Jeong Hyun Yi
Orcid: 0000-0002-2720-0593
According to our database1,
Jeong Hyun Yi
authored at least 55 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2023
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.
Comput. Syst. Sci. Eng., 2023
2022
IEICE Trans. Inf. Syst., November, 2022
Int. J. Inf. Sec., 2022
IEEE Access, 2022
IEEE Access, 2022
2021
Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications.
IEEE Access, 2021
2020
Mob. Inf. Syst., 2020
IEEE Access, 2020
2019
J. Internet Serv. Inf. Secur., 2019
Automatic string deobfuscation scheme for mobile applications based on platform-level code extraction.
Int. J. Ad Hoc Ubiquitous Comput., 2019
2018
Distributed quality of service routing protocol for multimedia traffic in WiMedia networks.
Wirel. Networks, 2018
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.
J. Supercomput., 2018
Multim. Tools Appl., 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles.
IEEE Access, 2018
IEEE Access, 2018
2017
Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things.
Int. J. Serv. Technol. Manag., 2017
Int. J. Sens. Networks, 2017
Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment.
Int. J. Sens. Networks, 2017
Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things.
IEEE Access, 2017
2016
J. Supercomput., 2016
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks.
J. Supercomput., 2016
Secur. Commun. Networks, 2016
Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks.
Multim. Tools Appl., 2016
J. Internet Serv. Inf. Secur., 2016
Intell. Autom. Soft Comput., 2016
Structural analysis of packing schemes for extracting hidden codes in mobile malware.
EURASIP J. Wirel. Commun. Netw., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Entropy, 2015
Proceedings of the International Symposium on Consumer Electronics, 2015
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
J. Internet Serv. Inf. Secur., 2014
Int. J. Distributed Sens. Networks, 2014
2013
Wirel. Pers. Commun., 2013
Elastic password authentication scheme using the Passcell-based virtual scroll wheel.
Int. J. Comput. Math., 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
2011
Experimenting with system and Libc call interception attacks on ARM-based Linux kernel.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE Trans. Inf. Forensics Secur., 2009
2008
Self-Configurable Authentication Mechanism with Verifiability in Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Comput. Networks, 2007
Proceedings of the Public Key Cryptography, 2007
2006
Proceedings of the Stabilization, 2006
2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005
2004
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003