default search action
Hyoungshick Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Hyunmin Choi, Jihun Kim, Seungho Kim, Seonhye Park, Jeongyong Park, Wonbin Choi, Hyoungshick Kim:
UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col. IEEE Access 12: 109323-109341 (2024) - [j60]Sowon Jeon, Gilhee Lee, Hyoungshick Kim, Simon S. Woo:
Design and evaluation of highly accurate smart contract code vulnerability detection framework. Data Min. Knowl. Discov. 38(3): 888-912 (2024) - [j59]Mohsen Ali Alawami, Tamer Abuhmed, Mohammed Abuhamad, Hyoungshick Kim:
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones. Pervasive Mob. Comput. 101: 101922 (2024) - [j58]Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed:
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems. IEEE Trans. Inf. Forensics Secur. 19: 5985-5998 (2024) - [j57]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024) - [c143]Hyunmin Choi, Simon S. Woo, Hyoungshick Kim:
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication. AAAI 2024: 21976-21985 - [c142]Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee, Hyoungshick Kim:
(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices. AsiaCCS 2024 - [c141]Heewon Baek, Minwook Lee, Hyoungshick Kim:
CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse. ESORICS (1) 2024: 353-373 - [c140]Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? NDSS 2024 - [c139]Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. SP 2024: 1141-1159 - [c138]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. USENIX Security Symposium 2024 - [c137]Kiho Lee, Chaejin Lim, Beomjin Jin, Taeyoung Kim, Hyoungshick Kim:
AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention. WWW 2024: 1902-1913 - [i33]Nivedita Singh, Yejin Do, Yongsang Yu. Imane Fouad, Jungrae Kim, Hyoungshick Kim:
Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations. CoRR abs/2401.05826 (2024) - [i32]Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim:
Securing Cloud-Based Internet of Things: Challenges and Mitigations. CoRR abs/2402.00356 (2024) - [i31]Hyunmin Choi, Jihun Kim, Seungho Kim, Seonhye Park, Jeongyong Park, Wonbin Choi, Hyoungshick Kim:
UniHENN: Designing More Versatile Homomorphic Encryption-based CNNs without im2col. CoRR abs/2402.03060 (2024) - [i30]Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong:
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice. CoRR abs/2403.17458 (2024) - [i29]Fujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim:
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models. CoRR abs/2405.19598 (2024) - [i28]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. CoRR abs/2406.15709 (2024) - [i27]Hyunmin Choi, Jiwon Kim, Chiyoung Song, Simon S. Woo, Hyoungshick Kim:
Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification. CoRR abs/2408.06167 (2024) - 2023
- [j56]Beomjin Jin, Jusop Choi, Jin B. Hong, Hyoungshick Kim:
On the Effectiveness of Perturbations in Generating Evasive Malware Variants. IEEE Access 11: 31062-31074 (2023) - [j55]Dongwon Lee, Yongwoo Oh, Jin B. Hong, Hyoungshick Kim, Dan Dongseong Kim:
PP-GSM: Privacy-preserving graphical security model for security assessment as a service. Future Gener. Comput. Syst. 142: 351-363 (2023) - [j54]Jun Ho Huh, Sungsu Kwag, Iljoo Kim, Alexandr Popov, Younghan Park, Geumhwan Cho, Juwon Lee, Hyoungshick Kim, Choong-Hoon Lee:
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 58:1-58:32 (2023) - [j53]Bedeuro Kim, Mohsen Ali Alawami, Eunsoo Kim, Sanghak Oh, Jeongyong Park, Hyoungshick Kim:
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems. Sensors 23(3): 1310 (2023) - [j52]Eunil Seo, Hyoungshick Kim, Bhaskar Krishnamachari, Erik Elmroth:
An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit Optimization. IEEE Trans. Cloud Comput. 11(2): 2110-2126 (2023) - [j51]Siwon Huh, Myungkyu Shim, Jihwan Lee, Simon S. Woo, Hyoungshick Kim, Hojoon Lee:
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture. IEEE Trans. Dependable Secur. Comput. 20(6): 4881-4898 (2023) - [c136]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549 - [c135]Jeongyong Park, Bedeuro Kim, Hyoungshick Kim:
MENDEL: Time series anomaly detection using transfer learning for industrial control systems. BigComp 2023: 261-268 - [c134]Min Jang, Yuna Hwang, Yonghwi Kwon, Hyoungshick Kim:
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols. ICISC (2) 2023: 20-38 - [c133]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
Smartmark: Software Watermarking Scheme for Smart Contracts. ICSE 2023: 283-294 - [c132]Nivedita Singh, Mohsen Ali Alawami, Hyoungshick Kim:
When social networks meet payment: a security perspective. IMCOM 2023: 1-6 - [c131]Taeyoung Kim, Seonhye Park, Hyoungshick Kim:
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. RAID 2023: 669-685 - [c130]Dongwon Lee, Myeonghwan Ahn, Hyesun Kwak, Jin B. Hong, Hyoungshick Kim:
BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption. SRDS 2023: 35-45 - [c129]Sanghak Oh, Minwook Lee, Hyunwoo Lee, Elisa Bertino, Hyoungshick Kim:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i26]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
SmartMark: Software Watermarking Scheme for Smart Contracts. CoRR abs/2303.13733 (2023) - [i25]Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed:
Single-Class Target-Specific Attack against Interpretable Deep Learning Systems. CoRR abs/2307.06484 (2023) - [i24]Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. CoRR abs/2312.06227 (2023) - [i23]Hyunmin Choi, Simon S. Woo, Hyoungshick Kim:
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication. CoRR abs/2312.11575 (2023) - 2022
- [j50]Mohsen Ali Alawami, Aishwarya Ram Vinay, Hyoungshick Kim:
LocID: A Secure and Usable Location-Based Smartphone Unlocking Scheme Using Wi-Fi Signals and Light Intensity. IEEE Internet Things J. 9(23): 24357-24372 (2022) - [j49]Yansong Gao, Minki Kim, Chandra Thapa, Alsharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. IEEE Trans. Computers 71(10): 2538-2552 (2022) - [j48]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2349-2364 (2022) - [j47]Taegeun Moon, Hyoungshick Kim, Sangwon Hyun:
Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks. ACM Trans. Web 16(4): 21:1-21:20 (2022) - [c128]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. AsiaCCS 2022: 1269-1270 - [c127]Kiho Lee, Sanghak Oh, Hyoungshick Kim:
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. CCS 2022: 3387-3389 - [c126]Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
VulDeBERT: A Vulnerability Detection System Using BERT. ISSRE Workshops 2022: 69-74 - [e2]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9178-8 [contents] - [i22]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i21]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i20]Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim:
Systematically Evaluation of Challenge Obfuscated APUFs. CoRR abs/2203.15316 (2022) - [i19]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022) - 2021
- [j46]Bong Gon Kim, Young-Seob Cho, Seok-Hyun Kim, Hyoungshick Kim, Simon S. Woo:
A Security Analysis of Blockchain-Based Did Services. IEEE Access 9: 22894-22913 (2021) - [j45]Lihui Pang, Hyoungshick Kim, Bin Yang, Xinlin Wang, Yansong Gao:
Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks. IEEE Access 9: 168193-168206 (2021) - [j44]William Aiken, Hyoungshick Kim, Simon S. Woo, Jungwoo Ryoo:
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks. Comput. Secur. 106: 102277 (2021) - [c125]Beom Heyn Kim, Hyoungshick Kim:
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. ACSAC 2021: 285-296 - [c124]Larry Huynh, Thai Nguyen, Joshua Goh, Hyoungshick Kim, Jin B. Hong:
ARGH!: Automated Rumor Generation Hub. CIKM 2021: 3847-3856 - [c123]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74 - [c122]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260 - [c121]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c120]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN. SAC 2021: 952-959 - [c119]Beomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong:
FUMVar: a practical framework for generating fully-working and unseen malware variants. SAC 2021: 1656-1663 - [c118]Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim:
