Seong-je Cho

Orcid: 0000-0001-9917-0429

Affiliations:
  • Dankook University, Yongin, Department of Computer Science & Engineering


According to our database1, Seong-je Cho authored at least 84 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ThanosKV: A Holistic Approach to Utilize NVM for LSM-tree based Key- Value Stores.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

Tiered Storage in Modern Key-Value Stores: Performance, Storage-Efficiency, and Cost-Efficiency Considerations.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

2023
TrafficNet: A Hybrid CNN-FNN Model for Analysis of Traffic Accidents in Seoul.
J. Comput. Sci. Eng., December, 2023

A Study on Asset Identification in Smart Buildings Automation Systems.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

Hybrid ConvLSTM with Attention for Precise Driver Behavior Classification.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023

2022
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART).
IEEE Access, 2022

Efficient Deep Learning Network With Multi-Streams for Android Malware Family Classification.
IEEE Access, 2022

Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022

Sustainability of Machine Learning-based Android Malware Detection Using API calls and Permissions.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022

2021
A Comparative Study on Optimization, Obfuscation, and Deobfuscation tools in Android.
J. Internet Serv. Inf. Secur., 2021

Forensic Analysis of Apple CarPlay: A Case Study.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

2020
Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Android Malware Family Classification using Images from Dex Files.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

2019
SimAndro: an effective method to compute similarity of Android applications.
Soft Comput., 2019

A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Efficient Android Malware Detection Using API Rank and Machine Learning.
J. Internet Serv. Inf. Secur., 2019

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File.
IEEE Access, 2019

HPanal: a framework for analyzing tradeoffs of huge pages.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Representing Multicloud Security and Privacy Policies and Detecting Potential Problems.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

Detecting Malicious Android Apps using the Popularity and Relations of APIs.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
AndroClass: An Effective Method to Classify Android Applications by Applying Deep Neural Networks to Comprehensive Features.
Wirel. Commun. Mob. Comput., 2018

A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018

Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018

Open-Source Android App Detection considering the Effects of Code Obfuscation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units.
IET Inf. Secur., 2018

Analyzing and modeling the impact of memory latency and bandwidth on application performance.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Android Malware Detection Based on Useful API Calls and Machine Learning.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

2017
Quantitative analysis of measurement overhead for integrity verification.
Proceedings of the Symposium on Applied Computing, 2017

An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016

An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016

Protecting data on android platform against privilege escalation attack.
Int. J. Comput. Math., 2016

Analysis of micro-architecture resources interference on multicore NUMA systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

2015
Effective and efficient detection of software theft via dynamic API authority vectors.
J. Syst. Softw., 2015

Effects of Code Obfuscation on Android App Similarity Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

DAAV: Dynamic API Authority Vectors for Detecting Software Theft.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Unified security enhancement framework for the Android operating system.
J. Supercomput., 2014

Open Source Software Detection using Function-level Static Software Birthmark.
J. Internet Serv. Inf. Secur., 2014

A new detection scheme of software copyright infringement using software birthmark on windows systems.
Comput. Sci. Inf. Syst., 2014

A kernel-based monitoring approach for analyzing malicious behavior on Android.
Proceedings of the Symposium on Applied Computing, 2014

An effective data clustering method based on expected update time in flash memory environment.
Proceedings of the Symposium on Applied Computing, 2014

A robust and efficient birthmark-based android application filtering system.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

Efficient Identification of Windows Executable Programs to Prevent Software Piracy.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Identifying Windows Installer Package Files for Detection of Pirated Software.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A birthmark-based method for intellectual software asset management.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Detection and prevention of LeNa Malware on Android.
J. Internet Serv. Inf. Secur., 2013

Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine.
J. Inf. Process. Syst., 2013

Measuring similarity of windows applications using static and dynamic birthmarks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Measuring similarity of android applications via reversing and K-gram birthmarking.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

An efficient protection scheme of digital contents under mobile devices.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A Static Birthmark of Windows Binary Executables Based on Strings.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Static Birthmark for MS Windows Applications Using Import Address Table.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Detecting source code similarity using code abstraction.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

RAMC: runtime abstract memory context based plagiarism detection in binary code.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks.
J. Internet Serv. Inf. Secur., 2012

Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots.
J. Inf. Sci. Eng., 2012

A fast mount mechanism for YAFFS2.
Proceedings of the ACM Symposium on Applied Computing, 2012

An anti-piracy mechanism based on class separation and dynamic loading for Android applications.
Proceedings of the Research in Applied Computation Symposium, 2012

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2011
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots.
Proceedings of the Research in Applied Computation Symposium, 2011

2010
Improving responsiveness of soft aperiodic tasks using proportional slack time.
Comput. Electr. Eng., 2010

Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

2009
Energy Consumption Optimization of Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

2008
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

2007
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Efficient Identification of Bad Signatures in RSA-Type Batch Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006

Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005

Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

<i>SoIDPS</i>: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
A Study on Monitoring and Protecting Computer System against Interception Threat.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003


  Loading...