Follow
Rhongho Jang
Rhongho Jang
Verified email at wayne.edu - Homepage
Title
Cited by
Cited by
Year
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
IEEE ICDCS 2020, 2020
562020
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020, 2020
532020
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
492021
AttCAT: Explaining Transformers via Attentive Class Activation Tokens
Y Qiang, D Pan, C Li, X Li, R Jang, D Zhu
NeurIPS 2022, 2022
432022
Rflow+: An SDN-based WLAN Monitoring and Management Framework
R Jang, D Cho, Y Noh, DH Nyang
IEEE INFOCOM 2017, 2017
392017
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
R Jang, DH Min, SK Moon, D Mohaisen, DH Nyang
IEEE INFOCOM 2020, 2020
272020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
R Jang, J Kang, A Mohaisen, DH Nyang
IEEE Transactions on Mobile Computing 19 (5), 1056-1071, 2019
262019
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
A Alabduljabbar, R Ma, S Choi, R Jang, S Chen, D Mohaisen
CySSS 2022@AsiaCCS, 2022
242022
Investigating the Effect of Traffic Sampling on Machine Learning-based Network Intrusion Detection Approaches
J Alikhanov, R Jang, M Abuhamad, D Mohaisen, D Nyang, Y Noh
IEEE Access 10, 5801-5823, 2021
222021
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
A Abusnaina, A Anwar, S Alshamrani, A Alabduljabbar, R Jang, ...
ACM RAID 2022, 2022
17*2022
Poster: Measuring and Assessing the Risks of Free Content Websites
A Alabduljabbar, R Ma, S Alshamrani, R Jang, S Chen, D Mohaisen
ISOC NDSS 2022, 2022
172022
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
J Park, R Jang, M Mohaisen, D Mohaisen
IEEE/ACM Transactions on Networking 30 (01), 1-14, 2022
172022
Rogue Access Point Detector using Characteristics of Channel Overlapping in 802.11n
R Jang, J Kang, A Mohaisen, DH Nyang
IEEE ICDCS 2017, 2017
142017
A Scalable and Dynamic ACL System for In-Network Defense
C Jung, S Kim, R Jang, D Mohaisen, DH Nyang
ACM CCS 2022, 2022
132022
A Robust Counting Sketch for Data Plane Intrusion Detection
S Kim, C Jung, R Jang, D Mohaisen, DH Nyang
ISOC NDSS 2023, 2023
12*2023
A One-Page Text Entry Method Optimized for Rectangle Smartwatches
R Jang, C Jung, D Mohaisen, K Lee, DH Nyang
IEEE Transactions on Mobile Computing 21 (10), 2021
92021
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
C Jung, Z Dagvatur, R Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018
82018
A Network-independent Tool-based Usable Authentication System for Internet of Things Devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security 108, 102338, 2021
72021
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
IEEE ICDCS 2019, 2019
72019
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
DN Dao, R Jang, C Jung, D Mohaisen, DH Nyang
IEEE/IFIP DSN 2022, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20