Publications

Publications by the IIS Laboratory in reverse chronological order.

Note:

  • Underline indicates IIS Lab members.
  • † indicates corresponding author.

2025

  1. SAC
    DDSNet: A Lightweight Dense Depthwise Separable Network for Tumor Classification
    An Huang , Junggab Son , and Zuobin Xiong
    In 40th ACM/SIGAPP Symposium on Applied Computing, Mar 2025

2024

  1. SecureComm
    Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts
    Shubham Joshi , Dillon Davidson , Yeonjoon Lee , and 2 more authors
    In 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Mar 2024
  2. SecureComm
    Anti-EMP: Encrypted Malware Packets Filtering Algorithm Leveraging Ciphertext Patterns under Zero Knowledge Setting
    Junggab Son , Jeehyung Kim , Jemin Ahn , and 3 more authors
    In 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Mar 2024
  3. SecureComm
    Encoder-based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection
    Jemin Ahn , Dorian Akhavan , Woohwan Jung , and 2 more authors
    In 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Mar 2024
  4. ECML-PKDD
    FCFL: A Fairness Compensation-based Federated Learning Scheme with Accumulated Queues
    Lingfu Wang , Zuobin Xiong , Chunguang Luo , and 2 more authors
    In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Mar 2024
  5. ICCCN
    Appro-Fun: Approximate Machine Unlearning in Federated Setting
    Zuobin Xiong , Wei Li , and Zhipeng Cai
    In 2024 International Conference on Computer Communications and Networks (ICCCN), Mar 2024

2023

  1. TDSC
    Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party
    Victor Youdom Kemmoe , Youngseok Kwon , Rasheed Hussain , and 2 more authors
    IEEE Transactions on Dependable and Secure Computing, Jul 2023
  2. IoT-J
    Blockchain-Based One-Time Authentication for Secure V2X Communication Against Insiders and Authority Compromise Attacks
    Jaewon Noh , Youngseok Kwon , Junggab Son , and 1 more author
    IEEE Internet of Things Journal, Jul 2023
  3. Drones
    Cooperative Obstacle-Aware Surveillance for Virtual Emotion Intelligence with Low Energy Configuration
    Seunghyeon Lee , Sooeon Lee , Yumin Choi , and 3 more authors
    Drones, Feb 2023
  4. DCN
    3-multi Ranked Searchable Encryption With Enhanced Security in Cloud Computing
    YeEun Kim , Junggab Son , Reza M. Parizi , and 2 more authors
    Digital Communications and Networks, Apr 2023
  5. Cluster Comp.
    An Empirical Analysis of Image Augmentation Against Model Inversion Attack in Federated Learning
    Seunghyeon Shin , Mallika Boyapati , Kun Suo , and 2 more authors
    Cluster Computing, Apr 2023

2022

  1. BIBM
    Defensive Adversarial Training for Enhancing Robustness of ECG based User Identification
    Hongbi Jeong , Junggab Son , Hyunbum Kim , and 1 more author
    In 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Apr 2022
  2. ICMLA
    Improving Fashion Attribute Classification Accuracy with Limited Labeled Data Using Transfer Learning
    Tong Chen , Jiho Noh , Luke Cranfill , and 2 more authors
    In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), Apr 2022
  3. INFOCOM
    A Novel TCP/IP Header Hijacking Attack on SDN
    Ali Akbar Mohammadi , Rasheed Hussain , Alma Oracevic , and 4 more authors
    In IEEE Conference on Computer Communications (INFOCOM) Poster, Apr 2022
  4. Book Chapter
    Anti-Phishing Approaches in the Era of the Internet of Things
    Mallika Boyapati , Bala Chaitanya Gutta , Md Zakirul Alam Bhuiyan , and 1 more author
    In Towards a Wireless Connected World: Achievements and New Technologies, May 2022

2021

  1. SCN
    Efficient yet Robust Privacy Preservation for MPEG-DASH Based Video Streaming
    Luke Cranfill , Jeehyeong Kim , Hongkyu Lee , and 3 more authors
    Security and Communication Networks, Aug 2021
  2. MLWA
    A Federated Approach for Fine-Grained Classification of Fashion Apparel
    Tejasvi Gutta , Jiho Noh , Luke Cranfill , and 4 more authors
    Machine Learning with Application, Dec 2021
  3. CLUSTER
    Tackling Cold Start of Serverless Applications by Efficient and Adaptive Container Runtime Reusing
    Kun Suo , Junggab Son , Dazhao Cheng , and 2 more authors
    In IEEE International Conference on Cluster Computing (CLUSTER), Sep 2021
  4. COSE
    Digestive Neural Networks: A Novel Defense Strategy Against Inference Attacks in Federated Learning
    Hongkyu Lee , Jeehyeong Kim , Seyoung Ahn , and 3 more authors
    Computers & Security, Oct 2021
  5. ICC
    On Defensive Neural Networks Against Inference Attack in Federated Learning
    Hongkyu Lee , Jeehyeong Kim , Rasheed Hussain , and 2 more authors
    In IEEE International Conference on Communications (ICC) - Communication and Information Systems Security Symposium (CISS), Jun 2021

2020

  1. GlobeCom
    A Novel Resource Allocation scheme for NOMA-V2X-Femtocell with Channel Aggregation
    Jeehyeong Kim , Junggab Son , William Stone , and 3 more authors
    In Proceedings of the IEEE Global Communications Conference (IEEE GlobeCom 2020), Dec 2020
  2. IEEE Network
    Research Challenges and Security Threats to AI-driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones and Smart Devices
    Hyunbum Kim , Talel Ben-Othman , Lynda Mokdad , and 2 more authors
    IEEE Network Magazine, Nov 2020
  3. IEEE Access
    Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection
    William Stone , Daeyoung Kim , Victor Youdom Kemmoe , and 2 more authors
    IEEE ACCESS, Oct 2020
  4. SMC
    Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things
    Victor Youdom Kemmoe , Youngseok Kwon , Seunghyeon Shin , and 3 more authors
    In Proceedings of the IEEE International Conference on Internet of Things and Cybernetics (IEEE SMC 2020), Oct 2020
  5. ICCCN
    SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users’ Traffic Patterns
    Daniel Y. Karasek , Jeehyeong Kim , Victor Youdom Kemmoe , and 3 more authors
    In Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN), Aug 2020
  6. IEEE Access
    Recent Advances in Smart Contracts: A Technical Overview and State of the Art
    Victor Youdom Kemmoe , William Stone , Jeehyeong Kim , and 2 more authors
    IEEE ACCESS, Jun 2020
  7. TSUSC
    Privacy Enhanced Location Sharing for Mobile Online Social Networks
    Junggab Son , Donghyun Kim , Md Zakirul Alam Bhuiyan , and 3 more authors
    IEEE Transactions on Sustainable Computing, Apr 2020
  8. TST
    A Novel Transparent and Auditable Fog-Assisted Cloud Storage with Compensation Mechanism
    Donghyun Kim , Junggab Son , Daehee Seo , and 3 more authors
    Tsinghua Science and Technology, Feb 2020