Kim, Hyoungshick
209  Ergebnisse:
Personensuche X
?
2

AdFlush: A Real-World Deployable Machine Learning Solution ..:

, In: Proceedings of the ACM on Web Conference 2024,
Lee, Kiho ; Lim, Chaejin ; Jin, Beomjin.. - p. 1902-1913 , 2024
 
?
3

(In)visible Privacy Indicator: Security Analysis of Privacy..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Choe, Yurak ; Yu, Hyungseok ; Kim, Taeho... - p. 1630-1643 , 2024
 
?
4

SingleADV: Single-Class Target-Specific Attack Against Inte..:

Abdukhamidov, Eldor ; Abuhamad, Mohammed ; Thiruvathukal, George K...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 5985-5998 , 2024
 
?
5

BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth P..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023,
Jang, Min ; Hwang, Yuna ; Kwon, Yonghwi. - p. 20-38 , 2024
 
?
6

DID We Miss Anything?: Towards Privacy-Preserving Decentral..:

Huh, Siwon ; Shim, Myungkyu ; Lee, Jihwan...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  6 - p. 4881-4898 , 2023
 
?
7

When social networks meet payment: a security perspective:

, In: 2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM),
 
?
8

Why Johnny Can't Use Secure Docker Images: Investigating th..:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
Kim, Taeyoung ; Park, Seonhye ; Kim, Hyoungshick - p. 669-685 , 2023
 
?
9

Smartmark: Software Watermarking Scheme for Smart Contracts:

, In: 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE),
Kim, Taeyoung ; Jang, Yunhee ; Lee, Chanjong.. - p. 283-294 , 2023
 
?
10

On the Long-Term Effects of Continuous Keystroke Authentica..:

Huh, Jun Ho ; Kwag, Sungsu ; Kim, Iljoo...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.  7 (2023)  2 - p. 1-32 , 2023
 
?
11

Design and evaluation of highly accurate smart contract cod..:

Jeon, Sowon ; Lee, Gilhee ; Kim, Hyoungshick.
Data Mining and Knowledge Discovery.  38 (2023)  3 - p. 888-912 , 2023
 
?
12

An ICN-Based Data Marketplace Model Based on a Game Theoret..:

Seo, Eunil ; Kim, Hyoungshick ; Krishnamachari, Bhaskar.
IEEE Transactions on Cloud Computing.  11 (2023)  2 - p. 2110-2126 , 2023
 
?
13

BlindFilter: Privacy-Preserving Spam Email Detection Using ..:

, In: 2023 42nd International Symposium on Reliable Distributed Systems (SRDS),
Lee, Dongwon ; Ahn, Myeonghwan ; Kwak, Hyesun.. - p. 35-45 , 2023
 
?
14

PP–GSM: Privacy-preserving graphical security model for sec..:

Lee, Dongwon ; Oh, Yongwoo ; Hong, Jin B...
Future Generation Computer Systems.  142 (2023)  - p. 351-363 , 2023
 
1-15