Towards Usable and Secure Location-based Smartphone Authentication. SOUPS @ USENIX Security Symposium 2021: 1-16 - [c117]Jeongseok Choi, Hyoungshick Kim:
On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. WISA 2021: 39-50 - [e1]Hyoungshick Kim:
Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13009, Springer 2021, ISBN 978-3-030-89431-3 [contents] - [i18]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN. CoRR abs/2101.04319 (2021) - [i17]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021) - [i16]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021) - [i15]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i14]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - 2020
- [j43]Younghwan Kim, Huy Kang Kim, Hyoungshick Kim, Jin B. Hong:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j42]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics. IEEE Consumer Electron. Mag. 9(2): 34-40 (2020) - [j41]Jinyong Tim Kim, Eunsoo Kim, Jinhyuk Yang, Jaehoon Jeong, Hyoungshick Kim, Sangwon Hyun, Hyunsik Yang, Jaewook Oh, Younghan Kim, Susan Hares, Linda Dunbar:
IBCS: Intent-Based Cloud Services for Security Applications. IEEE Commun. Mag. 58(4): 45-51 (2020) - [j40]Mohsen Ali Alawami, Hyoungshick Kim:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. Comput. Secur. 89 (2020) - [j39]Eunsoo Kim, Young-Seob Cho, Bedeuro Kim, Woojoong Ji, Seok-Hyun Kim, Simon S. Woo, Hyoungshick Kim:
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google? IEEE Internet Things Mag. 3(4): 82-87 (2020) - [j38]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [j37]Seungjin Lee, Hyoungshick Kim:
On the robustness of Lightning Network in Bitcoin. Pervasive Mob. Comput. 61: 101108 (2020) - [j36]Taeyun Kim, Yongwoo Oh, Hyoungshick Kim:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. Secur. Commun. Networks 2020: 4195852:1-4195852:11 (2020) - [j35]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, JaeSeung Song:
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors 20(3): 928 (2020) - [j34]Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, Dongho Won:
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 20(24): 7136 (2020) - [j33]Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. 23(4): 22:1-22:32 (2020) - [c116]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. ACISP 2020: 461-475 - [c115]Hanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim:
Design and Evaluation of Enumeration Attacks on Package Tracking Systems. ACISP 2020: 543-559 - [c114]Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo:
PassTag: A Graphical-Textual Hybrid Fallback Authentication System. AsiaCCS 2020: 60-72 - [c113]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? AsiaCCS 2020: 305-318 - [c112]Jihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea. Financial Cryptography Workshops 2020: 3-17 - [c111]Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. IMCOM 2020: 1-4 - [c110]Gilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim:
eAPT: enhancing APT with a mirror site resolver. ISSRE Workshops 2020: 117-122 - [c109]Jusop Choi, Soolin Kim, Junsung Cho, Kuyju Kim, Seok Hong, Hyoungshick Kim:
ACIDroid: a practical app cache integrity protection system on Android Runtime. SAC 2020: 376-383 - [c108]Eunyong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim, Ian Oakley:
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies. SP 2020: 249-267 - [c107]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. SRDS 2020: 91-100 - [c106]Bonha Koo, Taegeun Moon, Hyoungshick Kim:
MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management. SVCC 2020: 98-108 - [c105]Aishwarya Ram Vinay, Mohsen Ali Alawami, Hyoungshick Kim:
ConTheModel: Can We Modify Tweets to Confuse Classifier Models? SVCC 2020: 205-219 - [c104]Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - [c103]Simon S. Woo, Hanbin Jang, Woojung Ji, Hyoungshick Kim:
I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks. WWW 2020: 2948-2954 - [i13]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? CoRR abs/2003.12365 (2020) - [i12]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. CoRR abs/2003.13376 (2020) - [i11]William Aiken, Hyoungshick Kim, Simon S. Woo:
