Zobrazeno 1 - 10
of 189
pro vyhledávání: '"DaeHun Nyang"'
Publikováno v:
BMC Medical Imaging, Vol 22, Iss 1, Pp 1-16 (2022)
Abstract Background Computer-aided methods for analyzing white blood cells (WBC) are popular due to the complexity of the manual alternatives. Recent works have shown highly accurate segmentation and detection of white blood cells from microscopic bl
Externí odkaz:
https://doaj.org/article/80278a286bc040a68afdc58a5a9e04cd
Publikováno v:
IEEE Access, Vol 10, Pp 86038-86056 (2022)
Recent natural language processing (NLP) techniques have accomplished high performance on benchmark data sets, primarily due to the significant improvement in the performance of deep learning. The advances in the research community have led to great
Externí odkaz:
https://doaj.org/article/2bcfd20838384519abcddf86c627306f
Autor:
Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh
Publikováno v:
IEEE Access, Vol 10, Pp 5801-5823 (2022)
Machine Learning (ML) based Network Intrusion Systems (NIDSs) operate on flow features which are obtained from flow exporting protocols (i.e., NetFlow). Recent success of ML and Deep Learning (DL) based NIDS solutions assume such flow information (e.
Externí odkaz:
https://doaj.org/article/fc1c19fed78949fcb6af33d98885b242
Autor:
Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, DaeHun Nyang, Joongheon Kim, David Mohaisen
Publikováno v:
IET Blockchain, Vol 1, Iss 1, Pp 56-64 (2021)
Abstract Blockchain‐based audit systems suffer from low scalability and high message complexity. The root cause of these shortcomings is the use of “Practical Byzantine Fault Tolerance” (PBFT) consensus protocol in those systems. Alternatives t
Externí odkaz:
https://doaj.org/article/742700303d6e4627a27c24e1c4532ee8
Autor:
Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen
Publikováno v:
IEEE Access, Vol 8, Pp 111368-111380 (2020)
Proxy servers act as an intermediary and a gateway between users and other servers on the Internet, and have many beneficial applications targeting the privacy of users, including bypassing server-side blocking, regional restrictions, etc. Despite th
Externí odkaz:
https://doaj.org/article/28503f522c9f48cdbbae1cd8e5abde9d
Autor:
Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Sung Choi, Saeed Salem, DaeHun Nyang, David Mohaisen
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 7, Iss 23 (2020)
Enterprises are increasingly considering security as an added cost, making it necessary for those enterprises to see a tangible incentive in adopting security measures. Despite data breach laws, prior studies have suggested that only 4% of reported d
Externí odkaz:
https://doaj.org/article/6e39bbbab3e74274b65b5d6d1818f07e
Publikováno v:
ETRI Journal, Vol 41, Iss 5, Pp 557-559 (2019)
We are facing a big data world, embedded with interconnected IoT (Internet of Things) devices that generate large volumes of data. They pose a significant challenge to academia and industries focused on digital security: A variety of new malware and
Externí odkaz:
https://doaj.org/article/be5228f67c1c4d518fafdaf8a6d20d2c
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 5, Iss 16 (2018)
Using runtime execution artifacts to identify malware and its associated “family” is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interact
Externí odkaz:
https://doaj.org/article/61ece09cf294472493ff5067684f959a
Publikováno v:
IEEE Transactions on Mobile Computing. 21:3443-3454
In this paper, we provide the design and implementation of UOIT, a text entry method optimized for smartwatches. UOIT uses only one page where a user can see and tap directly for entry without any additional actions, such as zoom-in/zoom-out and swip
Autor:
Rhongho Jang, Afsah Anwar, DaeHun Nyang, David Mohaisen, Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3432-3447
Given the limited scalability of dynamic analysis, static analysis, such as the use of Control Flow Graph (CFG)-based features, is widely used by machine learning algorithms for malware analysis and detection. However, recent studies have shown these