Follow
Heejun Roh
Title
Cited by
Cited by
Year
Resource pricing game in geo-distributed clouds
H Roh, C Jung, W Lee, DZ Du
Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE …, 2013
562013
Cooperative bridges: topology control in cooperative wireless ad hoc networks
J Yu, H Roh, W Lee, S Pack, DZ Du
Proceedings of the 29th IEEE Conference on Computer Communications (IEEE …, 2010
432010
Topology Control in Cooperative Wireless Ad-Hoc Networks
J Yu, H Roh, W Lee, S Pack, DZ Du
IEEE Journal on Selected Areas in Communications 30 (9), 1771-1779, 2012
372012
A Stackelberg Game for Cooperative Cognitive Radio Network with Active SUs
H Roh, C Jung, W Lee, DZ Du
Proceedings of the 2013 2nd International Conference on Computing …, 2013
33*2013
Tagora: A collision-exploitative RFID authentication protocol based on cross-layer approach
H Park, H Roh, W Lee
IEEE Internet of Things Journal 7 (4), 3571-3585, 2020
222020
Multisource wireless energy harvesting-based medium access control for rechargeable sensors
C Shao, H Roh, T Kim, W Lee
IEEE Transactions on Consumer Electronics 62 (2), 119-127, 2016
222016
Encrypted malware traffic detection using incremental learning
I Lee, H Roh, W Lee
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
212020
PolarScout: Wi-Fi interference-resilient ZigBee communication via shell-shaping
C Shao, H Park, H Roh, W Lee, H Kim
IEEE/ACM Transactions on Networking 28 (4), 1587-1600, 2020
202020
The useful impact of carrier aggregation: A measurement study in South Korea for commercial LTE-Advanced networks
S Lee, S Hyeon, J Kim, H Roh, W Lee
IEEE vehicular technology magazine 12 (1), 55-62, 2017
202017
Joint flow and virtual machine placement in hybrid cloud data centers
H Roh, C Jung, K Kim, S Pack, W Lee
Journal of Network and Computer Applications 85, 4-13, 2017
172017
A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers
C Oh, J Ha, H Roh
Applied Sciences 12 (1), 155, 2021
142021
Poster: Feasibility of malware traffic analysis through tls-encrypted flow visualization
D Kim, J Han, J Lee, H Roh, W Lee
2020 IEEE 28th International Conference on Network Protocols (ICNP), 1-2, 2020
132020
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives
C Shao, H Roh, W Lee
Journal of Network and Computer Applications 123, 23-31, 2018
132018
Price-based tethering for cooperative networking
J Lee, C Shao, H Roh, W Lee
Proceedings of the 27th International Conference on Information Networking …, 2013
132013
BuSAR: Bluetooth slot availability randomization for better coexistence with dense Wi-Fi networks
C Shao, H Roh, W Lee
IEEE Transactions on Mobile Computing 20 (3), 846-860, 2019
122019
Secure and lightweight subflow establishment of multipath-TCP
G Noh, H Park, H Roh, W Lee
Ieee Access 7, 177438-177448, 2019
112019
Aspiration Level-Based Strategy Dynamics on the Coexistence of Spectrum Cooperation and Leasing
C Shao, H Roh, W Lee
IEEE Communications Letters 18 (1), 70-73, 2014
112014
Predictive prefetching based on user interaction for web applications
M Joo, Y An, H Roh, W Lee
IEEE Communications Letters 25 (3), 821-824, 2020
92020
SCBF: Exploiting a collision for authentication in backscatter networks
H Park, J Yu, H Roh, W Lee
IEEE Communications Letters 21 (6), 1413-1416, 2017
92017
DOTA: Physical-layer decomposing and threading for ZigBee/Wi-Fi co-transmission
C Shao, H Park, H Roh, W Lee
IEEE Wireless Communications Letters 8 (1), 133-136, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20