default search action
Jin-Hee Cho
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2008
- [b1]Jin-Hee Cho:
Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks. Virginia Tech, Blacksburg, VA, USA, 2008
Journal Articles
- 2024
- [j66]Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong, Feng Chen, Jin-Hee Cho:
A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning. Inf. Fusion 101: 101987 (2024) - [j65]Dian Chen, Qisheng Zhang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Energy-Adaptive and Robust Monitoring for Smart Farms Based on Solar-Powered Wireless Sensors. IEEE Internet Things J. 11(18): 29781-29797 (2024) - 2023
- [j64]Haider Ali, Dian Chen, Matthew Harrington, Nathaniel Salazar, Mohannad Al Ameedi, Ahmad Faraz Khan, Ali Raza Butt, Jin-Hee Cho:
A Survey on Attacks and Their Countermeasures in Deep Learning: Applications in Deep Neural Networks, Federated, Transfer, and Deep Reinforcement Learning. IEEE Access 11: 120095-120130 (2023) - [j63]Dong Hyun Jeong, Jin-Hee Cho, Feng Chen, Lance M. Kaplan, Audun Jøsang, Soo-Yeon Ji:
Interactive Web-Based Visual Analysis on Network Traffic Data. Inf. 14(1): 16 (2023) - [j62]Qisheng Zhang, Dian Chen, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Attack-Resistant, Energy-Adaptive Monitoring for Smart Farms: Uncertainty-Aware Deep Reinforcement Learning Approach. IEEE Internet Things J. 10(16): 14254-14268 (2023) - [j61]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Social media-based social-psychological community resilience analysis of five countries on COVID-19. J. Comput. Soc. Sci. 6(2): 1001-1032 (2023) - [j60]Nitasha Sahani, Ruoxi Zhu, Jin-Hee Cho, Chen-Ching Liu:
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. ACM Trans. Cyber Phys. Syst. 7(2): 11:1-11:31 (2023) - [j59]Zhen Guo, Jin-Hee Cho, Chang-Tien Lu:
Mitigating Influence of Disinformation Propagation Using Uncertainty-Based Opinion Interactions. IEEE Trans. Comput. Soc. Syst. 10(2): 435-447 (2023) - [j58]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception. IEEE Trans. Netw. Serv. Manag. 20(3): 3816-3830 (2023) - 2022
- [j57]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Measuring Community Resilience During the COVID-19 Based on Community Wellbeing and Resource Distribution. J. Soc. Comput. 3(4): 322-344 (2022) - [j56]Peng Xu, Jin-Hee Cho, Alejandro Salado:
Expert Opinion Fusion Framework Using Subjective Logic for Fault Diagnosis. IEEE Trans. Cybern. 52(6): 4300-4311 (2022) - [j55]Zhen Guo, Jaber Valinejad, Jin-Hee Cho:
Effect of Disinformation Propagation on Opinion Dynamics: A Game Theoretic Approach. IEEE Trans. Netw. Sci. Eng. 9(5): 3775-3790 (2022) - [j54]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. IEEE Trans. Netw. Serv. Manag. 19(1): 112-129 (2022) - [j53]Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore:
Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey. IEEE Trans. Netw. Serv. Manag. 19(1): 706-728 (2022) - [j52]Sunghwan Kim, Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework. IEEE Trans. Netw. Serv. Manag. 19(4): 4834-4846 (2022) - [j51]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. ACM Trans. Internet Techn. 22(1): 24:1-24:31 (2022) - [j50]Si Young Jang, Sung Kyu Park, Jin-Hee Cho, Dongman Lee:
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks. ACM Trans. Internet Techn. 22(4): 92:1-92:24 (2022) - 2021
- [j49]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures: A Survey. IEEE Access 9: 1770-1806 (2021) - [j48]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework. IEEE Access 9: 70700-70714 (2021) - [j47]Zelin Wan, Yash Mahajan, Beom Woo Kang, Terrence J. Moore, Jin-Hee Cho:
A Survey on Centrality Metrics and Their Network Resilience Analysis. IEEE Access 9: 104773-104819 (2021) - [j46]Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning. IEEE Commun. Surv. Tutorials 23(4): 2460-2493 (2021) - [j45]Adil Alim, Jin-Hee Cho, Feng Chen:
CSL+: Scalable Collective Subjective Logic under Multidimensional Uncertainty. ACM Trans. Intell. Syst. Technol. 12(1): 7:1-7:26 (2021) - [j44]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation. IEEE Trans. Netw. Serv. Manag. 18(3): 3154-3169 (2021) - 2020
- [j43]Hamid Al-Hamadi, Mohammad Saoud, Ing-Ray Chen, Jin-Hee Cho:
Optimizing the Lifetime of IoT-Based Star and Mesh Networks. IEEE Access 8: 63090-63105 (2020) - [j42]Z. Xu, Lei Cao, Xiliang Chen, Jin-Hee Cho:
Deep Reinforcement Learning with Adaptive Update Target Combination. Comput. J. 63(7): 995-1003 (2020) - [j41]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutorials 22(1): 709-745 (2020) - [j40]Dilli P. Sharma, Simon Yusuf Enoch, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim:
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. J. Netw. Comput. Appl. 170: 102805 (2020) - [j39]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
Attack Graph-Based Moving Target Defense in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 17(3): 1653-1668 (2020) - [j38]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020) - 2019
- [j37]Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho:
Trust Management of Smart Service Communities. IEEE Access 7: 26362-26378 (2019) - [j36]Jin-Hee Cho, Hamid Al-Hamadi, Ing-Ray Chen:
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7: 92296-92313 (2019) - [j35]Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 7: 118556-118580 (2019) - [j34]Jin-Hee Cho, Shouhuai Xu, Patrick M. Hurley, Matthew MacKay, Trevor Benjamin, Mark R. Beaumont:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. ACM Comput. Surv. 51(6): 128:1-128:47 (2019) - [j33]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. IEEE Trans. Inf. Forensics Secur. 14(12): 3217-3232 (2019) - [j32]Terrence J. Moore, Jin-Hee Cho, Ing-Ray Chen:
Network Adaptations Under Cascading Failures for Mission-Oriented Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1184-1198 (2019) - [j31]Jin-Hee Cho, Scott Rager, John O'Donovan, Sibel Adali, Benjamin D. Horne:
Uncertainty-based False Information Propagation in Social Networks. ACM Trans. Soc. Comput. 2(2): 5:1-5:34 (2019) - 2018
- [j30]Sai Mounika Errapotu, Jingyi Wang, Yanmin Gong, Jin-Hee Cho, Miao Pan, Zhu Han:
SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT. IEEE Internet Things J. 5(6): 4380-4391 (2018) - [j29]Jin-Hee Cho:
Dynamics of Uncertain and Conflicting Opinions in Social Networks. IEEE Trans. Comput. Soc. Syst. 5(2): 518-531 (2018) - [j28]Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 151-165 (2018) - [j27]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. IEEE Trans. Inf. Forensics Secur. 13(12): 2965-2980 (2018) - [j26]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Yen-Cheng Lu, Chang-Tien Lu, Jeffrey J. P. Tsai:
CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks. IEEE Trans. Serv. Comput. 11(6): 908-921 (2018) - 2017
- [j25]Jin-Hee Cho, Yating Wang, Ing-Ray Chen, Kevin S. Chan, Ananthram Swami:
A Survey on Modeling and Optimizing Multi-Objective Systems. IEEE Commun. Surv. Tutorials 19(3): 1867-1901 (2017) - [j24]Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu:
A Survey on Systems Security Metrics. ACM Comput. Surv. 49(4): 62:1-62:35 (2017) - [j23]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Jeffrey J. P. Tsai:
Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 14(1): 217-232 (2017) - [j22]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Kevin S. Chan:
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 10(4): 660-672 (2017) - 2016
- [j21]Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan:
Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks 44: 58-75 (2016) - 2015
- [j20]Sibel Adali, Kevin S. Chan, Jin-Hee Cho:
TANDEM: a trust-based agent framework for networked decision making. Comput. Math. Organ. Theory 21(4): 461-490 (2015) - [j19]Jin-Hee Cho, Kevin S. Chan, Sibel Adali:
