Department of Computer Science and Engineering

Filter
Conference contribution

Search results

  • Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Activity-based security scheme for ubiquitous environments

    Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Activity-oriented access control for ubiquitous environments

    Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A denoised embedding space of genetic perturbation using Deep Metric Learning

    Ju, M., Lee, S. & Kang, J., 2022, Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022. Unger, H., Kim, Y-K., Hwang, E., Cho, S-B., Pareigis, S., Kyandoghere, K., Ha, Y-G., Kim, J., Morishima, A., Wagner, C., Kwon, H-Y., Moon, Y-S. & Leung, C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 378-381 4 p. (Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adversarial subword regularization for robust neural machine translation

    Park, J., Sung, M., Lee, J. & Kang, J., 2020, Findings of the Association for Computational Linguistics Findings of ACL: EMNLP 2020. Association for Computational Linguistics (ACL), p. 1945-1953 9 p. (Findings of the Association for Computational Linguistics Findings of ACL: EMNLP 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BARI: A distributed key management approach for wireless body area networks

    Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • BeaconRider: Opportunistic sharing of beacon air-time in densely deployed WLANs

    Lee, H., Kim, J., Joo, C. & Bahk, S., 2019 Oct, 27th IEEE International Conference on Network Protocols, ICNP 2019. IEEE Computer Society, 8888044. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • BLESS: BLE-aided swift Wi-Fi scanning in multi-protocol IoT networks

    Park, W., Ryoo, D., Joo, C. & Bahk, S., 2021 May 10, INFOCOM 2021 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 9488795. (Proceedings - IEEE INFOCOM; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BotGAD: Detecting botnets by capturing group activities in network traffic

    Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    89 Citations (Scopus)
  • CacheRewinder: Revoking Speculative Cache Updates Exploiting Write-Back Buffer

    Lee, J., Lee, J., Suh, T. & Koo, G., 2022, Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022. Bolchini, C., Verbauwhede, I. & Vatajelu, I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 514-519 6 p. (Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Can Language Models be Biomedical Knowledge Bases?

    Sung, M., Lee, J., Yi, S. S., Jeon, M., Kim, S. & Kang, J., 2021, EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings. Association for Computational Linguistics (ACL), p. 4723-4734 12 p. (EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

    Woo, S., Park, S., Kim, S., Lee, H. & Oh, H., 2021 May, Proceedings - 2021 IEEE/ACM 43rd International Conference on Software Engineering, ICSE 2021. IEEE Computer Society, p. 860-872 13 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Comparison of decentralized and centralized update paradigms for remote tracking of distributed dynamic sources

    Kang, S., Eryilmaz, A. & Joo, C., 2021 May 10, INFOCOM 2021 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 9488777. (Proceedings - IEEE INFOCOM; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Constructing and evaluating a novel crowdsourcing-based paraphrased opinion spam dataset

    Kim, S., Lee, S., Park, D. & Kang, J., 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 827-836 10 p. 3052607. (26th International World Wide Web Conference, WWW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

    Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Deep semantic frame-based deceptive opinion spam analysis

    Kim, S., Chang, H., Lee, S., Yu, M. & Kang, J., 2015 Oct 17, CIKM 2015 - Proceedings of the 24th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1131-1140 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 19-23-Oct-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Citations (Scopus)
  • Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions

    Hong, H., Woo, S. & Lee, H., 2021 Dec 6, Proceedings - 37th Annual Computer Security Applications Conference, ACSAC 2021. Association for Computing Machinery, p. 194-206 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • DroidGraph: Discovering Android malware by analyzing semantic behavior

    Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Dec 23, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • FassKey: A secure and convenient authentication system

    Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • HICCUP: Hierarchical clustering based value imputation using heterogeneous gene expression microarray datasets

    Zhao, Q., Mitra, P., Lee, D. & Kang, J., 2007, Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE. p. 71-78 8 p. 4375547. (Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • HotR: End-to-End Human-Object Interaction Detection with Transformers

    Kim, B., Lee, J., Kang, J., Kim, E. S. & Kim, H. J., 2021, Proceedings - 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2021. IEEE Computer Society, p. 74-83 10 p. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • How to divide a permission token in the delegation process of blockchain-based access control for IoT

    Heo, J., Jang, H. & Lee, H., 2022, SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., (SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Image-feature based human identification protocols on limited display devices

    Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Improved Binding Affinity Prediction Using Non-Covalent Interactions and Graph Integration

    Choe, J., Kim, K., Ju, M., Lee, S. & Kang, J., 2022, Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022. Unger, H., Kim, Y-K., Hwang, E., Cho, S-B., Pareigis, S., Kyandoghere, K., Ha, Y-G., Kim, J., Morishima, A., Wagner, C., Kwon, H-Y., Moon, Y-S. & Leung, C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 357-359 3 p. (Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving grouped-entity resolution using Quasi-Cliques

    On, B. W., Elmacioglu, E., Lee, D., Kangt, J. & Pei, J., 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. Institute of Electrical and Electronics Engineers Inc., p. 1008-1015 8 p. 4053144. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • Information Update for Multi-source Remote Estimation in Real-time Monitoring Networks

    Yun, J. & Joo, C., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 633-635 3 p. 8940006. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Learning dense representations of phrases at scale

    Lee, J., Sung, M., Kang, J. & Chen, D., 2021, ACL-IJCNLP 2021 - 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 6634-6647 14 p. (ACL-IJCNLP 2021 - 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Proceedings of the Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Learning Graph-Based Geographical Latent Representation for Point-of-Interest Recommendation

    Chang, B., Jang, G., Kim, S. & Kang, J., 2020 Oct 19, CIKM 2020 - Proceedings of the 29th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 135-144 10 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Learn to resolve conversational dependency: A consistency training framework for conversational question answering

    Kim, G., Kim, H., Park, J. & Kang, J., 2021, ACL-IJCNLP 2021 - 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 6130-6141 12 p. (ACL-IJCNLP 2021 - 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Proceedings of the Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Lightweight resource management for DDoS traffic isolation in a cloud environment

    Mubarok, I., Lee, K., Lee, S. & Lee, H., 2014, IFIP Advances in Information and Communication Technology. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (eds.). Springer New York LLC, p. 44-51 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Look at the first sentence: Position bias in question answering

    Ko, M., Lee, J., Kim, H., Kim, G. & Kang, J., 2020, EMNLP 2020 - 2020 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 1109-1121 13 p. (EMNLP 2020 - 2020 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • MAPS: Multi-agent reinforcement learning-based portfolio management system

    Lee, J., Kim, R., Yi, S. W. & Kang, J., 2020, Proceedings of the 29th International Joint Conference on Artificial Intelligence, IJCAI 2020. Bessiere, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4520-4526 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android

    Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H. & Milburn, J., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 6999415. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Neo-GNNs: Neighborhood Overlap-aware Graph Neural Networks for Link Prediction

    Yun, S., Kim, S., Lee, J., Kang, J. & Kim, H. J., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, MA., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (eds.). Neural information processing systems foundation, p. 13683-13694 12 p. (Advances in Neural Information Processing Systems; vol. 17).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept

    Kwon, S., Woo, S., Seong, G. & Lee, H., 2021 Jun, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021. Institute of Electrical and Electronics Engineers Inc., p. 174-185 12 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • On the CDN Pricing Strategies in the Internet Traffic Delivery Chain

    Lee, S. & Joo, C., 2021 Jan 13, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 680-682 3 p. 9333859. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Pre-trained Language Model for Biomedical Question Answering

    Yoon, W., Lee, J., Kim, D., Jeong, M. & Kang, J., 2020, Machine Learning and Knowledge Discovery in Databases - International Workshops of ECML PKDD 2019, Proceedings. Cellier, P. & Driessens, K. (eds.). Springer, p. 727-740 14 p. (Communications in Computer and Information Science; vol. 1168 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Prett: Protocol reverse engineering using binary tokens and network traces

    Lee, C., Bae, J. & Lee, H., 2018, ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings. Janczewski, L. J. & Kutyłowski, M. (eds.). Springer, p. 141-155 15 p. (IFIP Advances in Information and Communication Technology; vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection

    Jang, H., Yang, K., Lee, G., Na, Y., Seideman, J. D., Luo, S., Lee, H. & Dietrich, S., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 66-82 17 p. (IFIP Advances in Information and Communication Technology; vol. 625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)