default search action
Jaejong Baek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Sukwha Kyung, Jaejong Baek, Gail-Joon Ahn:
Unveiling SDN Controller Identity through Timing Side Channel. NoF 2024: 169-177 - 2023
- [j4]Carlos E. Rubio-Medrano, Pradeep Kumar Duraisamy Soundrapandian, Matthew Hill, Luis Claramunt, Jaejong Baek, Geetha S, Gail-Joon Ahn:
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android. Inf. Syst. Frontiers 25(2): 529-548 (2023) - [c9]Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. DSN 2023: 261-273 - [c8]Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. SACMAT 2023: 79-90 - 2021
- [c7]Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. EuroS&P 2021: 704-706 - [c6]Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. EuroS&P 2021: 713-715 - [c5]Pradeep Kumar Duraisamy Soundrapandian, Tiffany Bao, Jaejong Baek, Yan Shoshitaishvili, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn:
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts. HICSS 2021: 1-10 - [c4]Carlos E. Rubio-Medrano, Matthew Hill, Luis M. Claramunt, Jaejong Baek, Gail-Joon Ahn:
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android. SKM 2021: 23-36 - 2020
- [i1]Shammya Saha, Nikhil Ravi, Kari Hreinsson, Jaejong Baek, Anna Scaglione, Nathan G. Johnson:
A Secure Distributed Ledger for Transactive Energy: The Electron Volt Exchange (EVE) Blockchain. CoRR abs/2011.06983 (2020)
2010 – 2019
- 2018
- [c3]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - 2017
- [c2]Hong Wang, Jia Liu, Wenjie Yi, Ben Niu, Jaejong Baek:
An Improved Brain Storm Optimization with Learning Strategy. ICSI (1) 2017: 511-518 - [c1]Hong Wang, Lulu Zuo, Jia Liu, Chen Yang, Ya Li, Jaejong Baek:
A Comparison of Heuristic Algorithms for Bus Dispatch. ICSI (2) 2017: 511-518 - 2016
- [j3]Jaejong Baek:
Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6. J. Inform. and Commun. Convergence Engineering 14(2) (2016) - 2013
- [j2]Fei Shi, Jaejong Baek, JooSeok Song, Weijie Liu:
A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks. Telecommun. Syst. 52(4): 2397-2406 (2013) - 2012
- [j1]Jaejong Baek, Sunghoon Seo, Fei Shi, JooSeok Song:
A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs. EURASIP J. Wirel. Commun. Netw. 2012: 39 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint