Hyoungshick Kim

Orcid: 0000-0002-1605-3866

According to our database1, Hyoungshick Kim authored at least 209 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice.
CoRR, 2024

UniHENN: Designing More Versatile Homomorphic Encryption-based CNNs without im2col.
CoRR, 2024

Securing Cloud-Based Internet of Things: Challenges and Mitigations.
CoRR, 2024

Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations.
CoRR, 2024

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023

A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems.
Sensors, February, 2023

DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture.
IEEE Trans. Dependable Secur. Comput., 2023

An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit Optimization.
IEEE Trans. Cloud Comput., 2023

On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models.
CoRR, 2023

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems.
CoRR, 2023

On the Effectiveness of Perturbations in Generating Evasive Malware Variants.
IEEE Access, 2023

AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN.
Proceedings of the ACM Web Conference 2023, 2023

BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

When social networks meet payment: a security perspective.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

Smartmark: Software Watermarking Scheme for Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

MENDEL: Time series anomaly detection using transfer learning for industrial control systems.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks.
ACM Trans. Web, 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

LocID: A Secure and Usable Location-Based Smartphone Unlocking Scheme Using Wi-Fi Signals and Light Intensity.
IEEE Internet Things J., 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

Systematically Evaluation of Challenge Obfuscated APUFs.
CoRR, 2022

Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

VulDeBERT: A Vulnerability Detection System Using BERT.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021

Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021

Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks.
IEEE Access, 2021

A Security Analysis of Blockchain-Based Did Services.
IEEE Access, 2021

On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Towards Usable and Secure Location-based Smartphone Authentication.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

FUMVar: a practical framework for generating fully-working and unseen malware variants.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

ARGH!: Automated Rumor Generation Hub.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020

A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.
Sensors, 2020

Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
Sensors, 2020

Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption.
Secur. Commun. Networks, 2020

On the robustness of Lightning Network in Bitcoin.
Pervasive Mob. Comput., 2020

A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020

Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020

LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics.
Comput. Secur., 2020

IBCS: Intent-Based Cloud Services for Security Applications.
IEEE Commun. Mag., 2020

Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag., 2020

Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020

I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Void: A fast and light voice liveness detection system.
Proceedings of the 29th USENIX Security Symposium, 2020

ConTheModel: Can We Modify Tweets to Confuse Classifier Models?
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ACIDroid: a practical app cache integrity protection system on Android Runtime.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

eAPT: enhancing APT with a mirror site resolver.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.
Proceedings of the Financial Cryptography and Data Security, 2020

PassTag: A Graphical-Textual Hybrid Fallback Authentication System.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

Design and Evaluation of Enumeration Attacks on Package Tracking Systems.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks.
IEEE Trans. Intell. Transp. Syst., 2019

Statistical Application Fingerprinting for DDoS Attack Mitigation.
IEEE Trans. Inf. Forensics Secur., 2019

A framework for DNS naming services for Internet-of-Things devices.
Future Gener. Comput. Syst., 2019

Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger.
Digit. Investig., 2019

O<sup>2</sup>TR: Offline OTR messaging system under network disruption.
Comput. Secur., 2019

Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Profiling-Based Classification Algorithms for Security Applications in Internet of Things.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

An Eye for an Eye: Economics of Retaliation in Mining Pools.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

Automated Cash Mining Attacks on Mobile Advertising Networks.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks.
Wirel. Commun. Mob. Comput., 2018

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
Sensors, 2018

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018

Design and Analysis of Push Notification-Based Malware on Android.
Secur. Commun. Networks, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Interface to Network Security Functions for Cloud-Based Security Services.
IEEE Commun. Mag., 2018

User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies.
IEEE Consumer Electron. Mag., 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

When Harry Met Tinder: Security Analysis of Dating Apps on Android.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A Framework for Managing User-defined Security Policies to Support Network Security Functions.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

An Analysis of Research Trends in Computer Security over the Last Decade.
Proceedings of the International Conference on Software Security and Assurance, 2018

How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

Bypassing DRM protection in e-book applications on Android.
Proceedings of the 2018 International Conference on Information Networking, 2018

Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J. Internet Serv. Inf. Secur., 2017

TARD: Temporary Access Rights Delegation for guest network devices.
J. Comput. Syst. Sci., 2017

Visual Honey Encryption: Application to Steganography.
IACR Cryptol. ePrint Arch., 2017

Security challenges with network functions virtualization.
Future Gener. Comput. Syst., 2017

Privacy-preserving nearest neighbor queries using geographical features of cellular networks.
Comput. Commun., 2017

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Commun. Mag., 2017

Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters].
IEEE Consumer Electron. Mag., 2017

O<sup>2</sup>TR: Offline Off-the-Record (OTR) Messaging.
Proceedings of the Information Security Applications - 18th International Conference, 2017

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017

A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Analysis and comparison of fax spam detection algorithms.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

IoE Security Threats and You.
Proceedings of the International Conference on Software Security and Assurance, 2017

COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools.
Proceedings of the International Conference on Software Security and Assurance, 2017

k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files.
Proceedings of the Information Science and Applications 2017, 2017

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN.
Proceedings of the Computer Security - ESORICS 2017, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

DDoS Attack Mitigation in Internet of Things Using Software Defined Networking.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

Forensic analysis of the backup database file in KakaoTalk messenger.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

Design of a Secure Digital Recording Protection System with Network Connected Devices.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.
IEEE Trans. Hum. Mach. Syst., 2016

A Healthcare Information System for Secure Delivery and Remote Management of Medical Records.
IEICE Trans. Inf. Syst., 2016

Combating online fraud attacks in mobile-based advertising.
EURASIP J. Inf. Secur., 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Detecting Encrypted Traffic: A Machine Learning Approach.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

SDN-based network security functions for VoIP and VoLTE services.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics.
Proceedings of the International Conference on Software Security and Assurance, 2016

A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning.
Proceedings of the International Conference on Software Security and Assurance, 2016

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Detecting False Emergency Requests Using Callers' Reporting Behaviors and Locations.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

On the Guessability of Resident Registration Numbers in South Korea.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Enhancing Conformance Testing Using Symbolic Execution for Network Protocols.
IEEE Trans. Reliab., 2015

Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk.
Comput. Secur., 2015

Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Devil in a box: Installing backdoors in electronic door locks.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Keyboard or keylogger?: A security analysis of third-party keyboards on Android.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Proceedings of the Information Security Practice and Experience, 2015

KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

SDN-based security services using interface to network security functions.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable!
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Framework for Security Services Based on Software-Defined Networking.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Survey on Interfaces to Network Security Functions in Network Virtualization.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

An Empirical Study of Click Fraud in Mobile Advertising Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Finding influential neighbors to maximize information diffusion in twitter.
Proceedings of the 23rd International World Wide Web Conference, 2014

I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Don't count the number of friends when you are spreading information in social networks.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
What's in Twitter, I know what parties are popular and who you are supporting now!
Soc. Netw. Anal. Min., 2013

An Experimental Evaluation of Robustness of Networks.
IEEE Syst. J., 2013

We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
Complex network analysis for secure and robust communications.
PhD thesis, 2012

Network analysis of temporal trends in scholarly research productivity.
J. Informetrics, 2012

Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers.
IEICE Trans. Inf. Syst., 2012

PIN selection policies: Are they really effective?
Comput. Secur., 2012

Centrality prediction in dynamic human contact networks.
Comput. Networks, 2012

STOP: Socio-Temporal Opportunistic Patching of short range mobile malware.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Efficient channel selection using hierarchical clustering.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

What's in Your Tweets? I Know Who You Supported in the UK 2010 General Election.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Influential Neighbours Selection for Information Diffusion in Online Social Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Social Authentication: Harder Than It Looks.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
A Perfect Collision-Free Pseudonym System.
IEEE Commun. Lett., 2011

RAD: Recipient-anonymous data delivery based on public routing proxies.
Comput. Networks, 2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Phishing Detection with Popular Search Engines: Simple and Effective.
Proceedings of the Foundations and Practice of Security, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Hybrid spam filtering for mobile communication.
Comput. Secur., 2010

2009
How to Compare the Scientific Contributions between Research Groups
CoRR, 2009

A new collision-free pseudonym scheme in mobile ad hoc networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Privacy-enhanced public view for social graphs.
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009

2007
Self-authorized Public Key Management for Home Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

N-Times Consumable Digital Ticket and Its Application to Content Access Service.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Scalable DRM System for Media Portability.
Proceedings of the Advances in Computer Science, 2007


  Loading...