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks. CoRR abs/2004.11368 (2020) - [i10]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. CoRR abs/2006.08885 (2020) - [i9]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020) - [i8]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
2010 – 2019
- 2019
- [j32]Mahdi Daghmehchi Firoozjaei, MinChang Kim, JaeSeung Song, Hyoungshick Kim:
O2TR: Offline OTR messaging system under network disruption. Comput. Secur. 82: 227-240 (2019) - [j31]Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim:
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger. Digit. Investig. 28 Supplement: S50-S59 (2019) - [j30]Keuntae Lee, Seokhwa Kim, Jaehoon (Paul) Jeong, Sejun Lee, Hyoungshick Kim, Jung-Soo Park:
A framework for DNS naming services for Internet-of-Things devices. Future Gener. Comput. Syst. 92: 617-627 (2019) - [j29]Muhammad Ejaz Ahmed, Saeed Ullah, Hyoungshick Kim:
Statistical Application Fingerprinting for DDoS Attack Mitigation. IEEE Trans. Inf. Forensics Secur. 14(6): 1471-1484 (2019) - [j28]Jinyong Kim, Seokhwa Kim, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, Taeho Kim:
CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks. IEEE Trans. Intell. Transp. Syst. 20(11): 4174-4191 (2019) - [c102]Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim:
Automated Cash Mining Attacks on Mobile Advertising Networks. ACISP 2019: 679-686 - [c101]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. AFT 2019: 169-182 - [c100]Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo:
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. AsiaCCS 2019: 352-365 - [c99]Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim:
Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. CCS 2019: 2553-2555 - [c98]Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim:
Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. CCS 2019: 2557-2559 - [c97]Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API. CCS 2019: 2593-2595 - [c96]Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Junsung Cho, Geumhwan Cho, Hyoungshick Kim, Jina Kang:
Data-Driven Selection of Security Application Frameworks During Architectural Design. HICSS 2019: 1-10 - [c95]Eunil Seo, Hyoungshick Kim, Tai-Myoung Chung:
Profiling-Based Classification Algorithms for Security Applications in Internet of Things. ICIOT 2019: 138-146 - [c94]Yongwoo Oh, Taeyun Kim, Hyoungshick Kim:
Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations. IMCOM 2019: 761-768 - [c93]Mohsen Ali Alawami, William Aiken, Hyoungshick Kim:
The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor. MobiSys 2019: 560-561 - [c92]Daehwa Rayer Lee, Yunhee Jang, Hanbin Jang, Hyoungshick Kim:
80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus. MobiSys 2019: 639-640 - [c91]Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong:
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning. PRDC 2019: 246-255 - [c90]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, Jaeseung Song:
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging. PST 2019: 1-5 - [c89]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? IEEE Symposium on Security and Privacy 2019: 935-951 - [i7]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? CoRR abs/1902.11064 (2019) - [i6]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. CoRR abs/1908.10781 (2019) - [i5]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith Chinthana Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. CoRR abs/1911.10312 (2019) - 2018
- [j27]Junsung Cho, Dayeon Kim, Hyoungshick Kim:
User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies. IEEE Consumer Electron. Mag. 7(3): 48-55 (2018) - [j26]Sangwon Hyun, Jinyong Kim, Hyoungshick Kim, Jaehoon Jeong, Susan Hares, Linda Dunbar, Adrian Farrel:
Interface to Network Security Functions for Cloud-Based Security Services. IEEE Commun. Mag. 56(1): 171-178 (2018) - [j25]DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j24]Sangwon Hyun, Junsung Cho, Geumhwan Cho, Hyoungshick Kim:
Design and Analysis of Push Notification-Based Malware on Android. Secur. Commun. Networks 2018: 8510256:1-8510256:12 (2018) - [j23]Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - [j22]Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, Dongho Won:
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors 18(12): 4481 (2018) - [j21]Sangwon Hyun, Hyoungshick Kim:
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c88]Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim:
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. ARES 2018: 18:1-18:10 - [c87]Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. AsiaCCS 2018: 75-87 - [c86]William Aiken, Hyoungshick Kim:
POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. AsiaCCS 2018: 797-799 - [c85]Taeyun Kim, Hyoungshick Kim:
POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. AsiaCCS 2018: 813-815 - [c84]Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim:
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. AsiaCCS 2018: 833-835 - [c83]Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin, Hyoungshick Kim:
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules. CFI 2018: 7:1-7:5 - [c82]Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. CIC 2018: 272-278 - [c81]Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, Dongho Won:
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks. ICCSA (2) 2018: 50-61 - [c80]Sangmin Lee, Kuyju Kim, Jina Kang, Hyoungshick Kim:
Bypassing DRM protection in e-book applications on Android. ICOIN 2018: 194-198 - [c79]Taekkyung Oh, William Aiken, Hyoungshick Kim:
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). ICSSA 2018: 73-76 - [c78]William Aiken, Hyoungshick Kim:
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). ICSSA 2018: 81 - [c77]Daehwa Rayer Lee, Hyoungshick Kim:
An Analysis of Research Trends in Computer Security over the Last Decade. ICSSA 2018: 86-89 - [c76]Wonseok Choi, Hyoungshick Kim:
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). ICSSA 2018: 91 - [c75]Eunsoo Kim, Kuyju Kim, Seungjin Lee, Jaehoon Paul Jeong, Hyoungshick Kim:
A Framework for Managing User-defined Security Policies to Support Network Security Functions. IMCOM 2018: 85:1-85:8 - [c74]Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim:
When Harry Met Tinder: Security Analysis of Dating Apps on Android. NordSec 2018: 454-467 - [c73]William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson:
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. PST 2018: 1-6 - [c72]Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo:
Threat Modeling and Analysis of Voice Assistant Applications. WISA 2018: 197-209 - [c71]Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh, Ji Won Yoon:
I'm Listening to your Location! Inferring User Location with Acoustic Side Channels. WWW 2018: 339-348 - [c70]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. WWW 2018: 1825-1834 - [i4]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. CoRR abs/1801.06368 (2018) - 2017
- [j20]Jong-Hyouk Lee, Hyoungshick Kim:
Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters]. IEEE Consumer Electron. Mag. 6(3): 134-136 (2017) - [j19]Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song, Hyoungshick Kim:
Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study. IEEE Commun. Mag. 55(3): 132-137 (2017) - [j18]Mahdi Daghmehchi Firoozjaei, Jaegwan Yu, Hyoung-Kee Choi, Hyoungshick Kim:
Privacy-preserving nearest neighbor queries using geographical features of cellular networks. Comput. Commun. 98: 11-19 (2017) - [j17]Mahdi Daghmehchi Firoozjaei, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim:
Security challenges with network functions virtualization. Future Gener. Comput. Syst. 67: 315-324 (2017) - [j16]Joonghwan Lee, Jae Woo Seo, Hoon Ko, Hyoungshick Kim:
TARD: Temporary Access Rights Delegation for guest network devices. J. Comput. Syst. Sci. 86: 59-69 (2017) - [j15]Junsung Cho, Geumhwan Cho, Sangwon Hyun, Hyoungshick Kim:
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices. J. Internet Serv. Inf. Secur. 7(4): 35-44 (2017) - [c69]Hyoungshick Kim:
Design of a Secure Digital Recording Protection System with Network Connected Devices. AINA Workshops 2017: 375-378 - [c68]Jusop Choi, Jaewoo Park, Hyoungshick Kim:
Forensic analysis of the backup database file in KakaoTalk messenger. BigComp 2017: 156-161 - [c67]M. Ejaz Ahmed, Hyoungshick Kim:
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. BigDataService 2017: 271-276 - [c66]Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh:
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. AsiaCCS 2017: 313-326 - [c65]Muhammad Ejaz Ahmed, Hyoungshick Kim:
Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data. CCS 2017: 2467-2469 - [c64]Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba, Konstantin Beznosov:
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. CHI 2017: 387-391 - [c63]Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim:
Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN. ESORICS (2) 2017: 135-152 - [c62]Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. ICDIM 2017: 139-143 - [c61]Jaewoo Park, Hyoungshick Kim:
k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files. ICISA 2017: 388-395 - [c60]Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis:
IoE Security Threats and You. ICSSA 2017: 13-19 - [c59]Sangjun Ko, Jusop Choi, Hyoungshick Kim:
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools. ICSSA 2017: 32-37 - [c58]Sanghak Oh, Eunsoo Kim, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim:
A flexible architecture for orchestrating network security functions to support high-level security policies. IMCOM 2017: 44 - [c57]Jaekwang Kim, Hyoungshick Kim, Jee-Hyong Lee:
Analysis and comparison of fax spam detection algorithms. IMCOM 2017: 58 - [c56]Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser:
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. ISPEC 2017: 663-677 - [c55]Muhammad Ejaz Ahmed, Hyoungshick Kim, Moosung Park:
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking. MILCOM 2017: 11-16 - [c54]Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim:
SysPal: System-Guided Pattern Locks for Android. IEEE Symposium on Security and Privacy 2017: 338-356 - [c53]Mahdi Daghmehchi Firoozjaei, Sangmin Lee, Hyoungshick Kim:
O2TR: Offline Off-the-Record (OTR) Messaging. WISA 2017: 61-71 - [i3]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. IACR Cryptol. ePrint Arch. 2017: 73 (2017) - 2016
- [j14]Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi, Hyoungshick Kim:
Combating online fraud attacks in mobile-based advertising. EURASIP J. Inf. Secur. 2016: 2 (2016) - [j13]Hyoung-Kee Choi, Ki-Eun Shin, Hyoungshick Kim:
A Healthcare Information System for Secure Delivery and Remote Management of Medical Records. IEICE Trans. Inf. Syst. 99-D(4): 883-890 (2016) - [j12]Andrea Bianchi, Ian Oakley, Hyoungshick Kim:
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords. IEEE Trans. Hum. Mach. Syst. 46(3): 380-389 (2016) - [c52]Youngbae Song, Hyoungshick Kim, Jun Ho Huh:
On the Guessability of Resident Registration Numbers in South Korea. ACISP (1) 2016: 128-138 - [c51]Mahdi Daghmechi Firoozjaei, Jaewoo Park, Hyoungshick Kim:
Detecting False Emergency Requests Using Callers' Reporting Behaviors and Locations. AINA Workshops 2016: 243-247 - [c50]Jinyong Kim, Jinho Lee, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, Taeho Kim:
SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks. AINA Workshops 2016: 248-251 - [c49]Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim:
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack. CCS 2016: 1835-1837 - [c48]Sora Lee, Jinwoo Kim, Sangjun Ko, Hyoungshick Kim:
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning. ICSSA 2016: 43-48 - [c47]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. ICSSA 2016: 49-53 - [c46]Daeyoung Hyun, Jinyong Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jung-Soo Park, Taejin Ahn:
SDN-based network security functions for VoIP and VoLTE services. ICTC 2016: 298-302 - [c45]Priya Anand, Jungwoo Ryoo, Hyoungshick Kim, Eunhyun Kim:
