Old Web
English
Sign In
Acemap
>
authorDetail
>
Hun Jeong Kang
Hun Jeong Kang
University of Minnesota
Computer science
Computer network
Overlay network
Peer-to-peer
Distributed hash table
6
Papers
120
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (6)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
A Scalable Learning Model for Multi-seasonal Time Series Forecasting
2021
Hun Jeong Kang
Christopher Kallas
Myung Hwan Park
Jinoh Kim
Show All
Source
Cite
Save
Citations (0)
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
2011
ICUIMC | International Conference on Ubiquitous Information Management and Communication
Abedelaziz Mohaisen
Tamer AbuHmed
Hun Jeong Kang
Yongdae Kim
DaeHun Nyang
Show All
Source
Cite
Save
Citations (5)
Secure and robust overlay content distribution
2010
Yongdae Kim
Nicholas Hopper
Hun Jeong Kang
Show All
Source
Cite
Save
Citations (1)
Why Kad lookup fails
2009
P2P | International Conference on Peer-to-Peer Computing
Hun Jeong Kang
Eric Chan-Tin
Nicholas Hopper
Yongdae Kim
Show All
Source
Cite
Save
Citations (27)
Towards complete node enumeration in a peer-to-peer botnet
2009
CCS | Computer and Communications Security
Brent ByungHoon Kang
Eric Chan-Tin
Christopher P. Lee
James Tyra
Hun Jeong Kang
Chris Nunnery
Zachariah Wadler
Greg Sinclair
Nicholas Hopper
David Dagon
Yongdae Kim
Show All
Source
Cite
Save
Citations (55)
SIP-based VoIP traffic behavior profiling and its applications
2007
Hun Jeong Kang
Zhi-Li Zhang
Supranamaya Ranjan
Antonio Nucci
Show All
Source
Cite
Save
Citations (32)
1