Jeong Yoo
YOU?
Author Swipe
View article: Integrative taxonomic revision of the Nearctic Perilampus hyalinus species complex (Hymenoptera, Chalcidoidea, Perilampidae) resolves 100 years of confusion about the host associations of P. hyalinus Say
Integrative taxonomic revision of the Nearctic Perilampus hyalinus species complex (Hymenoptera, Chalcidoidea, Perilampidae) resolves 100 years of confusion about the host associations of P. hyalinus Say Open
The enigmatic Nearctic parasitoid Perilampus hyalinus Say (Hymenoptera: Chalcidoidea: Perilampidae) has long been suspected as a species complex with a wide range of host associations and differing modes of parasitism. In this study we cla…
View article: RTPS Attack Dataset Description
RTPS Attack Dataset Description Open
This paper explains all about our RTPS datasets. We collect malicious/benign packet data by injecting attack data in an Unmanned Ground Vehicle (UGV) in the normal state. We assembled the testbed, consisting of UGV, Controller, PC, and Rou…
View article: C-ITS Environment Modeling and Attack Modeling
C-ITS Environment Modeling and Attack Modeling Open
As technology advances, cities are evolving into smart cities, with the ability to process large amounts of data and the increasing complexity and diversification of various elements within urban areas. Among the core systems of a smart ci…
View article: Defining C-ITS Environment and Attack Scenarios
Defining C-ITS Environment and Attack Scenarios Open
As technology advances, it is possible to process a lot of data, and as various elements in the city become diverse and complex, cities are becoming smart cities. One of the core systems of smart cities is Cooperative-Intelligent Transport…
View article: UAVCAN Dataset Description
UAVCAN Dataset Description Open
We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed.…
View article: Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS Open
Due to its high expressiveness and speed, Deep Learning (DL) has become an increasingly popular choice as the detection algorithm for Network-based Intrusion Detection Systems (NIDSes). Unfortunately, DL algorithms are vulnerable to advers…
View article: The Perilampidae of the United Arab Emirates and Yemen (Hymenoptera: Chalcidoidea)
The Perilampidae of the United Arab Emirates and Yemen (Hymenoptera: Chalcidoidea) Open
The family Perilampidae is reported for the first time from the Arabian Peninsula. Krombeinius almokha Darling n. sp. is described from Yemen and seven species of Perilampus Latreille are recorded and illustrated from Yemen and the United …