Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yongchul Kim is active.

Publication


Featured researches published by Yongchul Kim.


Mobile Information Systems | 2018

Asynchronous Channel-Hopping Scheme under Jamming Attacks

Yongchul Kim; Young-Hyun Oh; Jungho Kang

Cognitive radio networks (CRNs) are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs) to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH) schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH). Then, we introduce a novel sequence sensing jamming attack (SSJA) model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS) that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.


Computers & Security | 2018

Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

Hyun Kwon; Yongchul Kim; Ki-Woong Park; Hyunsoo Yoon; Daeseon Choi

Abstract Deep neural networks (DNNs) have been applied in several useful services, such as image recognition, intrusion detection, and pattern analysis of machine learning tasks. Recently proposed adversarial examples-slightly modified data that lead to incorrect classification-are a severe threat to the security of DNNs. In some situations, however, an adversarial example might be useful, such as when deceiving an enemy classifier on the battlefield. In such a scenario, it is necessary that a friendly classifier not be deceived. In this paper, we propose a friend-safe adversarial example, meaning that the friendly machine can classify the adversarial example correctly. To produce such examples, a transformation is carried out to minimize the probability of incorrect classification by the friend and that of correct classification by the adversary. We suggest two configurations for the scheme: targeted and untargeted class attacks. We performed experiments with this scheme using the MNIST and CIFAR10 datasets. Our proposed method shows a 100% attack success rate and 100% friend accuracy with only a small distortion: 2.18 and 1.54 for the two respective MNIST configurations, and 49.02 and 27.61 for the two respective CIFAR10 configurations. Additionally, we propose a new covert channel scheme and a mixed battlefield application for consideration in further applications.


international conference on information and communication technology convergence | 2013

MAC prioritization scheme resolving unfairness problem

Sunghwan Cho; Wooyoung Hong; Yeongyoon Choi; Yongchul Kim; Wontaek Lim

IEEE 802.11e is an extension of IEEE 802.11 for the Quality of Service (QoS) enhancement for wireless LAN application using MAC layer priority scheme. The IEEE 802.11e standard divides the network traffic into four different categories by the traffic type. Delay-sensitive applications need a high media access priority, which can be achieved by using different MAC parameters. The priority scheme is also used for resolving the unfairness and bottleneck problems of multihop wireless networks, where nodes operate as host or relay nodes. It is well-known that these problems occur since there may exist overloaded nodes that the packets from various source nodes converge on. Fine control of access opportunity at MAC layer can deal with this unfairness situation. In this paper, we provide an analysis of the priority scheme based on CWmin which can induce a required throughput ratio, and verify it with simulation results. Also, the simulation results are given to verify that the unfairness and bottleneck problems in multihop networks are solved by using the proposed priority scheme.


Journal of Communications | 2013

Generalized Hybrid Scheduling Scheme for Multihop Relaying WiMAX Networks

Yongchul Kim; Mihail L. Sichitiu

In this paper, we propose a heuristic scheduling scheme, named hybrid resource allocation scheme that can reduce the time complexity of scheduling scheme and im- prove the efficiency of resource utilization while minimizing interference. We first focus on the two-hop relaying scenario, since this scenario has the largest throughput gain, and then explore an extension of the proposed hybrid scheme to a general multihop relaying scenario. We evaluate the performance of our proposed hybrid scheme by comparing it with the optimal scheduling scheme as well as the well- known two schemes, namely, orthogonal and overlapped in terms of cell throughput, outage rate, and computation time. The numerical results show that the proposed hybrid scheme achieves a higher throughput than the orthogonal scheme while maintaining as low an outage rate as orthogonal scheme. In addition, the computational time is significantly less than the optimal scheme at the expense of minimal throughput degradation.


The Journal of Korean Institute of Communications and Information Sciences | 2012

Interference Aware Cost Effective Coverage Extension in Multihop Relay Networks

Yongchul Kim; Wontaek Lim; Sunghwan Cho


The Journal of Korean Institute of Communications and Information Sciences | 2015

Channel-Hopping Scheme for Enhancing Fairness Performance under Smart Jammer Attacks in Tactical WLANs

Yongchul Kim


IEICE Transactions on Information and Systems | 2018

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

Hyun Kwon; Yongchul Kim; Ki-Woong Park; Hyunsoo Yoon; Daeseon Choi


IEEE Access | 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

Hyun Kwon; Yongchul Kim; Ki-Woong Park; Hyunsoo Yoon; Daeseon Choi


한국통신학회 학술대회논문집 | 2015

A study on How to Find a Hopping Sequence of a Smart Jammer in IEEE 802.11 WLANs

Clément Delattre; Yongchul Kim


2014 IEEE Asia Pacific Conference on Wireless and Mobile | 2014

Cooperative Analog and Digital (CANDI) Time Synchronization for large two-dimension multihop networks

Sunghwan Cho; Yeongyoon Choi; Wontaek Lim; Yongchul Kim

Collaboration


Dive into the Yongchul Kim's collaboration.

Top Co-Authors

Avatar

Daeseon Choi

Kongju National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wontaek Lim

Korea Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jungho Kang

Korea Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mihail L. Sichitiu

North Carolina State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge