Kang, BooJoong
54  results:
Search for persons X
?
1

BiBERT-AV: Enhancing Authorship Verification Through Siames..:

, In: Communications in Computer and Information Science; Ubiquitous Security,
 
?
2

The Effectiveness of Transformer-Based Models for BEC Attac..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
3

Broadening The Solution Space of Feature Selection in Time-..:

Yang, Zao ; Kang, BooJoong
Procedia Computer Science.  220 (2023)  - p. 769-775 , 2023
 
?
5

A Secure Cloud Migration, Monitoring and Analytics Framewor..:

, In: 2020 IEEE 6th World Forum on Internet of Things (WF-IoT),
 
?
6

A Seamless Cloud Migration Approach to Secure Distributed L..:

, In: 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT),
 
?
7

Intrusion Resilience for PV Inverters in a Distribution Gri..:

, In: Critical Information Infrastructures Security; Lecture Notes in Computer Science,
Kang, BooJoong ; Umsonst, David ; Faschang, Mario... - p. 97-109 , 2019
 
?
8

Runtime Detection Framework for Android Malware:

Kim, TaeGuen ; Kang, BooJoong ; Im, Eul Gyu
Mobile Information Systems.  2018 (2018)  - p. 1-15 , 2018
 
?
9

A hybrid MAC protocol for optimal channel allocation in lar..:

Cho, Sungryung ; Lee, Kyungrak ; Kang, BooJoong.
EURASIP Journal on Wireless Communications and Networking.  2018 (2018)  1 - p. , 2018
 
?
10

Deep Android Malware Detection:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
 
?
 
?
13

PageRank in malware categorization:

, In: Proceedings of the 2015 Conference on research in adaptive and convergent systems,
 
?
 
1-15