default search action
Kyoungwon Suh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Jingyuan Liang, Chansu Yu, Kyoungwon Suh, Hyoil Han:
Tail Time Defense Against Website Fingerprinting Attacks. IEEE Access 10: 18516-18525 (2022) - [c15]Hojun Lee, Seong-je Cho, Hyoil Han, Woosang Cho, Kyoungwon Suh:
Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls. AIKE 2022: 131-134 - 2020
- [c14]Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh:
Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection. AIKE 2020: 92-99 - [c13]Hyoil Han, SeungJin Lim, Kyoungwon Suh, Seonghyun Park, Seong-je Cho, Minkyu Park:
Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach. BigComp 2020: 75-81
2010 – 2019
- 2019
- [j13]Jaemin Jung, Hyun-Jin Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Efficient Android Malware Detection Using API Rank and Machine Learning. J. Internet Serv. Inf. Secur. 9(1): 48-59 (2019) - [c12]Jaemin Jung, Kyeonghwan Lim, Byoungchul Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Detecting Malicious Android Apps using the Popularity and Relations of APIs. AIKE 2019: 309-312 - 2018
- [j12]Chaoqun Yue, Ruofan Jin, Kyoungwon Suh, Yanyuan Qin, Bing Wang, Wei Wei:
LinkForecast: Cellular Link Bandwidth Prediction in LTE Networks. IEEE Trans. Mob. Comput. 17(7): 1582-1594 (2018) - [c11]Jaemin Jung, Hyun-Jin Kim, Dongjin Shin, Myeonggeon Lee, Hyunjae Lee, Seong-je Cho, Kyoungwon Suh:
Android Malware Detection Based on Useful API Calls and Machine Learning. AIKE 2018: 175-178 - 2016
- [c10]Levon Nazaryan, Ruofan Jin, Chaoqun Yue, Ozgur Oksuz, Bing Wang, Kyoungwon Suh, Aggelos Kiayias:
Securely outsourcing cookies to the cloud via private information retrieval. WiMob 2016: 1-8 - 2015
- [c9]Abdurrahman Arikan, Ruofan Jin, Bing Wang, Song Han, Kyoungwon Suh, Peng Zhang:
Optimal centralized renewable energy transfer scheduling for electrical vehicles. SmartGridComm 2015: 247-252 - 2014
- [j11]Wei Zeng, Jordan Cote, Xian Chen, Yoo-Ah Kim, Wei Wei, Kyoungwon Suh, Bing Wang, Zhijie Jerry Shi:
Delay monitoring for wireless sensor networks: An architecture using air sniffers. Ad Hoc Networks 13: 549-559 (2014) - 2013
- [c8]Xian Chen, Lester Lipsky, Kyoungwon Suh, Bing Wang, Wei Wei:
Session lengths and IP address usage of smartphones in a university campus WiFi network: Characterization and analytical models. IPCCC 2013: 1-9 - 2012
- [j10]Wei Wei, Sharad Jaiswal, Jim Kurose, Don Towsley, Kyoungwon Suh, Bing Wang:
Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference. IEEE/ACM Trans. Netw. 20(2): 325-338 (2012) - [c7]Xian Chen, Ruofan Jin, Kyoungwon Suh, Bing Wang, Wei Wei:
Network performance of smart mobile handhelds in a university campus WiFi network. Internet Measurement Conference 2012: 315-328 - 2010
- [j9]Xian Chen, Bing Wang, Kyoungwon Suh, Wei Wei:
Passive online wireless LAN health monitoring from a single measurement point. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(4): 19-21 (2010)
2000 – 2009
- 2009
- [j8]Michael Zink, Kyoungwon Suh, Yu Gu, Jim Kurose:
Characteristics of YouTube network traffic at a campus network - Measurements, models, and implications. Comput. Networks 53(4): 501-514 (2009) - [j7]Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, James F. Kurose, Donald F. Towsley, Sharad Jaiswal:
Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs. IEEE Trans. Mob. Comput. 8(3): 398-412 (2009) - 2008
- [j6]Yang Guo, Kyoungwon Suh, Jim Kurose, Donald F. Towsley:
DirectStream: A directory-based peer-to-peer video streaming service. Comput. Commun. 31(3): 520-536 (2008) - 2007
- [j5]Christoph Neumann, Nicolas Prigent, Matteo Varvello, Kyoungwon Suh:
Challenges in peer-to-peer gaming. Comput. Commun. Rev. 37(1): 79-82 (2007) - [j4]Joongheon Kim, Wonjun Lee, Eunkyo Kim, Dongshin Kim, Kyoungwon Suh:
Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems. IEEE Commun. Lett. 11(1): 22-24 (2007) - [j3]Kyoungwon Suh, Christophe Diot, Jim Kurose, Laurent Massoulié, Christoph Neumann, Donald F. Towsley, Matteo Varvello:
Push-to-Peer Video-on-Demand System: Design and Evaluation. IEEE J. Sel. Areas Commun. 25(9): 1706-1716 (2007) - [j2]Yang Guo, Kyoungwon Suh, James F. Kurose, Donald F. Towsley:
P2Cast: peer-to-peer patching for video on demand service. Multim. Tools Appl. 33(2): 109-129 (2007) - [c6]Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kurose, Donald F. Towsley:
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. Internet Measurement Conference 2007: 365-378 - 2006
- [j1]Kyoungwon Suh, Yang Guo, James F. Kurose, Donald F. Towsley:
Locating network monitors: Complexity, heuristics, and coverage. Comput. Commun. 29(10): 1564-1577 (2006) - [c5]Kyoungwon Suh, Daniel R. Figueiredo, James F. Kurose, Donald F. Towsley:
Characterizing and Detecting Skype-Relayed Traffic. INFOCOM 2006 - 2005
- [c4]Kyoungwon Suh, Yang Guo, James F. Kurose, Donald F. Towsley:
Locating network monitors: complexity, heuristics, and coverage. INFOCOM 2005: 351-361 - [c3]Weifeng Chen, Yong Huang, Bruno F. Ribeiro, Kyoungwon Suh, Honggang Zhang, Edmundo de Souza e Silva, James F. Kurose, Donald F. Towsley:
Exploiting the IPID Field to Infer Network Path and End-System Characteristics. PAM 2005: 108-120 - 2003
- [c2]Yang Guo, Kyoungwon Suh, Jim Kurose, Don Towsley:
A peer-to-peer on-demand streaming service and its performance evaluation. ICME 2003: 649-652 - [c1]Yang Guo, Kyoungwon Suh, James F. Kurose, Donald F. Towsley:
P2Cast: peer-to-peer patching scheme for VoD service. WWW 2003: 301-309
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint