default search action
Inkyu Bang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Han Seung Jang, Munseop Yun, Taehoon Kim, Inkyu Bang:
Non-orthogonal resource scheduling with enhanced preamble detection method for cellular random access networks. ICT Express 10(5): 1117-1123 (2024) - [c16]Inkyu Bang, Seong Ho Chae, Taehoon Kim:
Artificial Noise Assisted Secure Transmission for Low Earth Orbit Satellite Communications. ICEIC 2024: 1-2 - [c15]Taehoon Kim, Manjoro Ashleigh Tatenda, Soo Mee Kim, Inkyu Bang:
Channel-Aided Random Access for Supporting Secure Edge Computing. ICEIC 2024: 1-3 - [c14]Edward Kwao, Jaehun Lee, Jinmo Park, Byeongdo Hong, Taehoon Kim, Inkyu Bang:
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment. WISEC 2024: 248-253 - 2023
- [j20]Inkyu Bang, Venissa Adzo Sedem Manya, Jonghyun Kim, Taehoon Kim:
On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures. IEEE Access 11: 5517-5527 (2023) - [j19]Emmanuel Obeng Frimpong, Taehoon Kim, Inkyu Bang:
Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel. ICT Express 9(4): 728-733 (2023) - [j18]Emmanuel Obeng Frimpong, BongHwan Oh, Taehoon Kim, Inkyu Bang:
Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks. Sensors 23(4): 1881 (2023) - [j17]Taehoon Kim, Seong Ho Chae, Jin-Taek Lim, Inkyu Bang:
Resource-Efficient Parallelized Random Access for Reliable Connection Establishment in Cellular IoT Networks. Sensors 23(8): 3819 (2023) - 2022
- [j16]Jin-Taek Lim, Taehoon Kim, Inkyu Bang:
Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks. IEEE Access 10: 19825-19835 (2022) - [j15]Inkyu Bang, Jong-Hyun Kim, Taehoon Kim:
Physical-layer security enhancement using artificial noise for D2D communication in vehicular platooning networks. ICT Express 8(4): 600-605 (2022) - [j14]Inkyu Bang, Taehoon Kim, Han Seung Jang, Dan Keun Sung:
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks. IEEE Trans. Inf. Forensics Secur. 17: 1131-1144 (2022) - 2021
- [j13]Taehoon Kim, Han Seung Jang, Inkyu Bang, Kab Seok Ko:
Access Priority Provisioning Based on Random Access Parallelization for Prioritized Cellular IoT. IEEE Access 9: 111814-111822 (2021) - [c13]Inkyu Bang, Taehoon Kim, Han Seung Jang, Dan Keun Sung:
Impact of Uplink Power Control on User Location Tracking Attacks in Cellular Networks. ICC 2021: 1-6 - 2020
- [j12]Inkyu Bang, Taehoon Kim:
Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems. IEEE Access 8: 197644-197653 (2020) - [j11]Taehoon Kim, Inkyu Bang:
Random Access Parallelization Based on Preamble Diversity for Cellular IoT Networks. IEEE Commun. Lett. 24(1): 188-192 (2020) - [j10]Seong Ho Chae, Inkyu Bang, Hoojin Lee:
Physical Layer Security of QSTBC With Power Scaling in MIMO Wiretap Channels. IEEE Trans. Veh. Technol. 69(5): 5647-5651 (2020)
2010 – 2019
- 2019
- [j9]Inkyu Bang, Bang Chul Jung:
Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers. IEEE Access 7: 127078-127089 (2019) - [j8]Taehoon Kim, Inkyu Bang:
An Enhanced Random Access With Preamble-Assisted Short-Packet Transmissions for Cellular IoT Communications. IEEE Commun. Lett. 23(6): 1081-1084 (2019) - [j7]Inkyu Bang, Hyunwoo Nam, Woohyuk Chang, Taehoon Kim, Jong-Myung Woo, Choul-Young Kim, Tae-Won Ban, Pangun Park, Bang Chul Jung:
Channel Measurement and Feasibility Test for Wireless Avionics Intra-Communications. Sensors 19(6): 1294 (2019) - [c12]Yongjae Kim, Bang Chul Jung, Inkyu Bang, Youngnam Han:
Adaptive Proportional Fairness Scheduling for SWIPT-Enabled Multicell Downlink Networks. WCNC 2019: 1-6 - [c11]Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee:
