Jiyong Jang
Orcid: 0000-0001-8111-2503
According to our database1,
Jiyong Jang
authored at least 42 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
A Multi-Agent Driving Simulation Approach for Evaluating the Safety Benefits of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
An In-Vehicle Warning Information Provision Strategy for V2V-Based Proactive Traffic Safety Management.
IEEE Trans. Intell. Transp. Syst., 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Feature Concentration for Supervised and Semisupervised Learning With Unbalanced Datasets in Visual Inspection.
IEEE Trans. Ind. Electron., 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016
Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code.
PhD thesis, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
login Usenix Mag., 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
J. Commun. Networks, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
Improving Resiliency Using Capacity-Aware Multicast Tree in P2P-Based Streaming Environments.
Proceedings of the High Performance Computing and Communications, 2006