Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin Y Kwon, D Kim, Y Son, E Vasserman, Y Kim Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 260 | 2017 |
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications H Shin, D Kim, Y Kwon, Y Kim Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 242 | 2017 |
Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing J Noh, Y Kwon, Y Son, H Shin, D Kim, J Choi, Y Kim ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-26, 2019 | 93 | 2019 |
Impossibility of full decentralization in permissionless blockchains Y Kwon, J Liu, M Kim, D Song, Y Kim Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 86 | 2019 |
Bitcoin vs. bitcoin cash: Coexistence or downfall of bitcoin cash? Y Kwon, H Kim, J Shin, Y Kim 2019 IEEE Symposium on Security and Privacy (SP), 935-951, 2019 | 77 | 2019 |
Is stellar as secure as you think? M Kim, Y Kwon, Y Kim 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019 | 59 | 2019 |
Sampling Race: Bypassing {Timing-Based} Analog Active Sensor Spoofing Detection on {Analog-Digital} Systems H Shin, Y Son, Y Park, Y Kwon, Y Kim 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 41 | 2016 |
Unpacking how decentralized autonomous organizations (daos) work in practice T Sharma, Y Kwon, K Pongmala, H Wang, A Miller, D Song, Y Wang arXiv preprint arXiv:2304.09822, 2023 | 22 | 2023 |
The trilemma of stablecoin Y Kwon, J Kim, Y Kim, D Song Available at SSRN 3917430, 2021 | 13 | 2021 |
What Drives the (In) stability of a Stablecoin? Y Kwon, K Pongmala, K Qin, A Klages-Mundt, P Jovanovic, C Parlour, ... 2023 INFORMS Annual Meeting, 2023 | 4 | 2023 |
An eye for an eye: economics of retaliation in mining pools Y Kwon, H Kim, Y Yi, Y Kim Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 3 | 2019 |
Doppelganger in bitcoin mining pools: An analysis of the duplication share attack Y Kwon, D Kim, Y Son, J Choi, Y Kim Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 2 | 2017 |
Evolving AI Collectives to Enhance Human Diversity and Enable Self-Regulation S Lai, Y Potter, J Kim, R Zhuang, D Song, J Evans arXiv preprint arXiv:2402.12590, 2024 | 1 | 2024 |
Method for anti-drone using GPS spoofing signal and system therefore Y Kim, J Noh, Y Kwon, H Shin, D Kim US Patent 11,745,871, 2023 | 1 | 2023 |
Analysis of LFT2 G Lim, Y Kwon, Y Kim arXiv preprint arXiv:2004.04294, 2020 | 1 | 2020 |
SoK: The Gap Between Data Rights Ideals and Reality Y Kwon, E Corren, GM Garrido, C Hoofnagle, D Song arXiv preprint arXiv:2312.01511, 2023 | | 2023 |
INCLUSIVE. AI: ENGAGING UNDERSERVED POPULATIONS IN DEMOCRATIC DECISION-MAKING ON AI T Sharma, Y Kwon, J Park, Y Liu, Y Huang, S Liu, D Song, J Hancock, ... OpenAI Grant Interim Report, 2023 | | 2023 |