Jeong Hyun Yi

Orcid: 0000-0002-2720-0593

According to our database1, Jeong Hyun Yi authored at least 55 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.
Comput. Syst. Sci. Eng., 2023

2022
Hiding Data in the Padding Area of Android Applications without Re-Packaging.
IEICE Trans. Inf. Syst., November, 2022

MAPAS: a practical deep learning-based android malware detection system.
Int. J. Inf. Sec., 2022

Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware.
IEEE Access, 2022

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis.
IEEE Access, 2022

2021
Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications.
IEEE Access, 2021

2020
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting.
Mob. Inf. Syst., 2020

Risk Assessment Scheme for Mobile Applications Based on Tree Boosting.
IEEE Access, 2020

2019
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART.
Sensors, 2019

Intelligent Malware Detection Based on Hybrid Learning of API and ACG on Android.
J. Internet Serv. Inf. Secur., 2019

Automatic string deobfuscation scheme for mobile applications based on platform-level code extraction.
Int. J. Ad Hoc Ubiquitous Comput., 2019

2018
Distributed quality of service routing protocol for multimedia traffic in WiMedia networks.
Wirel. Networks, 2018

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.
J. Supercomput., 2018

Risk assessment of mobile applications based on machine learned malware dataset.
Multim. Tools Appl., 2018

Survey of Dynamic Anti-Analysis Schemes for Mobile Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles.
IEEE Access, 2018

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications.
IEEE Access, 2018

2017
Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things.
Int. J. Serv. Technol. Manag., 2017

Wideband open stub BPF for cognitive radio system applications.
Int. J. Sens. Networks, 2017

Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment.
Int. J. Sens. Networks, 2017

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things.
IEEE Access, 2017

2016
Anti-debugging scheme for protecting mobile apps on android platform.
J. Supercomput., 2016

Mobile application tamper detection scheme using dynamic code injection against repackaging attacks.
J. Supercomput., 2016

Server-based code obfuscation scheme for APK tamper detection.
Secur. Commun. Networks, 2016

Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks.
Multim. Tools Appl., 2016

Advances in Mobile Security Technologies.
Mob. Inf. Syst., 2016

Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART.
J. Internet Serv. Inf. Secur., 2016

Cyber threats to mobile messenger apps from identity cloning.
Intell. Autom. Soft Comput., 2016

Structural analysis of packing schemes for extracting hidden codes in mobile malware.
EURASIP J. Wirel. Commun. Netw., 2016

Checking Intent-based Communication in Android with Intent Space Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Personal Information Leaks with Automatic Login in Mobile Social Network Services.
Entropy, 2015

Preface - WISA 2014.
Comput. Secur., 2015

Mobile device management system with portable devices.
Proceedings of the International Symposium on Consumer Electronics, 2015

Tamper detection scheme using signature segregation on android platform.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android.
J. Internet Serv. Inf. Secur., 2014

Spyware Resistant Smartphone User Authentication Scheme.
Int. J. Distributed Sens. Networks, 2014

2013
Repackaging Attack on Android Banking Applications and Its Countermeasures.
Wirel. Pers. Commun., 2013

Elastic password authentication scheme using the Passcell-based virtual scroll wheel.
Int. J. Comput. Math., 2013

Mobile User Authentication Scheme Based on Minesweeper Game.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

2011
Experimenting with system and Libc call interception attacks on ARM-based Linux kernel.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009

Noninteractive self-certification for long-lived mobile ad hoc networks.
IEEE Trans. Inf. Forensics Secur., 2009

2008
Self-Configurable Authentication Mechanism with Verifiability in Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Threshold cryptography in P2P and MANETs: The case of access control.
Comput. Networks, 2007

Robust self-keying mobile ad hoc networks.
Comput. Networks, 2007

Fast Batch Verification of Multiple Signatures.
Proceedings of the Public Key Cryptography, 2007

2006
Energy-Efficient and Non-interactive Self-certification in MANETs.
Proceedings of the Stabilization, 2006

2005
Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Efficient Node Admission for Short-lived Mobile Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Identity-Based Access Control for Ad Hoc Groups.
Proceedings of the Information Security and Cryptology, 2004

Access control in ad hoc groups.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

2003
Admission control in Peer-to-Peer: design and performance evaluation.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003


  Loading...