Souhwan Jung

Orcid: 0000-0003-2676-3412

According to our database1, Souhwan Jung authored at least 64 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android.
Comput. Syst. Sci. Eng., 2023

On the Defense of Spoofing Countermeasures Against Adversarial Attacks.
IEEE Access, 2023

GAN Discriminator based Audio Deepfake Detection.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Empirical feature learning in application-based samples: A case study.
J. Comput. Sci., 2022

2021
AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification.
IEEE Access, 2021

AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment.
IEEE Access, 2021

2020
HAL-Based Resource Manipulation Monitoring on AOSP.
Mob. Inf. Syst., 2020

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence.
KSII Trans. Internet Inf. Syst., 2020

A-Pot: A Comprehensive Android Analysis Platform Based on Container Technology.
IEEE Access, 2020

Enhancing Notation-Based Code Cloning Method With an External-Based Identifier Model.
IEEE Access, 2020

Virtualization Technologies in the Android Framework and Compatibility with SEAndroid.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Semantic-aware Comment Analysis Approach for API Permission Mapping on Android.
Proceedings of the NLPIR 2020: 4th International Conference on Natural Language Processing and Information Retrieval, 2020

2019
Android Fragmentation in Malware Detection.
Comput. Secur., 2019

An Entropy-Based Solution for Identifying Android Packers.
IEEE Access, 2019

A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Implementation of Private Base Station in Android Container Environment for Mobile Communication.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Dynamic analysis with Android container: Challenges and opportunities.
Digit. Investig., 2018

API and permission-based classification system for Android malware analysis.
Proceedings of the 2018 International Conference on Information Networking, 2018

Optimizing native analysis with android container.
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018

2017
Android Rooting: An Arms Race between Evasion and Detection.
Secur. Commun. Networks, 2017

Personal OAuth authorization server and push OAuth for Internet of Things.
Int. J. Distributed Sens. Networks, 2017

Design and Implementation of Android Container Monitoring Server and Agent.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Centralized management solution for vagrant in development environment.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2016
Privacy enhancement using selective encryption scheme in data outsourcing.
Int. J. Distributed Sens. Networks, 2016

Signing key leak detection in Google Play Store.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things.
Int. J. Distributed Sens. Networks, 2015

A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

A Distributed Self-Organizing Map for DoS attack detection.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Privacy enhancement for data outsourcing.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2014
SecaaS Framework and Architecture: A Design of Dynamic Packet Control.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An efficient uplink admission control for ertPS in IEEE 802.16.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
An Integrated Handover Authentication for FMIPv6 Over Heterogeneous Access Link Technologies.
Wirel. Pers. Commun., 2013

HRP: A HMAC-based RFID mutual authentication protocol using PUF.
Proceedings of the International Conference on Information Networking 2013, 2013

A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Unified security architecture and protocols using third party identity in V2V and V2I networks.
Wirel. Commun. Mob. Comput., 2012

Modeling and analysis of the wireless channel formed by LED angle in visible light communication.
Proceedings of the 2012 International Conference on Information Networking, 2012

2011
Evidence collection from car black boxes using smartphones.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
A handover authentication using credentials based on chameleon hashing.
IEEE Commun. Lett., 2010

Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Evidence Collecting System from Car Black Boxes.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009

A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009

A Security Framework with Strong Non-Repudiation and Privacy in VANETs.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Demonstration of Spam and Security Mechanism in SIP-Based VoIP Services.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6.
IEICE Trans. Commun., 2008

2007
Integrated Authentication Model for Network Access in Next Generation Networks.
IEICE Trans. Commun., 2007

2006
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks.
IEICE Trans. Commun., 2006

Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

Forward Secure Password-Enabled PKI with Instant Revocation.
Proceedings of the Public Key Infrastructure, 2006

Secure Password Authentication for Distributed Computing.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

IPSec Support in NAT-PT Scenario for IPv6 Transition.
Proceedings of the Information Security, 8th International Conference, 2005

2004
Impacts of Security Protocols on Real-Time Multimedia Communications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Threat Analysis on NEtwork MObility (NEMO).
Proceedings of the Information and Communications Security, 6th International Conference, 2004

An Efficient Authentication Scheme Using Recovery Information in Signature.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.
Proceedings of the Applied Cryptography and Network Security, 2004

2000
Time-domain approach using multiple Kalman filters and EM algorithm to speech enhancement with nonstationary noise.
IEEE Trans. Speech Audio Process., 2000

Smoothing approach using forward-backward Kalman filter with Markov switching parameters for speech enhancement.
Signal Process., 2000

1998
Dynamic bandwidth allocation for VBR video traffic using adaptive wavelet prediction.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

Dynamic bandwidth allocation for VBR video transport.
Proceedings of the 1998 IEEE International Conference on Communications, 1998


  Loading...