Jee, Kangkook
27  results:
Search for persons X
?
1

ProvIoT : Detecting Stealthy Attacks in IoT through Federat..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Mukherjee, Kunal ; Wiedemeier, Joshua ; Wang, Qi... - p. 241-268 , 2024
 
?
2

An Investigation on the Fragility of Graph Neural Networks:..:

, In: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
Wang, Chengen ; Zhou, Yan ; Jee, Kangkook. - p. 169-176 , 2023
 
?
3

Advanced Persistent Threat Detection Using Data Provenance ..:

Akbar, Khandakar Ashrafi ; Wang, Yigong ; Ayoade, Gbadebo...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  5 - p. 3957-3969 , 2023
 
?
4

UTrack : Enterprise User Tracking Based on OS-Level Audi..:

, In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy,
Li, Yue ; Wu, Zhenyu ; Wang, Haining... - p. 161-172 , 2021
 
?
5

Evolving Advanced Persistent Threat Detection using Provena..:

, In: 2020 IEEE Conference on Communications and Network Security (CNS),
 
?
6

APTrace: A Responsive System for Agile Enterprise Level Cau..:

, In: 2020 IEEE 36th International Conference on Data Engineering (ICDE),
Gui, Jiaping ; Li, Ding ; Chen, Zhengzhang... - p. 1701-1712 , 2020
 
?
7

This is Why We Can't Cache Nice Things: Lightning-Fast Thre..:

, In: Annual Computer Security Applications Conference,
Hassan, Wajih Ul ; Li, Ding ; Jee, Kangkook... - p. 165-178 , 2020
 
?
8

Detecting Malware Injection with Program-DNS Behavior:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
Sun, Yixin ; Jee, Kangkook ; Sivakorn, Suphannee... - p. 552-568 , 2020
 
?
9

Querying Streaming System Monitoring Data for Enterprise Sy..:

, In: 2020 IEEE 36th International Conference on Data Engineering (ICDE),
Gao, Peng ; Xiao, Xusheng ; Li, Ding... - p. 1774-1777 , 2020
 
?
10

A query system for efficiently investigating complex attack..:

Gao, Peng ; Xiao, Xusheng ; Li, Zhichun...
Proceedings of the VLDB Endowment.  12 (2019)  12 - p. 1802-1805 , 2019
 
?
11

A query system for efficiently investigating complex attack..:

Gao, Peng ; Xiao, Xusheng ; Li, Zhichun...
Proceedings of the VLDB Endowment.  12 (2019)  12 - p. 1802-1805 , 2019
 
?
12

NodeMerge : Template Based Efficient Data Reduction For ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Tang, Yutao ; Li, Ding ; Li, Zhichun... - p. 1324-1337 , 2018
 
?
13

High Fidelity Data Reduction for Big Data Security Dependen..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Xu, Zhang ; Wu, Zhenyu ; Li, Zhichun... - p. 504-516 , 2016
 
?
14

IntFlow : improving the accuracy of arithmetic error det..:

, In: Proceedings of the 30th Annual Computer Security Applications Conference,
 
?
15

ShadowReplica : efficient parallelization of dynamic dat..:

, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,
 
1-15