Jeman Park

Orcid: 0000-0003-4387-8780

Affiliations:
  • Georgia Institute of Technology, School of Electrical and Computer Engineering, Atlanta, GA, USA
  • University of Central Florida, Florida, USA (PhD 2022)
  • Korea University, Seoul, South Korea (former)


According to our database1, Jeman Park authored at least 29 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.
IEEE/ACM Trans. Netw., 2022

Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

2020
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications.
EAI Endorsed Trans. Security Safety, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Investigating DNS Manipulation by Open DNS Resolvers.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Proactive detection of algorithmically generated malicious domains.
Proceedings of the 2018 International Conference on Information Networking, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

2015
A User-Side Energy-Saving Video Streaming Scheme for LTE Devices.
IEEE Commun. Lett., 2015

Exploring Smartphones as WAVE Devices.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015


  Loading...