Seungho Jeon

Orcid: 0000-0002-7116-6062

According to our database1, Seungho Jeon authored at least 13 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
Sensors, February, 2024

A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System.
Sensors, 2024

2023
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
Sensors, December, 2023

A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing.
IEEE Access, 2023

OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.
Proceedings of the Information Security Applications - 24th International Conference, 2023

AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0.
Proceedings of the Information Security Applications - 24th International Conference, 2023

SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search.
Neural Comput. Appl., 2022

A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment.
Comput. Methods Programs Biomed., 2022

AVS3 Decoder Architecture and VLSI Implementation for 8K UHDTV Application.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

2020
Recurrent GANs Password Cracker For IoT Password Security Enhancement.
Sensors, 2020

Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences.
Inf. Sci., 2020

2019
A New Password Cracking Model with Generative Adversarial Networks.
Proceedings of the Information Security Applications - 20th International Conference, 2019


  Loading...