Eunjin Jung

Orcid: 0000-0003-1224-4072

According to our database1, Eunjin Jung authored at least 34 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing Discrepancies in Whole-Network Provenance.
Proceedings of the Critical Infrastructure Protection XVII, 2023

2021
Hybrid Imitation Learning Framework for Robotic Manipulation Tasks.
Sensors, 2021

2020
Discrepancy Detection in Whole Network Provenance.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

The Joys and Challenges of Outreach in CS Education to Low-Income Populations.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
Data Mining-Based Ethereum Fraud Detection.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Rationality-proof consensus: extended abstract.
CoRR, 2018

Efficiently Validating Aggregated IoT Data Integrity.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Inclusive persuasion for security software adoption.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2015
Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2013
Interactive Website Filter for Safe Web Browsing.
J. Inf. Sci. Eng., 2013

Changing young women's perceptions of CS via outreach.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

2011
Towards Run-Time Verification in Access Control.
Proceedings of the POLICY 2011, 2011

2010
ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks.
KSII Trans. Internet Inf. Syst., 2010

You're Not Who You Claim to Be: Website Identity Check for Phishing Detection.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

k-ARQ: k-Anonymous Ranking Queries.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
BayeShield: conversational anti-phishing user interface.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Obfuscated malicious javascript detection using classification techniques.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

An efficient and scalable algorithm for policy compatibility in service virtualization.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

A targeted web crawling for building malicious javascript collection.
Proceedings of the Proceeding of the ACM First International Workshop on Data-Intensive Software Management and Mining, 2009

2008
Load-Balanced and Sybil-Resilient File Search in P2P Networks.
Proceedings of the Principles of Distributed Systems, 12th International Conference, 2008

B-APT: Bayesian Anti-Phishing Toolbar.
Proceedings of IEEE International Conference on Communications, 2008

2007
Optimal Dispersal of Certificate Chains.
IEEE Trans. Parallel Distributed Syst., 2007

2006
Stabilizing Certificate Dispersal.
J. Aerosp. Comput. Inf. Commun., 2006

Vulnerability analysis of certificate graphs.
Int. J. Secur. Networks, 2006

An efficient LKH tree balancing algorithm for group key management.
IEEE Commun. Lett., 2006

Key bundles and parcels: Secure communication in many groups.
Comput. Networks, 2006

An Efficient Key Tree Management Algorithm for LKH Group Key Management.
Proceedings of the Information Networking, 2006

Rating Certificates.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Grammaire des adverbes de durée et de date en coréen. (The grammar of adverbs of time, date and duration in Korean).
PhD thesis, 2005

2004
Certificate Dispersal in Ad-Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Optimal dispersal of special certificate graphs.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Key Bundels and Parcels: Secure Communication in Many Groups.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

1997
On the fast shape recovery technique using multiple ring lights.
Pattern Recognit., 1997

1994
Recovery of 3-D Shape using Hybrid Reflectance Model.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994


  Loading...