Ah Reum Kang

Orcid: 0000-0002-0732-5313

According to our database1, Ah Reum Kang authored at least 32 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms.
Complex., 2022

Malware Detection Using Byte Streams of Different File Formats.
IEEE Access, 2022

2021
Prediction of Postoperative Complications for Patients of End Stage Renal Disease.
Sensors, 2021

2020
Comparative Analysis on Machine Learning and Deep Learning to Predict Post-Induction Hypotension.
Sensors, 2020

Developing an Individual Glucose Prediction Model Using Recurrent Neural Network.
Sensors, 2020

Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling.
Sensors, 2020

2019
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks.
Secur. Commun. Networks, 2019

Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority.
IACR Cryptol. ePrint Arch., 2019

2018
Privacy Preserving Analytics on Distributed Medical Data.
CoRR, 2018

2017
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

2016
Domain Name System Security and Privacy: Old Problems and New Challenges.
CoRR, 2016

Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

A user study of the effectiveness of typosquatting techniques.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Automatic alerts annotation for improving DDoS mitigation systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Assessing DNS privacy under partial deployment of special-use Domain Names.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Transparency of the new gTLD's centralized zone data service: A measurement study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Rise and Fall of Online Game Groups: Common Findings on Two Different Games.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

2014
Altruism in games: Helping others help themselves.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Moneymakers and Bartering in Online Games.
Proceedings of the Complex Networks V, 2014

2013
Online game bot detection based on party-play log analysis.
Comput. Math. Appl., 2013

The contagion of malicious behaviors in online games.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Chatting Pattern Based Game BOT Detection: Do They Talk Like Us?
KSII Trans. Internet Inf. Syst., 2012

Modeling of bot usage diffusion across social networks in MMORPGs.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

2011
Multi-relational social networks in a large-scale MMORPG.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011


  Loading...