A Survey on Trust Modeling. ACM Comput. Surv. 48(2): 28:1-28:40 (2015) - [j18]Dong-Uk Lee, Kyung Whan Kim, Kwan-Weon Kim, Kang Seol Lee, Sang Jin Byeon, Jae-Hwan Kim, Jin-Hee Cho, Jaejin Lee, Jun Hyun Chun:
A 1.2 V 8 Gb 8-Channel 128 GB/s High-Bandwidth Memory (HBM) Stacked DRAM With Effective I/O Test Circuits. IEEE J. Solid State Circuits 50(1): 191-203 (2015) - [j17]Jin-Hee Cho:
Tradeoffs Between Trust and Survivability for Mission Effectiveness in Tactical Networks. IEEE Trans. Cybern. 45(4): 754-766 (2015) - 2014
- [j16]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Networks 19: 59-74 (2014) - [j15]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Trans. Parallel Distributed Syst. 25(5): 1200-1210 (2014) - 2013
- [j14]Jin-Hee Cho, Ing-Ray Chen:
On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks 11(8): 2217-2234 (2013) - [j13]Jin-Hee Cho, Kevin S. Chan:
Building Trust-Based Sustainable Networks. IEEE Technol. Soc. Mag. 32(2): 32-38 (2013) - 2012
- [j12]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35(3): 1001-1012 (2012) - [j11]Hyun-Woo Lee, Hoon Choi, Beom-Ju Shin, Kyung-Hoon Kim, Kyung Whan Kim, Jaeil Kim, Kwang Hyun Kim, Jongho Jung, Jae-Hwan Kim, Eun Young Park, Jong-Sam Kim, Jong-Hwan Kim, Jin-Hee Cho, Nam Gyu Rye, Jun Hyun Chun, Yunsaing Kim, Chulwoo Kim, Young-Jung Choi, Byong-Tae Chung:
A 1.0-ns/1.0-V Delay-Locked Loop With Racing Mode and Countered CAS Latency Controller for DRAM Interfaces. IEEE J. Solid State Circuits 47(6): 1436-1447 (2012) - [j10]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169-183 (2012) - [j9]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 66(2): 443-459 (2012) - 2011
- [j8]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tutorials 13(4): 562-583 (2011) - [j7]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Evaluation 68(1): 58-75 (2011) - [j6]Jin-Hee Cho, Ing-Ray Chen:
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems. Wirel. Pers. Commun. 60(4): 725-750 (2011) - 2010
- [j5]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. IEEE Trans. Reliab. 59(1): 231-241 (2010) - [j4]Jin-Hee Cho, Ing-Ray Chen:
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Networks 16(4): 1157-1173 (2010) - 2009
- [j3]Young-Baek Kim, Jin-Hee Cho, Sang-Yong Rhee:
Self-Localization Algorithm for a Mobile Air Cleaner. Int. J. Fuzzy Log. Intell. Syst. 9(4): 321-326 (2009) - 2008
- [j2]Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang:
Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Evaluation 65(5): 319-344 (2008) - [j1]Jin-Hee Cho, Ing-Ray Chen, Mohamed Eltoweissy:
On optimal batch rekeying for secure group communications in wireless networks. Wirel. Networks 14(6): 915-927 (2008)
Conference and Workshop Papers
- 2024
- [c105]Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles. DSN-S 2024: 1-5 - [c104]Han Jun Yoon, Shou Matsumoto, Paulo C. G. Costa, Jin-Hee Cho:
Towards an Efficient Simulation-Based Anytime Inference in Subjective Bayesian Networks. FUSION 2024: 1-8 - [c103]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. ICLR 2024 - [c102]Xujiang Zhao, Chen Zhao, Feng Chen, Jin-Hee Cho, Wei Hua, Haifeng Chen:
3rd Workshop on Uncertainty Reasoning and Quantification in Decision Making (UDM). KDD 2024: 6755-6756 - [c101]Dian Chen, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
eMTD: Energy-Aware Moving Target Defense for Sustainable Solar-powered Sensor-based Smart Farms. NOMS 2024: 1-7 - [c100]Han Jun Yoon, Ashrith Reddy Thukkaraju, Shou Matsumoto, Jair Feldens Ferrari, Donghwan Lee, Myung Kil Ahn, Paulo C. G. Costa, Jin-Hee Cho:
iMIA: Interdependent Mission Impact Assessment Using Subjective Bayesian Networks. NOMS 2024: 1-7 - 2023
- [c99]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson:
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. ACNS (1) 2023: 555-582 - [c98]Shou Matsumoto, Jair Feldens Ferrari, Han Jun Yoon, Ashrith Reddy Thukkaraju, Donghwan Lee, Myung Kil Ahn, Jin-Hee Cho, Paulo C. G. Costa:
Software-Friendly Subjective Bayesian Networks: Reasoning within a Software-Centric Mission Impact Assessment Framework. FUSION 2023: 1-8 - [c97]Xujiang Zhao, Xuchao Zhang, Chen Zhao, Jin-Hee Cho, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang, Haifeng Chen, Feng Chen:
Multi-Label Temporal Evidential Neural Networks for Early Event Detection. ICASSP 2023: 1-5 - [c96]Rui Ning, Jiang Li, Chunsheng Xin, Chonggang Wang, Xu Li, Robert Gazda, Jin-Hee Cho, Hongyi Wu:
ScanFed: Scalable Behavior-Based Backdoor Detection in Federated Learning. ICDCS 2023: 782-793 - [c95]Zhen Guo, Pei Wang, Lifu Huang, Jin-Hee Cho:
Authentic Dialogue Generation to Improve Youth's Awareness of Cybergrooming for Online Safety. ICTAI 2023: 64-69 - [c94]Zhen Guo, Qi Zhang, Qisheng Zhang, Lance M. Kaplan, Audun Jøsang, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Detecting Intents of Fake News Using Uncertainty-Aware Deep Reinforcement Learning. ICWS 2023: 722-724 - [c93]Xujiang Zhao, Chen Zhao, Feng Chen, Jin-Hee Cho, Haifeng Chen:
2nd Workshop on Uncertainty Reasoning and Quantification in Decision Making. KDD 2023: 5907-5908 - [c92]Ashrith Reddy Thukkaraju, Han Jun Yoon, Shou Matsumoto, Jair Feldens Ferrari, Donghwan Lee, Myung Kil Ahn, Paulo C. G. Costa, Jin-Hee Cho:
Interdependent Mission Impact Assessment of an IoT System with Hypergame- heoretic Attack-Defense Behavior Modeling. MASCOTS 2023: 1-8 - [c91]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches. MobiHoc 2023: 382-387 - [c90]Barry Menglong Yao, Aditya Shah, Lichao Sun, Jin-Hee Cho, Lifu Huang:
End-to-End Multimodal Fact-Checking and Explanation Generation: A Challenging Dataset and Models. SIGIR 2023: 2733-2743 - [c89]Zhen Guo, Pei Wang, Jin-Hee Cho, Lifu Huang:
Text Mining-based Social-Psychological Vulnerability Analysis of Potential Victims To Cybergrooming: Insights and Lessons Learned. WWW (Companion Volume) 2023: 1381-1388 - 2022
- [c88]Hyejin Kim, Dan Dongseong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim:
Continual Learning with Network Intrusion Dataset. IEEE Big Data 2022: 6702-6704 - [c87]Haider Ali, Mohannad Al Ameedi, Ananthram Swami, Rui Ning, Jiang Li, Hongyi Wu, Jin-Hee Cho:
ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning. CNS 2022: 1-9 - [c86]Tina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. DSN Workshops 2022: 103-110 - [c85]Qisheng Zhang, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
An Attack-Resilient and Energy-Adaptive Monitoring System for Smart Farms. GLOBECOM 2022: 2776-2781 - [c84]Ahmed H. Anwar, Mu Zhu, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory. GLOBECOM 2022: 3393-3398 - [c83]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
SAFER: Social Capital-Based Friend Recommendation to Defend against Phishing Attacks. ICWSM 2022: 241-252 - [c82]Audun Jøsang, Jin-Hee Cho, Feng Chen:
Noninformative Prior Weights for Dirichlet PDFs*. MFI 2022: 1-6 - [c81]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. PRDC 2022: 119-129 - [c80]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko, Dan Dongseong Kim:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. QRS 2022: 276-286 - 2021
- [c79]Yibo Hu, Yuzhe Ou, Xujiang Zhao, Jin-Hee Cho, Feng Chen:
Multidimensional Uncertainty-Aware Evidential Neural Networks. AAAI 2021: 7815-7822 - [c78]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson:
DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks. CNS 2021: 137-145 - [c77]Johan Pieter de Villiers, Gregor Pavlin, Jürgen Ziegler, Anne-Laure Jousselme, Paulo C. G. Costa, Eric Blasch, Kathryn B. Laskey, Claire Laudy, Alta de Waal, Jin-Hee Cho:
Uncertainty Evaluation of Temporal Trust in a Fusion System Using the URREF Ontology. FUSION 2021: 1-8 - [c76]Zhen Guo, Jin-Hee Cho:
Game Theoretic Opinion Models and Their Application in Processing Disinformation. GLOBECOM 2021: 1-7 - [c75]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore:
Network Resilience Under Epidemic Attacks: Deep Reinforcement Learning Network Topology Adaptations. GLOBECOM 2021: 1-7 - [c74]Yash Mahajan, Jin-Hee Cho:
PRADA-TF: Privacy-Diversity-Aware Online Team Formation. ICWS 2021: 493-499 - 2020
- [c73]Hongmin Yang, Jin-Hee Cho, Heesuk Son, Dongman Lee:
Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks. CCNC 2020: 1-6 - [c72]Dong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson:
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense. DSN (Supplements) 2020: 43-44 - [c71]Xujiang Zhao, Feng Chen, Shu Hu, Jin-Hee Cho:
Uncertainty Aware Semi-Supervised Learning on Graph Data. NeurIPS 2020 - [c70]Júlio Mendonça, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Armin Zimmermann, Dong Seong Kim:
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. SAC 2020: 1180-1189 - 2019
- [c69]Adil Alim, Xujiang Zhao, Jin-Hee Cho, Feng Chen:
Uncertainty-Aware Opinion Inference Under Adversarial Attacks. IEEE BigData 2019: 6-15 - [c68]Jargalsaikhan Narantuya, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Nelson:
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers. DSN (Supplements) 2019: 15-16 - [c67]Xujiang Zhao, Shu Hu, Jin-Hee Cho, Feng Chen:
Uncertainty-based Decision Making Using Deep Reinforcement Learning. FUSION 2019: 1-8 - [c66]Dilli P. Sharma, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim:
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. ICC 2019: 1-6 - [c65]Benjamin D. Horne, Dorit Nevo, John O'Donovan, Jin-Hee Cho, Sibel Adali:
Rating Reliability and Bias in News Articles: Does AI Assistance Help Everyone? ICWSM 2019: 247-256 - [c64]Anup K. Kalia, Nirav Ajmeri, Kevin S. Chan, Jin-Hee Cho, Sibel Adali, Munindar P. Singh:
The Interplay of Emotions and Norms in Multiagent Systems. IJCAI 2019: 371-377 - [c63]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Nelson, Hyuk Lim:
Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks. MobiCom 2019: 103:1-103:3 - [c62]Cole Dishington, Dilli P. Sharma, Dong Seong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson:
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks. TrustCom/BigDataSE 2019: 288-295 - 2018
- [c61]Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Deep Learning for Predicting Dynamic Uncertain Opinions in Network Data. IEEE BigData 2018: 1150-1155 - [c60]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c59]Noam Ben-Asher, Jin-Hee Cho, Sibel Adali:
Adaptive Situational Leadership Framework. CogSIMA 2018: 63-69 - [c58]Yan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho:
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn. COMPSAC (1) 2018: 461-470 - [c57]Audun Jøsang, Jin-Hee Cho, Feng Chen:
Uncertainty Characteristics of Subjective Opinions. FUSION 2018: 1998-2005 - [c56]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of firewalls and DMZs. HotSoS 2018: 9:1-9:11 - [c55]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of network diversity: poster. HotSoS 2018: 24:1 - [c54]Jin-Hee Cho, Sibel Adali:
Is Uncertainty Always Bad?: Effect of Topic Competence on Uncertain Opinions. ICC 2018: 1-7 - [c53]Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Deep Learning Based Scalable Inference of Uncertain Opinions. ICDM 2018: 807-816 - [c52]Jin-Hee Cho, Terrence J. Moore:
Percolation-based Network Adaptability Under Correlated Failures. INFOCOM 2018: 2186-2194 - [c51]Jin-Hee Cho, Jihwan Kim, Wooyoung Lee, Dong-Uk Lee, Tae-Kyun Kim, Heat Bit Park, Chunseok Jeong, Myeong-Jae Park, Seung Geun Baek, Seokwoo Choi, Byung Kuk Yoon, Young Jae Choi, Kyo Yun Lee, Daeyong Shim, Jonghoon Oh, Jinkook Kim, Seok-Hee Lee:
A 1.2V 64Gb 341GB/S HBM2 stacked DRAM with spiral point-to-point TSV structure and improved bank group data control. ISSCC 2018: 208-210 - [c50]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c49]John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. MILCOM 2018: 450-455 - [c48]Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks. MILCOM 2018: 731-736 - [c47]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [c46]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. SIoT 2018: 8-17 - [c45]Bumjin Gwak, Jin-Hee Cho, Dongman Lee, Heesuk Son:
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. TrustCom/BigDataSE 2018: 74-85 - [c44]Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. TrustCom/BigDataSE 2018: 579-587 - 2017
- [c43]Feng Chen, Chunpai Wang, Jin-Hee Cho:
Collective subjective logic: Scalable uncertainty-based opinion inference. IEEE BigData 2017: 7-16 - [c42]Jin-Hee Cho, Trevor Cook, Scott Rager, John O'Donovan, Sibel Adali:
Modeling and Analysis of Uncertainty-Based False Information Propagation in Social Networks. GLOBECOM 2017: 1-7 - [c41]Lijing Wang, Jin-Hee Cho, Ing-Ray Chen, Jiangzhuo Chen:
PDGM: Percolation-based directed graph matching in social networks. ICC 2017: 1-7 - [c40]Joel Anderson, Jin-Hee Cho:
Software Defined Network Based Virtual Machine Placement in Cloud Systems. MILCOM 2017: 876-881 - 2016
- [c39]Jin-Hee Cho, Hasan Cam, Alessandro Oltramari:
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. CogSIMA 2016: 7-13 - [c38]Jose David Mireles, Jin-Hee Cho, Shouhuai Xu:
Extracting attack narratives from traffic datasets. CyCon U.S. 2016: 118-123 - [c37]Jin-Hee Cho, Izzat Alsmadi, Dianxiang Xu:
Privacy and Social Capital in Online Social Networks. GLOBECOM 2016: 1-7 - [c36]Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho:
Interaction-based Reputation Model in Online Social Networks. ICISSP 2016: 265-272 - [c35]Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics and measurement of trustworthy systems. MILCOM 2016: 1237-1242 - 2015
- [c34]Alessandro Oltramari, Jin-Hee Cho:
ComTrustO: Composite trust-based ontology framework for information and decision fusion. FUSION 2015: 542-549 - [c33]Yating Wang, Ing-Ray Chen, Jin-Hee Cho:
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks. ISADS 2015: 71-77 - [c32]Ing-Ray Chen, Robert Mitchell, Jin-Hee Cho:
On modeling of adversary behavior and defense for survivability of military MANET applications. MILCOM 2015: 629-634 - [c31]Kevin S. Chan, Jin-Hee Cho, Theron Trout, Jason Wampler, Andrew Toth, Brian Rivera:
trustd: Trust daemon experimental testbed for network emulation. MILCOM 2015: 641-646 - 2014
- [c30]Anup K. Kalia, Nirav Ajmeri, Kevin S. Chan, Jin-Hee Cho, Sibel Adali, Munindar P. Singh:
A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation. TRUST@AAMAS 2014: 1-11 - [c29]Sujoy Sikdar, Sibel Adali, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Kevin S. Chan, Jin-Hee Cho, Byungkyu Kang, John O'Donovan:
Finding true and credible information on Twitter. FUSION 2014: 1-8 - [c28]Hyun-Woo Lee, Junyoung Song, Sangah Hyun, Seunggeun Baek, Yuri Lim, Jungwan Lee, Minsu Park, Haerang Choi, Changkyu Choi, Jin-Youp Cha, Jaeil Kim, Hoon Choi, Seung-Wook Kwack, Yonggu Kang, Jongsam Kim, Junghoon Park, Jonghwan Kim, Jin-Hee Cho, Chulwoo Kim, Yunsaing Kim, Jaejin Lee, Byong-Tae Chung, Sung-Joo Hong:
25.3 A 1.35V 5.0Gb/s/pin GDDR5M with 5.4mW standby power and an error-adaptive duty-cycle corrector. ISSCC 2014: 434-435 - [c27]Jin-Hee Cho, Kevin S. Chan, Dariusz G. Mikulski:
Trust-Based Information and Decision Fusion for Military Convoy Operations. MILCOM 2014: 1387-1392 - [c26]Jin-Hee Cho, Ananthram Swami:
Dynamics of Uncertain Opinions in Social Networks. MILCOM 2014: 1627-1632 - [c25]Xin Chen, Jin-Hee Cho, Sencun Zhu:
GlobalTrust: An attack-resilient reputation system for tactical networks. SECON 2014: 275-283 - [c24]Dong-Uk Lee, Kyung Whan Kim, Kwan-Weon Kim, Kang Seol Lee, Sang Jin Byeon, Jin-Hee Cho, Han Ho Jin, Sang Kyun Nam, Jaejin Lee, Jun Hyun Chun, Sung-Joo Hong:
An exact measurement and repair circuit of TSV connections for 128GB/s high-bandwidth memory(HBM) stacked DRAM. VLSIC 2014: 1-2 - 2013
- [c23]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Integrated social and quality of service trust management of mobile groups in ad hoc networks. ICICS 2013: 1-5 - [c22]Jin-Hee Cho, Ing-Ray Chen, Yating Wang, Kevin S. Chan:
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. ICPADS 2013: 372-379 - [c21]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami:
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives. MILCOM 2013: 1862-1867 - [c20]Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, Ananthram Swami, Prasant Mohapatra:
Trust and independence aware decision fusion in distributed networks. PerCom Workshops 2013: 481-486 - [c19]Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:
Composite trust-based public key management in mobile ad hoc networks. SAC 2013: 1949-1956 - 2012
- [c18]Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami:
A Provenance-Based Trust Model for Delay Tolerant Networks. IFIPTM 2012: 52-67 - [c17]Kevin S. Chan, Jin-Hee Cho, Sibel Adali:
Composite Trust Model for an Information Sharing Scenario. UIC/ATC 2012: 439-446 - 2011
- [c16]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Trust-Based Intrusion Detection in Wireless Sensor Networks. ICC 2011: 1-6 - [c15]Jin-Hee Cho, Ananthram Swami:
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach. IFIPTM 2011: 190-205 - [c14]Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. IFIPTM 2011: 265-276 - [c13]Jin-Hee Cho, Ananthram Swami, Trevor Cook:
Combinatorial auction-based multiple dynamic mission assignment. MILCOM 2011: 1327-1332 - [c12]Gulustan Dogan, Theodore Brown, Kannan Govindan, Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Prasant Mohapatra, Jin-Hee Cho:
Evaluation of network trust using provenance based on distributed local intelligence. MILCOM 2011: 1493-1498 - [c11]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical trust management for wireless sensor networks and its application to trust-based routing. SAC 2011: 1732-1738 - 2010
- [c10]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Trust Management for Encounter-Based Routing in Delay Tolerant Networks. GLOBECOM 2010: 1-6 - [c9]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs. IFIPTM 2010: 141-156 - 2009
- [c8]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. CSE (2) 2009: 641-650 - [c7]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of distributed intrusion detection protocols for mobile group communication systems. IPDPS 2009: 1-8 - 2008
- [c6]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks. AINA Workshops 2008: 644-649 - [c5]Jin-Hee Cho, Ing-Ray Chen:
Effect of intrusion detection on secure group communications in hierarchically structured group architectures. LCN 2008: 942-949 - [c4]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. PRDC 2008: 289-296 - 2006
- [c3]Jihyun Lee, Jin-Hee Cho, Kyung-Min Park, Jin-Sam Kim:
Organization of Embedded System Development Methodology for Developing Product Family. IASTED Conf. on Software Engineering 2006: 154-159 - [c2]Jihyun Lee, Jin-Sam Kim, Jin-Hee Cho:
A series of development methodologies for a variety of systems in Korea. ICSE 2006: 612-615 - [c1]Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang:
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks. SUTC (1) 2006: 411-419
Informal and Other Publications
- 2024
- [i32]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Decision Theory-Guided Deep Reinforcement Learning for Fast Learning. CoRR abs/2402.06023 (2024) - [i31]Dian Chen, Paul Yang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms. CoRR abs/2402.10280 (2024) - [i30]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. CoRR abs/2404.10980 (2024) - [i29]Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong, Feng Chen, Jin-Hee Cho:
Winning the Social Media Influence Battle: Uncertainty-Aware Opinions to Understand and Spread True Information via Competitive Influence Maximization. CoRR abs/2404.18826 (2024) - [i28]Xinyi Zhang, Pamela J. Wisniewski, Jin-Hee Cho, Lifu Huang, Sang Won Lee:
Generating A Crowdsourced Conversation Dataset to Combat Cybergrooming. CoRR abs/2405.13154 (2024) - [i27]Mohammad Beigi, Sijia Wang, Ying Shen, Zihao Lin, Adithya Kulkarni, Jianfeng He, Feng Chen, Ming Jin, Jin-Hee Cho, Dawei Zhou, Chang-Tien Lu, Lifu Huang:
Rethinking the Uncertainty: A Critical Review and Analysis in the Era of Large Language Models. CoRR abs/2410.20199 (2024) - 2023
- [i26]Zhen Guo, Qi Zhang, Xinwei An, Qisheng Zhang, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information. CoRR abs/2302.10195 (2023) - [i25]Dong Hyun Jeong, Jin-Hee Cho, Feng Chen, Audun Jøsang, Soo-Yeon Ji:
Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation. CoRR abs/2310.01580 (2023) - 2022
- [i24]Barry Menglong Yao, Aditya Shah, Lichao Sun, Jin-Hee Cho, Lifu Huang:
End-to-End Multimodal Fact-Checking and Explanation Generation: A Challenging Dataset and Models. CoRR abs/2205.12487 (2022) - [i23]Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Feng Chen, Jin-Hee Cho, Qi Zhang, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang:
A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning. CoRR abs/2206.05675 (2022) - [i22]Qisheng Zhang, Zhen Guo, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration. CoRR abs/2212.06343 (2022) - 2021
- [i21]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats. CoRR abs/2101.02863 (2021) - [i20]Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey. CoRR abs/2101.10121 (2021) - [i19]Huashan Chen, Richard B. Garcia-Lebron, Zheyuan Sun, Jin-Hee Cho, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Software Diversity. CoRR abs/2111.10090 (2021) - 2020
- [i18]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey. CoRR abs/2004.07678 (2020) - [i17]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020) - [i16]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation. CoRR abs/2007.08469 (2020) - [i15]Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore:
Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey. CoRR abs/2007.08688 (2020) - [i14]Xujiang Zhao, Feng Chen, Shu Hu, Jin-Hee Cho:
Uncertainty Aware Semi-Supervised Learning on Graph Data. CoRR abs/2010.12783 (2020) - [i13]Zelin Wan, Yash Mahajan, Beom Woo Kang, Terrence J. Moore, Jin-Hee Cho:
A Survey on Centrality Metrics and Their Implications in Network Resilience. CoRR abs/2011.14575 (2020) - [i12]Yibo Hu, Yuzhe Ou, Xujiang Zhao, Jin-Hee Cho, Feng Chen:
Multidimensional Uncertainty-Aware Evidential Neural Networks. CoRR abs/2012.13676 (2020) - 2019
- [i11]Benjamin D. Horne, Dorit Nevo, John O'Donovan, Jin-Hee Cho, Sibel Adali:
Rating Reliability and Bias in News Articles: Does AI Assistance Help Everyone? CoRR abs/1904.01531 (2019) - [i10]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. CoRR abs/1906.05395 (2019) - [i9]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. CoRR abs/1908.00324 (2019) - [i8]Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, Dong Seong Kim:
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things. CoRR abs/1908.00327 (2019) - [i7]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. CoRR abs/1909.08092 (2019) - [i6]Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Deep Learning for Predicting Dynamic Uncertain Opinions in Network Data. CoRR abs/1910.05640 (2019) - [i5]Xujiang Zhao, Yuzhe Ou, Lance M. Kaplan, Feng Chen, Jin-Hee Cho:
Quantifying Classification Uncertainty using Regularized Evidential Neural Networks. CoRR abs/1910.06864 (2019) - 2018
- [i4]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - [i3]Jin-Hee Cho, Sibel Adali:
Is Uncertainty Always Bad?: Effect of Topic Competence on Uncertain Opinions. CoRR abs/1807.06519 (2018) - [i2]Dilli P. Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. CoRR abs/1807.09343 (2018) - [i1]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. CoRR abs/1810.07260 (2018)
Coauthor Index
aka: Dan Dongseong Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint