Follow
Yujin Potter
Yujin Potter
Other namesYujin Kwon
Verified email at berkeley.edu
Title
Cited by
Cited by
Year
Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2592017
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications
H Shin, D Kim, Y Kwon, Y Kim
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
2402017
Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing
J Noh, Y Kwon, Y Son, H Shin, D Kim, J Choi, Y Kim
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-26, 2019
892019
Impossibility of full decentralization in permissionless blockchains
Y Kwon, J Liu, M Kim, D Song, Y Kim
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
822019
Bitcoin vs. bitcoin cash: Coexistence or downfall of bitcoin cash?
Y Kwon, H Kim, J Shin, Y Kim
2019 IEEE Symposium on Security and Privacy (SP), 935-951, 2019
742019
Is stellar as secure as you think?
M Kim, Y Kwon, Y Kim
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
572019
Sampling Race: Bypassing {Timing-Based} Analog Active Sensor Spoofing Detection on {Analog-Digital} Systems
H Shin, Y Son, Y Park, Y Kwon, Y Kim
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
402016
Unpacking how decentralized autonomous organizations (daos) work in practice
T Sharma, Y Kwon, K Pongmala, H Wang, A Miller, D Song, Y Wang
arXiv preprint arXiv:2304.09822, 2023
202023
The trilemma of stablecoin
Y Kwon, J Kim, Y Kim, D Song
Available at SSRN 3917430, 2021
122021
What Drives the (In) stability of a Stablecoin?
Y Kwon, K Pongmala, K Qin, A Klages-Mundt, P Jovanovic, C Parlour, ...
2023 INFORMS Annual Meeting, 2023
42023
An eye for an eye: economics of retaliation in mining pools
Y Kwon, H Kim, Y Yi, Y Kim
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
32019
Doppelganger in bitcoin mining pools: An analysis of the duplication share attack
Y Kwon, D Kim, Y Son, J Choi, Y Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
22017
Method for anti-drone using GPS spoofing signal and system therefore
Y Kim, J Noh, Y Kwon, H Shin, D Kim
US Patent 11,745,871, 2023
12023
Analysis of LFT2
G Lim, Y Kwon, Y Kim
arXiv preprint arXiv:2004.04294, 2020
12020
Evolving AI Collectives to Enhance Human Diversity and Enable Self-Regulation
S Lai, Y Potter, J Kim, R Zhuang, D Song, J Evans
arXiv preprint arXiv:2402.12590, 2024
2024
SoK: The Gap Between Data Rights Ideals and Reality
Y Kwon, E Corren, GM Garrido, C Hoofnagle, D Song
arXiv preprint arXiv:2312.01511, 2023
2023
INCLUSIVE. AI: ENGAGING UNDERSERVED POPULATIONS IN DEMOCRATIC DECISION-MAKING ON AI
T Sharma, J Park, Y Kwon, Y Liu, Y Huang, S Liu, D Song, J Hancock, ...
OpenAI Grant Interim Report, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–17