Author of the publication

Frame-Selective Wireless Attack Using Deep-Learning-Based Length Prediction.

, , , and . SECON, page 442-443. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment., , and . ICAIIC, page 840-845. IEEE, (2023)The Magnetic Energy Harvester With Improved Power Density Using Saturable Magnetizing Inductance Model for Maintenance Applications Near High Voltage Power Line., , , , , , , , , and 3 other author(s). IEEE Access, (2021)Majority Voting-Based MAC Protocol for Exploiting Link-Layer Diversity in Wireless Networks., , , and . Sensors, 21 (8): 2706 (2021)Fabrication and measurements of direct contact type RF MEMS switch.. IEICE Electron. Express, 4 (10): 319-325 (2007)Frame-Selective Wireless Attack Using Deep-Learning-Based Length Prediction., , , and . SECON, page 442-443. IEEE, (2018)FTTH Deployment Status & Strategy in Korea: GW-PON Based FTTH Field Trial and Reach Extension Strategy of FTTH in Korea., , , and . GLOBECOM, page 5615-5617. IEEE, (2008)Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures., , and . IEEE Access, (2020)Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network., , , , , and . EuCNC/6G Summit, page 538-542. IEEE, (2023)Power Allocation for Multi-Hop Transmission Using Unsaturated Full-Duplex Relay Network Model., , , and . IEEE Wirel. Commun. Lett., 7 (6): 906-909 (2018)Ferrite Position Identification System Operating With Wireless Power Transfer for Intelligent Train Position Detection., , , , and . IEEE Trans. Intell. Transp. Syst., 20 (1): 374-382 (2019)