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information. WiSec 2019: 239-244 - [i2]Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee:
SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). CoRR abs/1904.01350 (2019) - [i1]Taehoon Kim, Inkyu Bang:
An Enhanced Random Access with Preamble-Assisted Short-Packet Transmissions for Cellular IoT Communications. CoRR abs/1904.03414 (2019) - 2018
- [j6]Hyunwoo Nam, Kab Seok Ko, Inkyu Bang, Bang Chul Jung:
Achievable Rate Analysis of Opportunistic Transmission in Bursty Interference Networks. IEEE Commun. Lett. 22(3): 654-657 (2018) - [j5]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Artificial Noise-Aided User Scheduling From the Perspective of Secrecy Outage Probability. IEEE Trans. Veh. Technol. 67(8): 7816-7820 (2018) - 2017
- [j4]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Artificial Noise-Aided User Scheduling for Optimal Secrecy Multiuser Diversity. IEEE Commun. Lett. 21(3): 528-531 (2017) - [j3]Taehoon Kim, Inkyu Bang, Dan Keun Sung:
An Enhanced PRACH Preamble Detector for Cellular IoT Communications. IEEE Commun. Lett. 21(12): 2678-2681 (2017) - [j2]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Adaptive Multiuser Scheduling for Simultaneous Wireless Information and Power Transfer in a Multicell Environment. IEEE Trans. Wirel. Commun. 16(11): 7460-7474 (2017) - 2016
- [c10]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Secrecy multiuser diversity for distributed antenna systems from the perspective of user-scaling law. ICC 2016: 1-6 - 2015
- [j1]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Effects of Multiple Antennas and Imperfect Channel Knowledge on Secrecy Multiuser Diversity. IEEE Commun. Lett. 19(9): 1564-1567 (2015) - [c9]JaYeong Kim, Inkyu Bang, Dan Keun Sung, Yunjung Yi, Byoung-Hoon Kim:
Design of a multi-variable QoE function based on the remaining battery energy. PIMRC 2015: 976-980 - 2014
- [c8]Inkyu Bang, Su Min Kim, Dan Keun Sung:
Opportunistic user selection with adaptive jamming for secure communication in heterogeneous networks. PIMRC 2014: 42-46 - [c7]Taehoon Kim, Inkyu Bang, Dan Keun Sung:
Design criteria on a mmWave-based small cell with directional antennas. PIMRC 2014: 103-107 - [c6]Taehoon Kim, Kab Seok Ko, Inkyu Bang, Dan Keun Sung:
A random access scheme based on a special preamble for supporting emergency alarms. WCNC 2014: 1768-1773 - [c5]Taehoon Kim, Eunmi Chu, Inkyu Bang, Seong Hwan Kim, Dan Keun Sung:
Effect of control and data frame overheads on the capacity scaling of a hierarchical cooperation scheme. WCNC 2014: 1996-2001 - 2013
- [c4]Inkyu Bang, Kab Seok Ko, Dan Keun Sung:
A user-pairing based resource allocation scheme for a large number of devices in M2M communications. PIMRC 2013: 1554-1558 - [c3]Eunmi Chu, Inkyu Bang, Seong Hwan Kim, Dan Keun Sung:
Self-organizing and self-healing mechanisms in cooperative small-cell networks. PIMRC 2013: 1576-1581 - [c2]Inkyu Bang, Eunmi Chu, Taehoon Kim, Seong Hwan Kim, Dan Keun Sung:
Aggregate throughput maximization in a hierarchical cooperation scheme under consideration of packet arrival rate, control and data overhead. WCNC 2013: 422-427 - 2012
- [c1]Inkyu Bang, Seong Hwan Kim, Su Min Kim, Dan Keun Sung:
Energy-efficient subchannel allocation scheme based on adaptive base station cooperation in downlink cellular networks. WCNC 2012: 2434-2439
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint