Jehyun Lee

According to our database1, Jehyun Lee authored at least 19 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multimodal Large Language Models for Phishing Webpage Detection and Identification.
CoRR, 2024

IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
A Step Towards On-Path Security Function Outsourcing.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

SIERRA: Ranking Anomalous Activities in Enterprise Networks.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Decomposition of complete graphs into bi-cyclic graphs with eight edges.
Bull. ICA, 2020

2019
SplitSecond: Flexible Privilege Separation of Android Apps.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2017
On Return Oriented Programming Threats in Android Runtime.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Broken Integrity Detection of Video Files in Video Event Data Recorders.
KSII Trans. Internet Inf. Syst., 2016

PsyBoG: A scalable botnet detection method for large-scale DNS traffic.
Comput. Networks, 2016

2015
Screening smartphone applications using malware family signatures.
Comput. Secur., 2015

2014
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis.
Comput. Commun., 2014

PsyBoG: Power spectral density analysis for detecting botnet groups.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

DroidGraph: discovering Android malware by analyzing semantic behavior.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Screening Smartphone Applications Using Behavioral Signatures.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2011
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host.
Proceedings of the Information Security Practice and Experience, 2011

2009
Scalable attack graph for risk assessment.
Proceedings of the 2009 International Conference on Information Networking, 2009

2007
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007


  Loading...