Hae Young Lee

Orcid: 0000-0001-8918-3031

According to our database1, Hae Young Lee authored at least 52 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2020

Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation.
IEICE Trans. Inf. Syst., 2020

Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks.
IEICE Trans. Inf. Syst., 2020

2019
Result and Effectiveness of Malicious E-mail Response Training in a Hospital.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

Introduction of a Program to Improve the Information Sharing System of Food Allergy Patients.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

2018
Building a DNS Security Range in a Closed Network (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

2017
Buffer overflow detection in DEVS simulation using canaries.
Proceedings of the 2017 Winter Simulation Conference, 2017

Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Common Requirements for Web Application Vulnerability Scanners for the Internet of Things.
Proceedings of the International Conference on Software Security and Assurance, 2017

Enriching Security Education Hands-on Labs with Practical Exercises.
Proceedings of the International Conference on Software Security and Assurance, 2017

A Quantification of Effectiveness of Simulation Models by Managing Cost of Development.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
Simulation model cost database.
Proceedings of the Winter Simulation Conference, 2016

COIN-VASE: Code Injection Vulnerability Scanning Environment for HTML5-Based Android Apps.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Decoder-Free Sino-Korean Shellcode.
Proceedings of the International Conference on Software Security and Assurance, 2016

Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps.
Proceedings of the International Conference on Software Security and Assurance, 2016

Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

2015
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2015

Web-in-the-loop simulation framework for supporting CORS-based development.
Proceedings of the Poster Session and Student Colloquium Symposium, 2015

2014
Defending against wireless network intrusion.
J. Comput. Syst. Sci., 2014

Nondeterministic and elapsed-time-sensitive DEVS.
Proceedings of the 2014 SpringSim Poster Session, Tampa, FL, USA, April 13 - 16, 2014, 2014

2013
An agent-based self-adaptation architecture for implementing smart devices in Smart Space.
Telecommun. Syst., 2013

Towards Model Checking of Simulation Models for Embedded System Development.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Digital Media Art Applying Physical Game Technology Using Gesture Recognition.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

2012
WiP Abstract: From Design to Operation of a Large-Scale CPS.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

2011
Path Renewal Method in Filtering Based Wireless Sensor Networks.
Sensors, 2011

Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks.
IEICE Trans. Commun., 2011

Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

DVML: DEVS-Based Visual Modeling Language for Hybrid Systems.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

2010
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic.
J. Networks, 2010

Security Requirement Representation Method for Confidence of Systems and Networks.
Int. J. Softw. Eng. Knowl. Eng., 2010

Simulation Modeling of SAM Fuzzy Logic Controllers.
IEICE Trans. Inf. Syst., 2010

A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks.
IEICE Trans. Commun., 2010

Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks<sup>1</sup>.
Intell. Autom. Soft Comput., 2010

Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks.
J. Inf. Sci. Eng., 2009

Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks.
IEICE Trans. Inf. Syst., 2009

Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Fuzzy Adaptive Partitioning Method for the Statistical Filtering.
IEICE Trans. Inf. Syst., 2008

A<sup>*</sup> -based layout design for gratings allocation.
Comput. Aided Des., 2008

A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

2007
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks.
Int. J. Inf. Acquis., 2007

Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks.
IEICE Trans. Commun., 2007

Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks.
Proceedings of the New Trends in Applied Artificial Intelligence, 2007

Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

2006
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006


  Loading...