Minkyu Park

According to our database1, Minkyu Park authored at least 55 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Cooperative information-driven source search and estimation for multiple agents.
Inf. Fusion, 2020

Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Android Malware Family Classification using Images from Dex Files.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

2019
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File.
IEEE Access, 2019

2018
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018

Open-Source Android App Detection considering the Effects of Code Obfuscation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016

An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016

Protecting data on android platform against privilege escalation attack.
Int. J. Comput. Math., 2016

Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

2015
A dual speed scheme for dynamic voltage scaling on real-time multiprocessor systems.
J. Supercomput., 2015

Effects of Code Obfuscation on Android App Similarity Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
Open Source Software Detection using Function-level Static Software Birthmark.
J. Internet Serv. Inf. Secur., 2014

A new detection scheme of software copyright infringement using software birthmark on windows systems.
Comput. Sci. Inf. Syst., 2014

A kernel-based monitoring approach for analyzing malicious behavior on Android.
Proceedings of the Symposium on Applied Computing, 2014

A robust and efficient birthmark-based android application filtering system.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

Efficient Identification of Windows Executable Programs to Prevent Software Piracy.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A birthmark-based method for intellectual software asset management.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Detection and prevention of LeNa Malware on Android.
J. Internet Serv. Inf. Secur., 2013

Measuring similarity of windows applications using static and dynamic birthmarks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Measuring similarity of android applications via reversing and K-gram birthmarking.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

An efficient protection scheme of digital contents under mobile devices.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A Static Birthmark of Windows Binary Executables Based on Strings.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Static Birthmark for MS Windows Applications Using Import Address Table.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Real-time digital zooming for mobile consumer cameras using directionally adaptive image interpolation and restoration.
Proceedings of the IEEE International Conference on Consumer Electronics, 2013

2012
Scalable Group Key Exchange for Securing Distributed Operating Systems.
J. Inf. Sci. Eng., 2012

Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots.
J. Inf. Sci. Eng., 2012

An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup.
IEICE Trans. Commun., 2012

DMB Application Format for Mobile Multimedia Services.
IEEE Multim., 2012

AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLs.
Proceedings of the ACM Symposium on Applied Computing, 2012

An anti-piracy mechanism based on class separation and dynamic loading for Android applications.
Proceedings of the Research in Applied Computation Symposium, 2012

An off-line dynamic voltage scaling scheme in multiprocessor real-time scheduling.
Proceedings of the Research in Applied Computation Symposium, 2012

RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2011
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots.
Proceedings of the Research in Applied Computation Symposium, 2011

2010
Improving responsiveness of soft aperiodic tasks using proportional slack time.
Comput. Electr. Eng., 2010

Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Energy Consumption Optimization of Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009

2007
Noise insensitive demosaicing algorithm.
Proceedings of the Signal and Image Processing (SIP 2007), 2007

Buffer Cache Level Encryption for Embedded Secure Operating System.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

2006
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006

Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005

Impact on the Writing Granularity for Incremental Checkpointing.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
Proceedings of the Embedded and Ubiquitous Computing, 2004

1999
BookmarkFeeder: A Web Agent with Implicit Feedback and URL-Based Recommendation.
Proceedings of the Internet, Multimedia Systems and Applications, 1999


  Loading...