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection. IMCOM 2016: 5:1-5:8 - [c44]Jusop Choi, William Aiken, Jungwoo Ryoo, Hyoungshick Kim:
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service. IMCOM 2016: 62:1-62:5 - [c43]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim:
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. NDSS 2016 - [c42]Seunghun Cha, Hyoungshick Kim:
Detecting Encrypted Traffic: A Machine Learning Approach. WISA 2016: 54-65 - [c41]Matthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim:
Towards Automated Exploit Generation for Embedded Systems. WISA 2016: 161-173 - [c40]Sanghak Oh, Eunsoo Kim, Hyoungshick Kim:
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares? WISA 2016: 174-185 - 2015
- [j11]Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song:
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk. Comput. Secur. 52: 267-275 (2015) - [j10]Jaeseung Song, Hyoungshick Kim, Soojin Park:
Enhancing Conformance Testing Using Symbolic Execution for Network Protocols. IEEE Trans. Reliab. 64(3): 1024-1037 (2015) - [c39]Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim:
An Empirical Study of Click Fraud in Mobile Advertising Networks. ARES 2015: 382-388 - [c38]Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:
SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks. AINA Workshops 2015: 141-145 - [c37]Mahdi Daghmechi Firoozjaei, Jaegwan Yu, Hyoungshick Kim:
Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks. AINA Workshops 2015: 146-149 - [c36]Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim, Jung-Soo Park:
A Framework for Security Services Based on Software-Defined Networking. AINA Workshops 2015: 150-153 - [c35]Hyunsu Jang, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:
A Survey on Interfaces to Network Security Functions in Network Virtualization. AINA Workshops 2015: 160-163 - [c34]Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan:
Surpass: System-initiated User-replaceable Passwords. CCS 2015: 170-181 - [c33]Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, Jun Ho Huh:
On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks. CHI 2015: 2343-2352 - [c32]Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon:
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. ICSSA 2015: 7-12 - [c31]Priya Anand, Jungwoo Ryoo, Hyoungshick Kim:
Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach. ICSSA 2015: 13-18 - [c30]Daehyun Kim, Hyoungshick Kim:
Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable! ICSSA 2015: 25-29 - [c29]Jinyong Kim, Mahdi Daghmehchi Firoozjaei, Jaehoon Paul Jeong, Hyoungshick Kim, Jung-Soo Park:
SDN-based security services using interface to network security functions. ICTC 2015: 526-529 - [c28]William Aiken, Jungwoo Ryoo, Hyoungshick Kim:
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services. IMCOM 2015: 20:1-20:6 - [c27]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. IH&MMSec 2015: 65-74 - [c26]Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh:
Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. ISPEC 2015: 548-558 - [c25]Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim:
Devil in a box: Installing backdoors in electronic door locks. PST 2015: 139-144 - [c24]Junsung Cho, Geumhwan Cho, Hyoungshick Kim:
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. PST 2015: 173-176 - [c23]Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? SOUPS 2015: 197-209 - [c22]Kyungwon Park, Hyoungshick Kim:
Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis. WISA 2015: 254-265 - 2014
- [c21]Hyoungshick Kim:
Don't count the number of friends when you are spreading information in social networks. ICUIMC 2014: 43:1-43:7 - [c20]Youngbae Song, Hyoungshick Kim, Aziz Mohaisen:
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. TrustBus 2014: 72-82 - [c19]Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song:
I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger. WISA 2014: 55-67 - [c18]Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh:
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions. WISA 2014: 68-79 - [c17]Hyoungshick Kim, Konstantin Beznosov, Eiko Yoneki:
Finding influential neighbors to maximize information diffusion in twitter. WWW (Companion Volume) 2014: 701-706 - 2013
- [j9]Hyoungshick Kim, Ross J. Anderson:
An Experimental Evaluation of Robustness of Networks. IEEE Syst. J. 7(2): 179-188 (2013) - [j8]Antoine Boutet, Hyoungshick Kim, Eiko Yoneki:
What's in Twitter, I know what parties are popular and who you are supporting now! Soc. Netw. Anal. Min. 3(4): 1379-1391 (2013) - [c16]Daehyun Kim, Hyoungshick Kim:
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous. WISA 2013: 163-173 - 2012
- [b1]Hyoungshick Kim:
Complex network analysis for secure and robust communications. University of Cambridge, UK, 2012 - [j7]Hyoungshick Kim, John Kit Tang, Ross J. Anderson, Cecilia Mascolo:
Centrality prediction in dynamic human contact networks. Comput. Networks 56(3): 983-996 (2012) - [j6]Hyoungshick Kim, Jun Ho Huh:
PIN selection policies: Are they really effective? Comput. Secur. 31(4): 484-496 (2012) - [j5]Yunsang Oh, Hyoungshick Kim, Takashi Obi:
Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers. IEICE Trans. Inf. Syst. 95-D(1): 143-151 (2012) - [j4]Hyoungshick Kim, Ji Won Yoon, Jon Crowcroft:
Network analysis of temporal trends in scholarly research productivity. J. Informetrics 6(1): 97-110 (2012) - [c15]Antoine Boutet, Hyoungshick Kim, Eiko Yoneki:
What's in Twitter: I Know What Parties are Popular and Who You are Supporting Now! ASONAM 2012: 132-139 - [c14]Hyoungshick Kim, John Kit Tang, Ross J. Anderson:
Social Authentication: Harder Than It Looks. Financial Cryptography 2012: 1-15 - [c13]Hyoungshick Kim, Eiko Yoneki:
Influential Neighbours Selection for Information Diffusion in Online Social Networks. ICCCN 2012: 1-7 - [c12]Antoine Boutet, Hyoungshick Kim, Eiko Yoneki:
What's in Your Tweets? I Know Who You Supported in the UK 2010 General Election. ICWSM 2012 - [c11]Hyoungshick Kim, Jon Crowcroft, Fernando M. V. Ramos:
Efficient channel selection using hierarchical clustering. WOWMOM 2012: 1-9 - [c10]John Kit Tang, Hyoungshick Kim, Cecilia Mascolo, Mirco Musolesi:
STOP: Socio-Temporal Opportunistic Patching of short range mobile malware. WOWMOM 2012: 1-9 - 2011
- [j3]Hyoungshick Kim, Jaehoon Jeong:
RAD: Recipient-anonymous data delivery based on public routing proxies. Comput. Networks 55(15): 3469-3484 (2011) - [j2]Ji Won Yoon, Hyoungshick Kim:
A Perfect Collision-Free Pseudonym System. IEEE Commun. Lett. 15(6): 686-688 (2011) - [c9]Jun Ho Huh, Hyoungshick Kim, John Lyle, Andrew P. Martin:
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting. STC@CCS 2011: 31-36 - [c8]Jun Ho Huh, Hyoungshick Kim:
Phishing Detection with Popular Search Engines: Simple and Effective. FPS 2011: 194-207 - [c7]Ji Won Yoon, Hyoung-joo Lee, Hyoungshick Kim:
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels. ICUIMC 2011: 57 - 2010
- [j1]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid spam filtering for mobile communication. Comput. Secur. 29(4): 446-459 (2010)
2000 – 2009
- 2009
- [c6]Hyoungshick Kim, Joseph Bonneau:
Privacy-enhanced public view for social graphs. CIKM-SWSM 2009: 41-48 - [c5]Hyoungshick Kim:
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search. DPM/SETOP 2009: 93-105 - [c4]Ji Won Yoon, Hyoungshick Kim:
A new collision-free pseudonym scheme in mobile ad hoc networks. WiOpt 2009: 1-5 - [i2]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid Spam Filtering for Mobile Communication. CoRR abs/0908.2462 (2009) - [i1]Hyoungshick Kim, Ji Won Yoon:
How to Compare the Scientific Contributions between Research Groups. CoRR abs/0911.0050 (2009) - 2007
- [c3]Hyoungshick Kim:
Scalable DRM System for Media Portability. ASIAN 2007: 78-85 - [c2]Hyoungshick Kim:
N-Times Consumable Digital Ticket and Its Application to Content Access Service. CCNC 2007: 140-144 - [c1]Hyoungshick Kim, S. Jae Oh:
Self-authorized Public Key Management for Home Networks. EUC Workshops 2007: 425-434
Coauthor Index
aka: Sharif Abuadbba
aka: Muhammad Ejaz Ahmed
aka: Mahdi Daghmehchi Firoozjaei
aka: Jun Ho Huh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint