Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Jaehyeong Ha"'
Publikováno v:
IEEE/ACM Transactions on Networking. 28:2727-2740
Network middleboxes provide the first line of defense for enterprise networks. Many of them typically inspect packet payload to filter malicious attack patterns. However, the widespread use of end-to-end cryptographic protocols designed to promote se
Publikováno v:
IEEE/ACM Transactions on Networking. 26:2174-2187
With Tor being a popular anonymity network, many attacks have been proposed to break its anonymity or leak information of a private communication on Tor. However, guaranteeing complete privacy in the face of an adversary on Tor is especially difficul
Autor:
David Earl Hostallero, Yung Yi, Hyun-ho Yeo, Jaehyeong Ha, Daewoo Kim, Kyunghwan Son, Dongsu Han, Bang Jihwan, Yoonpyo Koo, Nansol Seo, Se-eun Yoon, Kang, Wan Ju
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 42:2391-2401
본 논문에서는 인공지능을 활용하여 드론(무인 항공기)이 목표물을 추적하는 시스템의 설계, 구현, 성능 평가를 소개한다. 목표물 추적하기 위해서는 드론에서 촬영한 영상에서 목표물을
Publikováno v:
APNet
A network middlebox benefits both users and network operators by offering a wide range of security-related in-network functions, such as web firewalls and intrusion detection systems (IDS). However, the wide usage of encryption protocol restricts fun