/tcomm.2012.031912.110179 article EN IEEE Transactions on Network and Service Management 2012-03-24

Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing reality with proliferation persistent, advanced, intelligent attacks while defenders often way behind taking appropriate actions thwart attackers. The concept moving target (MTD) emerged proactive...

10.1109/comst.2019.2963791 article EN IEEE Communications Surveys & Tutorials 2020-01-01

Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design validate a dynamic trust management protocol for secure routing optimization in DTN environments the presence of well-behaved, selfish malicious nodes. We develop novel model-based methodology analysis our it via extensive simulation. Moreover, address management, i.e., determining applying best...

10.1109/tpds.2013.116 article EN IEEE Transactions on Parallel and Distributed Systems 2013-04-12

HBM (High Bandwidth Memory) is an emerging standard DRAM solution that can achieve breakthrough bandwidth of higher than 256GBps while reducing the power consumption as well. It has stacked architecture with core dies on top a base logic die, based TSV and die stacking technologies. In this paper, introduced comparison its generations provided. Also, packaging technology challenges to address reliability, thermal dissipation capability, maximum allowable package sizes, high throughput...

10.1109/imw.2017.7939084 article EN 2017-05-01

Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art security defense mechanisms. In smart grid computing environments, threats increased as shared networks are commonly used, along with associated vulnerabilities. However, compared to other network ML-based IDS research in a is relatively unexplored, although environment facing serious due its unique environmental this article, we conducted an extensive...

10.1145/3578366 article EN ACM Transactions on Cyber-Physical Systems 2023-01-11

Many systems or applications have been developed for distributed environments with the goal of attaining multiple objectives in face environmental challenges such as high dynamics/hostility severe resource constraints (e.g., energy communications bandwidth). Often are conflicting each other, requiring optimal tradeoff analyses between objectives. This paper is mainly concerned how to model a system and optimize their performance. We first conduct comprehensive survey state-of-the-art...

10.1109/comst.2017.2698366 article EN IEEE Communications Surveys & Tutorials 2017-01-01

We propose a trust-based intrusion detection scheme utilizing highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider metric considering both quality of service (QoS) and social detecting malicious nodes. By statistically analyzing peer-to-peer evaluation results collected from nodes, each cluster head applies to assess the trustworthiness maliciousness nodes in its cluster. Cluster heads themselves are evaluated by...

10.1109/icc.2011.5963250 article EN 2011-06-01

Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving and/or missions. The significantly increased attention on UAV also has led security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived deal with vulnerabilities attacks. In this paper, we briefly survey state-of-the-art IDS mechanisms...

10.1109/iwcmc.2018.8450305 preprint EN 2018-06-01

Centrality metrics have been used in various networks, such as communication, social, biological, geographic, or contact networks. In particular, they order to study and analyze targeted attack behaviors investigated their effect on network resilience. Although a rich volume of centrality has developed for decades, limited set commonly use. This paper aims introduce existing discuss applicabilities performance based the results obtained from extensive simulation experiments encourage use...

10.1109/access.2021.3094196 article EN cc-by IEEE Access 2021-01-01

Defensive deception is a promising approach for cyber defense. Via defensive deception, defender can anticipate and prevent attacks by misleading or luring an attacker, hiding some of its resources. Although garnering increasing research attention, there has not been systematic investigation key components, the underlying principles, tradeoffs in various problem settings. This survey focuses on centered game theory machine learning, since these are prominent families artificial intelligence...

10.1109/comst.2021.3102874 article EN IEEE Communications Surveys & Tutorials 2021-01-01

InP quantum dots (QDs) are nontoxic emitters, which considered an alternative to CdSe-based QDs. However, the limited choice and high cost of P precursors have a negative impact on their practical applicability. In this work, we report large-scale synthesis highly luminescent InP@ZnS QDs from elemental precursor (P4), was simply synthesized via sublimation red powder. The size controlled by varying reaction parameters such as time temperature, type precursors. This way, photoluminescence...

