Resource pricing game in geo-distributed clouds H Roh, C Jung, W Lee, DZ Du Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE …, 2013 | 57 | 2013 |
Cooperative bridges: topology control in cooperative wireless ad hoc networks J Yu, H Roh, W Lee, S Pack, DZ Du Proceedings of the 29th IEEE Conference on Computer Communications (IEEE …, 2010 | 43 | 2010 |
Topology Control in Cooperative Wireless Ad-Hoc Networks J Yu, H Roh, W Lee, S Pack, DZ Du IEEE Journal on Selected Areas in Communications 30 (9), 1771-1779, 2012 | 37 | 2012 |
A Stackelberg Game for Cooperative Cognitive Radio Network with Active SUs H Roh, C Jung, W Lee, DZ Du Proceedings of the 2013 2nd International Conference on Computing …, 2013 | 33* | 2013 |
Multisource wireless energy harvesting-based medium access control for rechargeable sensors C Shao, H Roh, T Kim, W Lee IEEE Transactions on Consumer Electronics 62 (2), 119-127, 2016 | 21 | 2016 |
The useful impact of carrier aggregation: A measurement study in South Korea for commercial LTE-Advanced networks S Lee, S Hyeon, J Kim, H Roh, W Lee IEEE vehicular technology magazine 12 (1), 55-62, 2017 | 20 | 2017 |
Tagora: A collision-exploitative RFID authentication protocol based on cross-layer approach H Park, H Roh, W Lee IEEE Internet of Things Journal 7 (4), 3571-3585, 2020 | 18 | 2020 |
Encrypted malware traffic detection using incremental learning I Lee, H Roh, W Lee IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 16 | 2020 |
PolarScout: Wi-Fi interference-resilient ZigBee communication via shell-shaping C Shao, H Park, H Roh, W Lee, H Kim IEEE/ACM Transactions on Networking 28 (4), 1587-1600, 2020 | 16 | 2020 |
Joint flow and virtual machine placement in hybrid cloud data centers H Roh, C Jung, K Kim, S Pack, W Lee Journal of Network and Computer Applications 85, 4-13, 2017 | 15 | 2017 |
BuSAR: Bluetooth slot availability randomization for better coexistence with dense Wi-Fi networks C Shao, H Roh, W Lee IEEE Transactions on Mobile Computing 20 (3), 846-860, 2019 | 13 | 2019 |
Poster: Feasibility of malware traffic analysis through tls-encrypted flow visualization D Kim, J Han, J Lee, H Roh, W Lee 2020 IEEE 28th International Conference on Network Protocols (ICNP), 1-2, 2020 | 12 | 2020 |
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives C Shao, H Roh, W Lee Journal of Network and Computer Applications 123, 23-31, 2018 | 12 | 2018 |
Price-based tethering for cooperative networking J Lee, C Shao, H Roh, W Lee Proceedings of the 27th International Conference on Information Networking …, 2013 | 12 | 2013 |
Aspiration Level-Based Strategy Dynamics on the Coexistence of Spectrum Cooperation and Leasing C Shao, H Roh, W Lee IEEE Communications Letters 18 (1), 70-73, 2014 | 11 | 2014 |
A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers C Oh, J Ha, H Roh Applied Sciences 12 (1), 155, 2021 | 10 | 2021 |
Secure and lightweight subflow establishment of multipath-TCP G Noh, H Park, H Roh, W Lee Ieee Access 7, 177438-177448, 2019 | 9 | 2019 |
DOTA: Physical-layer decomposing and threading for ZigBee/Wi-Fi co-transmission C Shao, H Park, H Roh, W Lee IEEE Wireless Communications Letters 8 (1), 133-136, 2018 | 8 | 2018 |
Revisiting bluetooth adaptive frequency hopping prediction with a ubertooth J Lee, C Park, H Roh 2021 International Conference on Information Networking (ICOIN), 715-717, 2021 | 7 | 2021 |
SCBF: Exploiting a collision for authentication in backscatter networks H Park, J Yu, H Roh, W Lee IEEE Communications Letters 21 (6), 1413-1416, 2017 | 7 | 2017 |