Jiwon Hong

Orcid: 0000-0001-8664-3258

Affiliations:
  • Hanyang University, Seoul, South Korea


According to our database1, Jiwon Hong authored at least 18 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Combating phishing and script-based attacks: a novel machine learning framework for improved client-side security.
J. Supercomput., January, 2025

2023
C-Affinity: A Novel Similarity Measure for Effective Data Clustering.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

2022
GraphReformCD: Graph Reformulation for Effective Community Detection in Real-World Graphs.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Phishing URL Detection: A Network-based Approach Robust to Evasion.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
TrustRec: An effective approach to exploit implicit trust and distrust relationships along with explicitones for accurate recommendations.
Comput. Sci. Inf. Syst., 2021

2020
An Effective Approach to Outlier Detection Based on Centrality and Centre-Proximity.
Informatica, 2020

Phishing URL Detection with Lexical Features and Blacklisted Domains.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Malware classification for identifying author groups: a graph-based approach.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

2018
Classifying malwares for identification of author groups.
Concurr. Comput. Pract. Exp., 2018

2017
Exploiting job transition patterns for effective job recommendation.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

An Accurate, Efficient, and Scalable Approach to Channel Matching in Smart TVs.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Exploiting implicit and explicit signed trust relationships for effective recommendations.
Proceedings of the Symposium on Applied Computing, 2017

2016
Job recommendation in AskStory: experiences, methods, and evaluation.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Data Locality in Graph Engines: Implications and Preliminary Experimental Results.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

On Exploiting Static and Dynamic Features in Malware Classification.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

2015
A community-based sampling method using DPL for online social networks.
Inf. Sci., 2015

On Recommending Job Openings.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

2014
Context-aware music recommendation in mobile smart devices.
Proceedings of the Symposium on Applied Computing, 2014


  Loading...