Jiyong Jang

Orcid: 0000-0001-8111-2503

According to our database1, Jiyong Jang authored at least 40 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
URET: Universal Robustness Evaluation Toolkit (for Evasion).
Proceedings of the 32nd USENIX Security Symposium, 2023

Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
A Multi-Agent Driving Simulation Approach for Evaluating the Safety Benefits of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

An In-Vehicle Warning Information Provision Strategy for V2V-Based Proactive Traffic Safety Management.
IEEE Trans. Intell. Transp. Syst., 2022

RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Feature Concentration for Supervised and Semisupervised Learning With Unbalanced Datasets in Visual Inspection.
IEEE Trans. Ind. Electron., 2021

Evidential Cyber Threat Hunting.
CoRR, 2021

Software Deception Steering through Version Emulation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Adaptive Verifiable Training Using Pairwise Class Similarity.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Blood Pressure Prediction by a Smartphone Sensor using Fully Convolutional Networks.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
End-to-End Blood Pressure Prediction via Fully Convolutional Networks.
IEEE Access, 2019

Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Android Malware Clustering Through Malicious Payload Mining.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016

Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Rateless and pollution-attack-resilient network coding.
Proceedings of the IEEE International Symposium on Information Theory, 2015

FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Lightweight authentication of freshness in outsourced key-value stores.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code.
PhD thesis, 2013

Towards Automatic Software Lineage Inference.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
login Usenix Mag., 2012

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
SplitScreen: Enabling efficient, distributed malware detection.
J. Commun. Networks, 2011

BitShred: feature hashing malware for scalable triage and semantic analysis.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2007
A Time-Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2007

A Performance Evaluation Methodology in Virtual Environments.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Improving Resiliency Using Capacity-Aware Multicast Tree in P2P-Based Streaming Environments.
Proceedings of the High Performance Computing and Communications, 2006


  Loading...