10.1021/acs.chemmater.7b00254 article EN Chemistry of Materials 2017-04-24

The identification of vulnerabilities in a mission-critical system is one the challenges faced by cyber-physical (CPS). incorporation embedded Internet Things (IoT) devices makes it tedious to identify vulnerability and difficult control service-interruptions manage operations losses. Rule-based mechanisms have been considered as solution past. However, rule-based solutions operate on goodwill generated rules perform assumption-based detection. Such often far from actual realization IoT...

10.1109/access.2019.2917135 article EN cc-by-nc-nd IEEE Access 2019-01-01

Moving target defense (MTD) has emerged as a proactive mechanism aiming to thwart potential attacker. The key underlying idea of MTD is increase uncertainty and confusion for attackers by changing the attack surface (i.e., system or network configurations) that can invalidate intelligence collected interrupt execution; ultimately leading failure. Recently, significant advance software-defined networking (SDN) technology enabled several complex operations be highly flexible robust;...

10.1109/tnsm.2020.2987085 article EN cc-by IEEE Transactions on Network and Service Management 2020-04-10

Thanks to graph neural networks (GNNs), semi-supervised node classification has shown the state-of-the-art performance in data. However, GNNs have not considered different types of uncertainties associated with class probabilities minimize risk increasing misclassification under uncertainty real life. In this work, we propose a multi-source framework using GNN that reflects various predictive both deep learning and belief/evidence theory domains for predictions. By collecting evidence from...

10.48550/arxiv.2010.12783 preprint EN other-oa arXiv (Cornell University) 2020-01-01

We propose end-to-end multimodal fact-checking and explanation generation, where the input is a claim large collection of web sources, including articles, images, videos, tweets, goal to assess truthfulness by retrieving relevant evidence predicting label (e.g., support, refute or not enough information), generate statement summarize explain reasoning ruling process. To support this research, we construct MOCHEG, large-scale dataset consisting 15,601 claims each annotated with statement,...

10.1145/3539618.3591879 article EN cc-by Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2023-07-18

We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate evaluation the protocol, considering not only quality-of-service (QoS) properties (connectivity) but also social (honesty unselfishness) evaluate other nodes encountered. Two versions are considered: an equal-weight QoS protocol (called trust-based routing) connectivity-based routing). By utilizing stochastic Petri net model...

10.1109/glocom.2010.5683235 article EN 2010-12-01

For mission-oriented mobile group systems designed to continue mission execution in hostile environments the presence of security attacks, it is critical properly deploy intrusion detection techniques cope with insider attacks enhance system reliability. In this paper, we analyze effect (IDS) on reliability a communication consisting groups set out for ad hoc networks. Unlike common belief that IDS should be executed as often possible prolong lifetime, discover at an optimal rate maximize...

10.1109/tr.2010.2040534 article EN IEEE Transactions on Reliability 2010-02-16

Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the information attackers have collected based on current network IP configuration.We propose a software-defined networking-based MTD technique called Flexible Random Virtual Multiplexing, namely FRVM, which aims to defend against reconnaissance and scanning attacks.FRVM enables host machine multiple, random, time-varying virtual addresses, are multiplexed real host.Multiplexing or de-multiplexing...

10.1109/trustcom/bigdatase.2018.00088 article EN 2018-08-01

Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims achieve accurate peer-to-peer assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay communication cost under resource-constrained environments....

10.1109/tdsc.2016.2530705 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2016-02-16

We propose a context-aware trust management model called CATrust for service-oriented ad hoc networks such as peer-to-peer and Internet of Things wherein node can be service requester or provider. The novelty our design lies in the use logistic regression to dynamically estimate trustworthiness provider based on its behavior patterns response context environment changes. develop recommendation filtering mechanism effectively screen out dishonest recommendations even extremely hostile...

10.1109/tsc.2016.2587259 article EN publisher-specific-oa IEEE Transactions on Services Computing 2016-07-07

We develop and analyze a trust management protocol for cognitive mission-driven group communication systems (GCSs) in mobile ad hoc networks (MANETs) using hierarchical modeling techniques based on stochastic Petri nets. The goal is to efficiently establish acceptable levels among nodes without prior interactions. seek identify the optimal length of chain peers Web so as maximize chain, by trading off space level. network can dynamically adapt changing environments adjusting their design...

10.1109/cse.2009.68 article EN 2009-01-01
Coming Soon ...