Yeonjoon Lee

Orcid: 0000-0002-5010-8277

According to our database1, Yeonjoon Lee authored at least 17 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Development of ResNet152 UNet++-Based Segmentation Algorithm for the Tympanic Membrane and Affected Areas.
IEEE Access, 2023

Toward Better Ear Disease Diagnosis: A Multi-Modal Multi-Fusion Model Using Endoscopic Images of the Tympanic Membrane and Pure-Tone Audiometry.
IEEE Access, 2023

Aliasing Backdoor Attacks on Pre-trained Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

Generative AI for Radiological Image Data: Current Trends and Outlook.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

2021
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis.
IEEE Trans. Dependable Secur. Comput., 2021

Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

2019
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...