Minkyu Park
Orcid: 0000-0001-7392-6742
According to our database1,
Minkyu Park
authored at least 63 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps.
Forensic Sci. Int. Digit. Investig., 2024
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Improved Socialtaxis for information-theoretic source search using cooperative multiple agents in turbulent environments.
Expert Syst. Appl., September, 2023
Receding Horizon-Based Infotaxis With Random Sampling for Source Search and Estimation in Complex Environments.
IEEE Trans. Aerosp. Electron. Syst., February, 2023
2022
Source Term Estimation Using Deep Reinforcement Learning With Gaussian Mixture Model Feature Extraction for Mobile Sensors.
IEEE Robotics Autom. Lett., 2022
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART).
IEEE Access, 2022
2021
Autonomous Source Search for UAVs Using Gaussian Mixture Model-Based Infotaxis: Algorithm and Flight Experiments.
IEEE Trans. Aerosp. Electron. Syst., 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
2020
Inf. Fusion, 2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020
2019
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File.
IEEE Access, 2019
2018
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
2017
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016
Int. J. Comput. Math., 2016
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
2015
J. Supercomput., 2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2014
J. Internet Serv. Inf. Secur., 2014
A new detection scheme of software copyright infringement using software birthmark on windows systems.
Comput. Sci. Inf. Syst., 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
J. Internet Serv. Inf. Secur., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Real-time digital zooming for mobile consumer cameras using directionally adaptive image interpolation and restoration.
Proceedings of the IEEE International Conference on Consumer Electronics, 2013
2012
J. Inf. Sci. Eng., 2012
J. Inf. Sci. Eng., 2012
An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup.
IEICE Trans. Commun., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
An anti-piracy mechanism based on class separation and dynamic loading for Android applications.
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
2011
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots.
Proceedings of the Research in Applied Computation Symposium, 2011
2010
Comput. Electr. Eng., 2010
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010
A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the International Conference on Embedded Software and Systems, 2009
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009
2007
Noise insensitive demosaicing algorithm.
Proceedings of the Signal and Image Processing (SIP 2007), 2007
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007
2006
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
1999
BookmarkFeeder: A Web Agent with Implicit Feedback and URL-Based Recommendation.
Proceedings of the Internet, Multimedia Systems and Applications, 1999