


default search action
Wonsuk Choi 0001
Person information
- affiliation (PhD 2018): Korea University, Graduate School of Information Security, Seoul, Korea
Other persons with the same name
- Wonsuk Choi (aka: Won-Suk Choi) — disambiguation page
- Wonsuk Choi 0002 — Korea Institute of Science and Technology (KIST), Center for Bionics of Biomedical Research Institute, Seoul, Korea
- Wonsuk Choi 0003 (aka: Won-Suk Choi 0003) — Yonsei University, Department of Electrical and Electronic Engineering, Seoul, Korea
- Wonsuk Choi 0004 (aka: Won-Suk Choi 0004) — Samsung Research America, Standards and Mobility Innovation Laboratory, Plano, TX, USA (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Kyungho Joo
, Wonsuk Choi
:
Enhancing Security of HRP UWB Ranging System Based on Channel Characteristic Analysis. IEEE Internet Things J. 11(24): 39794-39808 (2024) - [j19]Kyungho Joo
, Hyo Jin Jo
, Wonsuk Choi
:
Securing Passive Keyless Entry and Start System in Modern Vehicles Based on LF-Band Signal Analysis. IEEE Internet Things J. 11(24): 40176-40190 (2024) - [j18]Yeonseon Jeong
, Hyunghoon Kim
, Seyoung Lee
, Wonsuk Choi, Dong Hoon Lee
, Hyo Jin Jo
:
In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features. IEEE Trans. Intell. Transp. Syst. 25(5): 3843-3853 (2024) - [j17]Hyunghoon Kim
, Wonsuk Choi
, Hyo Jin Jo
:
PE-Detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area Networks. IEEE Trans. Veh. Technol. 73(12): 19374-19388 (2024) - [c9]Yeji Park, Hyunsu Cho, Dong Hoon Lee, Wonsuk Choi:
Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs. ACSAC 2024: 1002-1014 - [c8]Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee, Wonsuk Choi:
ChatDEOB: An Effective Deobfuscation Method Based on Large Language Model. WISA 2024: 151-163 - 2023
- [j16]Sunwoo Lee
, Wonsuk Choi, Dong Hoon Lee:
The vibration knows who you are! A further analysis on usable authentication for smartwatch users. Comput. Secur. 125: 103040 (2023) - [j15]Seulhui Lee
, Wonsuk Choi, Dong Hoon Lee:
Protecting SOME/IP Communication via Authentication Ticket. Sensors 23(14): 6293 (2023) - [j14]Seyoung Lee
, Wonsuk Choi, Hyo Jin Jo
, Dong Hoon Lee
:
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System. IEEE Trans. Intell. Transp. Syst. 24(11): 12406-12421 (2023) - [c7]Kyungho Joo
, Dong Hoon Lee
, Yeonseon Jeong
, Wonsuk Choi
:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. CCS 2023: 622-635 - [c6]Gyungeun Yun
, Kyungho Joo
, Wonsuk Choi
, Dong Hoon Lee
:
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation. CCS 2023: 3639-3641 - [c5]Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo:
RIDAS: Real-time identification of attack sources on controller area networks. USENIX Security Symposium 2023: 6911-6928 - 2022
- [j13]Hyunghoon Kim
, Yeonseon Jeong
, Wonsuk Choi, Dong Hoon Lee
, Hyo Jin Jo
:
Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing. IEEE Access 10: 23259-23271 (2022) - [j12]Seyoung Lee
, Hyo Jin Jo
, Aram Cho
, Dong Hoon Lee
, Wonsuk Choi:
TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN). IEEE Access 10: 52139-52153 (2022) - [j11]Hyo Jin Jo
, Wonsuk Choi
:
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures. IEEE Trans. Intell. Transp. Syst. 23(7): 6123-6141 (2022) - [c4]Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction. WISA 2022: 171-184 - 2021
- [j10]Wonsuk Choi
, Seyoung Lee, Kyungho Joo, Hyo Jin Jo
, Dong Hoon Lee
:
An Enhanced Method for Reverse Engineering CAN Data Payload. IEEE Trans. Veh. Technol. 70(4): 3371-3381 (2021) - [c3]Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Usable User Authentication on a Smartwatch using Vibration. CCS 2021: 304-319 - 2020
- [j9]Seungho Lee
, Hyo Jin Jo
, Wonsuk Choi, Hyoseung Kim, Jong Hwan Park, Dong Hoon Lee
:
Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone. IEEE Access 8: 81348-81364 (2020) - [j8]Hyo Jin Jo
, Jin Hyun Kim
, Hyon-Young Choi, Wonsuk Choi
, Dong Hoon Lee
, Insup Lee
:
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. IEEE Trans. Veh. Technol. 69(2): 2204-2218 (2020) - [c2]Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. NDSS 2020 - [i2]Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. CoRR abs/2003.13251 (2020)
2010 – 2019
- 2019
- [j7]Seungho Lee
, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee
:
T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method. IEEE Access 7: 49738-49755 (2019) - [j6]Sunwoo Lee
, Wonsuk Choi, Dong Hoon Lee
:
Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model. IEEE Access 7: 107716-107729 (2019) - [c1]Seungho Lee
, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
How to Securely Record Logs based on ARM TrustZone. AsiaCCS 2019: 664-666 - 2018
- [j5]Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee
:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. Secur. Commun. Networks 2018: 1809302:1-1809302:16 (2018) - [j4]Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park
, Dong Hoon Lee
:
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Trans. Inf. Forensics Secur. 13(8): 2114-2129 (2018) - [j3]Wonsuk Choi, Hyo Jin Jo
, Samuel Woo, Ji Young Chun, Jooyoung Park
, Dong Hoon Lee
:
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. IEEE Trans. Veh. Technol. 67(6): 4757-4770 (2018) - 2017
- [j2]Hyo Jin Jo, Wonsuk Choi, Seoung Yeop Na, Samuel Woo, Dong Hoon Lee:
Vulnerabilities of Android OS-Based Telematics System. Wirel. Pers. Commun. 92(4): 1511-1530 (2017) - [j1]Wonsuk Choi, In Seok Kim, Dong Hoon Lee:
E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks. Wirel. Pers. Commun. 97(1): 977-998 (2017) - 2016
- [i1]Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, Dong Hoon Lee:
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. CoRR abs/1607.00497 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 01:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint