Wonsuk Choi

ORCID: 0000-0003-3253-4827
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Autonomous Vehicle Technology and Safety
  • Korean Urban and Social Studies
  • Diverse Topics in Contemporary Research
  • Urban and spatial planning
  • Advanced Wireless Communication Techniques
  • Advanced Adaptive Filtering Techniques
  • Direction-of-Arrival Estimation Techniques
  • Millimeter-Wave Propagation and Modeling
  • Ecology and Conservation Studies
  • Network Security and Intrusion Detection
  • Microwave Engineering and Waveguides
  • Chinese history and philosophy
  • Gaze Tracking and Assistive Technology
  • Anomaly Detection Techniques and Applications
  • Advanced Authentication Protocols Security
  • Wireless Body Area Networks
  • Real-Time Systems Scheduling
  • Antenna Design and Optimization
  • Biometric Identification and Security
  • Adversarial Robustness in Machine Learning
  • Cultural and Historical Studies
  • Bluetooth and Wireless Communication Technologies

Korea University
2016-2024

Chungbuk National University
2017-2024

Research!America (United States)
2023-2024

Samsung (United States)
2021-2024

National Technical University of Athens
2024

Hansung University
2020-2023

Samsung (South Korea)
2010-2022

STATS ChipPAC (Singapore)
2019

Syracuse University
2004-2012

Yonsei University
2007-2008

The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number vehicular attack surfaces accordingly. fundamental vulnerability is caused by fact that controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most them require modification CAN protocol their own vulnerabilities. In paper, we focus...

10.1109/tifs.2018.2812149 article EN IEEE Transactions on Information Forensics and Security 2018-03-05

As the functions of vehicles are more computerized for safety and convenience drivers, attack surfaces vehicle accordingly increasing. Many results have shown that an attacker could intentionally control vehicles. Most them exploit vulnerability controller area network (CAN) protocol, a de-facto standard in-vehicle networks, does not support message origin authentication. Although number methods to resolve this security been suggested, they their each limitation be applied into current...

10.1109/tvt.2018.2810232 article EN IEEE Transactions on Vehicular Technology 2018-02-27

The development of vehicle technologies such as connected and autonomous environments provide drivers with functions for convenience safety that are highly capable remote diagnosis or lane-keeping assistance. Unfortunately, despite impressive advantages drivers, these also have various vulnerabilities could lead to cyber-physical attacks on automotive Controller Area Networks (i.e., CAN). To deal security issues, a multitude issue-specific countermeasures already been proposed. In this...

10.1109/tits.2021.3078740 article EN IEEE Transactions on Intelligent Transportation Systems 2021-05-24

Numerous hacking attempts on modern vehicles have recently demonstrated that an adversary can remotely control a vehicle using vulnerable telematics services. In these attempts, masquerade attack impersonating some safety-critical electronic units (ECUs) is usually performed to vehicle. the last decade, several message authentication protocols for controller area network (CAN) been proposed protect from attacks. However, are not enough attacks by compromised ECUs. Other secure against fill...

10.1109/tvt.2019.2961765 article EN IEEE Transactions on Vehicular Technology 2019-12-23

It is projected that mobile traffic will increase by 80x year 2030. To meet this in demand, it inevitable to utilize the terahertz bands (0.1 THz 10 THz) for future 6G wireless systems. However, operating at such high frequency comes with several fundamental and technical challenges. In work, we present a proof-of-concept system demonstrate feasibility of establishing communication link 140 GHz carrier frequency. addition, work highlights techniques tackle challenges regime. authors...

10.1109/iccworkshops50388.2021.9473600 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2021-06-01

Recently, the traditional way to unlock car doors has been replaced with a keyless entry system which proves more convenient for automobile owners. When driver key fob is in vicinity of vehicle, automatically on user command. However, unfortunately, it shown that these systems are vulnerable signal relaying attacks. While evident manufacturers incorporate preventative methods secure systems, they continue be range Relayed signals result valid packets verified as legitimate, and this makes...

10.14722/ndss.2020.23107 article EN 2020-01-01

Smartwatches have come into wide use in recent years, and a number of smartwatch applications that improve convenience user health are being developed introduced constantly. Moreover, the latest smartwatches now designed to operate without their paired smartphones, as such, it is necessary for independently authenticate users. In these current devices, personal identification numbers (PIN) or patterns entered users, but methods require inconvenient interaction not highly secure. Particularly...

10.1145/3460120.3484553 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Contemporary vehicles have undergone numerous transformations to become fully computerized machines. This computerizing process is intended provide safety and convenience for drivers; however, there been many studies demonstrating how remotely maneuver a vehicle by compromising its in-vehicle electronic control units (ECU). As countermeasure, automotive intrusion detection systems (IDSs) also extensively explored as potential remedies. The clock-based IDS was one of the most promising...

10.1109/tits.2023.3293517 article EN IEEE Transactions on Intelligent Transportation Systems 2023-07-18

Joint phase-time arrays (JPTA) is a new mmWave radio frequency front-end architecture constructed with appending time-delay elements to phase shifters for analog beamforming. JPTA allows the base station (BS) form multiple frequency-dependent beams single RF chain, exploiting extra degrees of freedom offer. Without requiring power-hungry chains, BS can schedule users in different directions frequency-division multiplexing (FDM) manner. A achieves various advantages over traditional...

10.48550/arxiv.2502.00139 preprint EN arXiv (Cornell University) 2025-01-31

Passive keyless entry and start system has been widely used in modern cars. Car owners can open the door or engine merely by having key their pocket. PKES was originally designed to establish a communication channel between car its within approximately one meter. However, is vulnerable relay attacks which attackers unlock even if out of range. Even though have recognized as potential threat for over ten years, such were thought be impractical due highly expensive equipment; however, required...

10.1155/2018/1935974 article EN cc-by Journal of Advanced Transportation 2018-01-01

Recently, numerous electronic components are installed in vehicles, providing drivers and passengers with increased safety convenience. The construct an in-vehicle network that internally shares relevant status information about the vehicle. As modern vehicles become more computerized, potential for automotive cyber-security threats also increases a fact has been illustrated clearly by various car-hacking demonstrations. Using controller area (CAN), de facto standard protocol industry...

10.1109/tvt.2021.3063261 article EN IEEE Transactions on Vehicular Technology 2021-03-03

Understanding the mammalian pathogenesis and interspecies transmission of HPAI H5N8 virus hinges on mapping its adaptive markers. We used deep sequencing to track these markers over five passages in murine lung tissue. Subsequently, we evaluated growth, selection, RNA load eight recombinant viruses with By leveraging an integrated non-linear regression model, quantitatively determined influence adaptation, expression hosts. Furthermore, our findings revealed that interplay can lead...

10.1080/22221751.2024.2339949 article EN cc-by Emerging Microbes & Infections 2024-04-04

In traditional, adaptive signal processing algorithms one change both the amplitude and phase of weight vectors associated with an array at each antenna elements. The use complex weights offers greater control over response expense system complexity. However, it is easier if requires only variation a fixed for all Because uses real arithmetic operations to find connected antenna, computational complexity reduced considerably. Hence, this paper addresses in system. we describe new direct data...

10.1109/tap.2005.859753 article EN publisher-specific-oa IEEE Transactions on Antennas and Propagation 2006-01-01

Modern vehicles are equipped with numerous electric control units which exchange vehicular status data, providing drivers convenience, efficiency, and safety. In addition, the autonomous adopt various sensors that produce high volumes of high-speed data to process assess internal external situations. This is particularly useful automotive service providers such as car insurers, rental companies, manufacturers. One way understand how this used imagine scenario in an automobile insurer would...

10.1109/access.2019.2910865 article EN cc-by-nc-nd IEEE Access 2019-01-01

Modern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate each other to share information related vehicle status as well commands efficiently vehicle. However, increasing complexity of modern has inadvertently expanded potential attack surfaces, making them vulnerable cyber attacks. In light this, researchers currently working demonstrate remote maneuvering by compromising...

10.1109/access.2022.3174356 article EN cc-by IEEE Access 2022-01-01

A 140GHz 4-element RF beamforming phased-array receiver (RX) has been demonstrated in 22nm FDSOI CMOS. The proposed single-side-band architecture provides >25dB and >20dB measured image rejection ratio (IRR) across 4GHz 8GHz channel bandwidth centered at 7GHz intermediate frequency (IF). Each front-end element consists of a wideband low-noise amplifier (LNA) vector-modulator phase shifter. 4 elements are combined on chip through power combiners driver amplifiers before the double-balanced...

10.1109/rfic54547.2023.10186204 article EN 2023-06-11

This paper presents a new technique for estimating parameters of damped sinusoids and impulse-like responses utilizing both early late time transient scattering responses. Transient are composed at times components times. Due to the components, it is difficult extract meaningful when analyzing complete data set. In this paper, entire time-domain response used signal interest The fractional Fourier transform (FrFT), especially half (HFT), analyze parameter identification. Impulse or...

10.1109/tap.2004.835165 article EN IEEE Transactions on Antennas and Propagation 2004-11-01

Participatory sensing is gaining popularity as a method for collecting and sharing information from distributed local environments using sensor-rich mobile devices. There are number of participatory applications currently in wide use, such location-based service (e.g., Waze navigation). Usually, these collect tremendous amounts data containing personal information, including user identity current location. Due to the high sensitivity this need privacy-preserving mechanism, anonymity, secure...

10.1371/journal.pone.0225688 article EN cc-by PLoS ONE 2019-12-05

With the advancement of connected and automated vehicles (CAVs), drivers now have access to convenient features such as lane-keeping, cruise control, more. The electronic control units (ECUs) equipped within communicate with each other through controller area network (CAN). However, since CAN does not possess any security mechanisms, it becomes a target for adversaries attack. In light this, significant amount research regarding intrusion detection systems (IDSs) has focused on detecting...

10.1109/tits.2023.3323622 article EN IEEE Transactions on Intelligent Transportation Systems 2023-10-18

Ultrasonic sensors are used across a variety of industrial areas, as they measure distance simply via calculating the difference time between transmission and reception signals. However, recently, attackers have been targeting ultrasonic to inflict intentional malfunction regarding measurement an obstacle some researchers actually demonstrated such attacks using actual vehicle, Tesla Model S. In addition, these malicious signal injections into do not require sophisticated equipment, making...

10.1109/access.2019.2932843 article EN cc-by IEEE Access 2019-01-01

Modern vehicles are equipped with a number of electronic control units (ECUs), which efficiently by communicating each other through the controller area network (CAN). However, CAN is known to be vulnerable cyber attacks because it does not have any security mechanisms. To find messages that can safety-critical functions in ECUs, researchers studied fuzzing methods. In existing methods, input values generally generated at random without considering structure messages, resulting...

10.1109/access.2022.3151358 article EN cc-by IEEE Access 2022-01-01

Recently, automotive intrusion detection systems (IDSs) have emerged as promising defense approaches to counter attacks on in-vehicle networks (IVNs). However, the effectiveness of IDSs relies heavily quality datasets used for training and evaluation. Despite availability several IDSs, there has been a lack comprehensive analysis focusing assessing these datasets. This paper aims address need dataset assessment in context IDSs. It proposes qualitative quantitative metrics that are...

10.32604/cmc.2023.039583 article EN Computers, materials & continua/Computers, materials & continua (Print) 2023-01-01

철도 지선 구간의 유지보수 비용을 최소화하기 위해 ICT 기반 차상제어시스템을 개발 중이다. 이 시스템은 기존의 열차제어방식과 달리 선로 주변 신호기와 고정폐색장치를 없애고 이동폐색방식을 적용하며 차상에서 선로전환기와 건널목을 제어하는 방식이다. 본 논문의 목적은 차상제어시스템 이전에 고려해야 할 주요 운영 이슈 사항을 분석하며 대상은 열차운행준비, 운전 편의성, 관제역할, 폐색방식, 그리고 운영비용을 고려하였다. 열차 출발 전에 기관사가 DMI를 통해 입력하여야 입력데이터를 정의하였고 관련 업무 프로세스를 UML 도구를 활용하여 설계하였다. 기관사의 편의성 측면에서는 역 진입 시의 제동시점 지원 필요성과 원활한 훈련을 위한 운전시뮬레이터가 필요하다. 직접 업무절차를 도구로 기존 방식과의 차이를 확인하기 고정폐색방식과 이동폐색방식 간에 비교 분석하였으며, 비용 기존방식과 방식의 신호설비에 따른 이점을 제시하였다. In order to minimize the...

10.7782/jksr.2011.14.6.575 article EN Journal of the Korean society for railway 2011-12-26
Coming Soon ...