Jiyoung Woo

According to our database1, Jiyoung Woo authored at least 36 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Prediction of Postoperative Complications for Patients of End Stage Renal Disease.
Sensors, 2021

IoT-Enabled Particulate Matter Monitoring and Forecasting Method Based on Cluster Analysis.
IEEE Internet Things J., 2021

In-vehicle network intrusion detection using deep convolutional neural network.
Veh. Commun., 2020

Comparative Analysis on Machine Learning and Deep Learning to Predict Post-Induction Hypotension.
Sensors, 2020

Developing an Individual Glucose Prediction Model Using Recurrent Neural Network.
Sensors, 2020

Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling.
Sensors, 2020

Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy.
J. Assoc. Inf. Sci. Technol., 2020

A Comparative Analysis of Deep Learning and Machine Learning on Detecting Movement Directions Using PIR Sensors.
IEEE Internet Things J., 2020

Using a Heuristic-Systematic Model to assess the Twitter user profile's impact on disaster tweet credibility.
Int. J. Inf. Manag., 2020

Detecting and Preventing Online Game Bots in MMORPGs.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks.
Secur. Commun. Networks, 2019

A Study on the Characteristics of the Long-Term Web Forum Users Using Social Network Analysis.
Proceedings of the Current Trends in Web Engineering, 2019

Contagion of Cheating Behaviors in Online Social Networks.
IEEE Access, 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

How Do Multiple Topics in Terse Tweets Affect Retweeting? Evidence from the 2013 Colorado Floods.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016

Know your master: Driver profiling-based anti-theft method.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

"I know what you did before": General framework for correlation analysis of cyber threat incidents.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015

Identifying spreaders of malicious behaviors in online games.
Proceedings of the 23rd International World Wide Web Conference, 2014

Andro-profiler: anti-malware system based on behavior profiling of mobile malware.
Proceedings of the 23rd International World Wide Web Conference, 2014

Mal-netminer: malware classification based on social network analysis of call graph.
Proceedings of the 23rd International World Wide Web Conference, 2014

Generosity as Social Contagion in Virtual Community.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Altruism in games: Helping others help themselves.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Online game bot detection based on party-play log analysis.
Comput. Math. Appl., 2013

The contagion of malicious behaviors in online games.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Chatting Pattern Based Game BOT Detection: Do They Talk Like Us?
KSII Trans. Internet Inf. Syst., 2012

Modeling of bot usage diffusion across social networks in MMORPGs.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

Survey and research direction on online game security.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

An event-driven SIR model for topic diffusion in web forums.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

An SIR model for violent topic diffusion in social media.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011