Ju Bin Song's research while affiliated with Kyung Hee University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
In this chapter, we consider an optimal charging and discharging process for multiple electric vehicles in a smart grid building to optimize the energy consumption profile of the building. The building controller aims to minimize the Square Euclidean Distance between the instantaneous energy demand and the average demand of the building. In a decen...
In this paper, we illustrate the properties of proposed dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks. We derive the saddle-point equilibrium for distributed routing game that supports a novel recovery of routing path failure against unknown attackers and enhances the security an...
Citations
... The resulting secure routing algorithm can spatially circumvent jammers along the routing path and learn to defend against malicious attackers as the state changes. As shown in Figure 8, the routing path generated from the proposed routing algorithm in [120] and [136] can avoid the nodes that are compromised by the jammers. Thus, the routing algorithm stemmed from the proposed game-theoretic formulation provides more resilience, security, and agility than the ad hoc on-demand distance vector (AODV) algorithm as AODV fails to dynamically adjust the routing path in the case of a malicious attack. ...