Sangchul Han

According to our database1, Sangchul Han authored at least 48 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Design and Implementation of Hydraulic-Cable driven Manipulator for Disaster Response Operation.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

2019
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Efficient Android Malware Detection Using API Rank and Machine Learning.
J. Internet Serv. Inf. Secur., 2019

A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Detecting Malicious Android Apps using the Popularity and Relations of APIs.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018

Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018

Open-Source Android App Detection considering the Effects of Code Obfuscation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016

An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016

Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

2015
A dual speed scheme for dynamic voltage scaling on real-time multiprocessor systems.
J. Supercomput., 2015

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

Effects of Code Obfuscation on Android App Similarity Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
Open Source Software Detection using Function-level Static Software Birthmark.
J. Internet Serv. Inf. Secur., 2014

A kernel-based monitoring approach for analyzing malicious behavior on Android.
Proceedings of the Symposium on Applied Computing, 2014

A robust and efficient birthmark-based android application filtering system.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

Efficient Identification of Windows Executable Programs to Prevent Software Piracy.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A birthmark-based method for intellectual software asset management.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

A clustering based path planning for UV laser galvanometric scanning drilling machine using spatial tessellations with A∗.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014

2013
A remotely controlled out-pipe climbing robot.
Proceedings of the 10th International Conference on Ubiquitous Robots and Ambient Intelligence, 2013

Measuring similarity of android applications via reversing and K-gram birthmarking.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

An efficient protection scheme of digital contents under mobile devices.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A Static Birthmark of Windows Binary Executables Based on Strings.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Scalable Group Key Exchange for Securing Distributed Operating Systems.
J. Inf. Sci. Eng., 2012

An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup.
IEICE Trans. Commun., 2012

An off-line dynamic voltage scaling scheme in multiprocessor real-time scheduling.
Proceedings of the Research in Applied Computation Symposium, 2012

RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2011
A design framework for dexterous robotic hand.
Proceedings of the 8th International Conference on Ubiquitous Robots and Ambient Intelligence, 2011

2010
Improving responsiveness of soft aperiodic tasks using proportional slack time.
Comput. Electr. Eng., 2010

A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Energy Consumption Optimization of Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009

2006
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006

Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005

Fast Real-Time Job Selection with Resource Constraints Under Earliest Deadline First.
Proceedings of the Embedded Computer Systems: Architectures, 2005

2004
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
An Efficient Job Selection Scheme in Real-Time Scheduling under the Stack Resource Policy.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

On the Real-Time Job Management in Dynamic Priority Scheduling under the Stack Resource Policy.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2000
Multiple Antennas with a Reduced Iterative Turbo Decoder for A DS-CDMA System.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000


  Loading...