Hyoungshick Kim
Orcid: 0000-0002-1605-3866
According to our database1,
Hyoungshick Kim
authored at least 223 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
Design and evaluation of highly accurate smart contract code vulnerability detection framework.
Data Min. Knowl. Discov., May, 2024
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems.
IEEE Trans. Inf. Forensics Secur., 2024
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones.
Pervasive Mob. Comput., 2024
Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification.
CoRR, 2024
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations.
CoRR, 2024
UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col.
IEEE Access, 2024
AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention.
Proceedings of the ACM on Web Conference 2024, 2024
Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
<i>Blind-Match: </i> Efficient Homomorphic Encryption-Based 1: N Matching for Privacy-Preserving Biometric Identification.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems.
Sensors, February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit Optimization.
IEEE Trans. Cloud Comput., 2023
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023
CoRR, 2023
IEEE Access, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
MENDEL: Time series anomaly detection using transfer learning for industrial control systems.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2023
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks.
ACM Trans. Web, 2022
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022
LocID: A Secure and Usable Location-Based Smartphone Unlocking Scheme Using Wi-Fi Signals and Light Intensity.
IEEE Internet Things J., 2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021
IEEE Access, 2021
On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
FUMVar: a practical framework for generating fully-working and unseen malware variants.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.
Sensors, 2020
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
Sensors, 2020
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption.
Secur. Commun. Networks, 2020
A three-factor anonymous user authentication scheme for Internet of Things environments.
J. Inf. Secur. Appl., 2020
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020
CoRR, 2020
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics.
Comput. Secur., 2020
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag., 2020
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020
I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Trans. Intell. Transp. Syst., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Future Gener. Comput. Syst., 2019
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger.
Digit. Investig., 2019
Comput. Secur., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Profiling-Based Classification Algorithms for Security Applications in Internet of Things.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Sensors, 2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Comput. Secur., 2018
IEEE Commun. Mag., 2018
User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies.
IEEE Consumer Electron. Mag., 2018
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
A Framework for Managing User-defined Security Policies to Support Network Security Functions.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J. Internet Serv. Inf. Secur., 2017
J. Comput. Syst. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Future Gener. Comput. Syst., 2017
Privacy-preserving nearest neighbor queries using geographical features of cellular networks.
Comput. Commun., 2017
Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Commun. Mag., 2017
Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters].
IEEE Consumer Electron. Mag., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017
A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools.
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the Information Science and Applications 2017, 2017
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017
Design of a Secure Digital Recording Protection System with Network Connected Devices.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
IEEE Trans. Hum. Mach. Syst., 2016
A Healthcare Information System for Secure Delivery and Remote Management of Medical Records.
IEICE Trans. Inf. Syst., 2016
EURASIP J. Inf. Secur., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning.
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Reliab., 2015
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk.
Comput. Secur., 2015
Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Information Security Practice and Experience, 2015
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 23rd International World Wide Web Conference, 2014
I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Don't count the number of friends when you are spreading information in social networks.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
Soc. Netw. Anal. Min., 2013
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous.
Proceedings of the Information Security Applications - 14th International Workshop, 2013
2012
J. Informetrics, 2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012
Influential Neighbours Selection for Information Diffusion in Online Social Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Comput. Networks, 2011
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Proceedings of the Foundations and Practice of Security, 2011
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
2009
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009
2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Proceedings of the Advances in Computer Science, 2007