Sangchul Han
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps.
Forensic Sci. Int. Digit. Investig., 2024
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Robotics Autom. Lett., November, 2023
Design and Implementation of a Two-Wheeled Inverted Pendulum Robot With a Sliding Mechanism for Off-Road Transportation.
IEEE Robotics Autom. Lett., July, 2023
2022
IEEE Robotics Autom. Lett., 2022
Development of disaster-responding special-purpose machinery: Results of experiments.
J. Field Robotics, 2022
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART).
IEEE Access, 2022
Object Inserting Operation with Admittance Control of A 4-DOF Hydraulic Manipulator with Rotary Vane Actuators.
Proceedings of the 19th International Conference on Ubiquitous Robots, 2022
Experimental Evaluation of Marionette Algorithm for Disaster-Responding Special-Purpose Machinery.
Proceedings of the 13th Asian Control Conference, 2022
Sustainability of Machine Learning-based Android Malware Detection Using API calls and Permissions.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022
2020
Design and Implementation of Hydraulic-Cable driven Manipulator for Disaster Response Operation.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020
2019
Time-Frequency-Based Condition Monitoring of 22.9-kV HTS Cable Systems: Cooling Process and Current Imbalance.
IEEE Trans. Ind. Electron., 2019
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Internet Serv. Inf. Secur., 2019
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
2017
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
2015
J. Supercomput., 2015
Symmetry, 2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015
Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2014
J. Internet Serv. Inf. Secur., 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
A clustering based path planning for UV laser galvanometric scanning drilling machine using spatial tessellations with A∗.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014
2013
Proceedings of the 10th International Conference on Ubiquitous Robots and Ambient Intelligence, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
J. Inf. Sci. Eng., 2012
An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup.
IEICE Trans. Commun., 2012
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
2011
Proceedings of the 8th International Conference on Ubiquitous Robots and Ambient Intelligence, 2011
2010
Comput. Electr. Eng., 2010
A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the International Conference on Embedded Software and Systems, 2009
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
Proceedings of the Computational Science and Its Applications, 2009
2006
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005
Fast Real-Time Job Selection with Resource Constraints Under Earliest Deadline First.
Proceedings of the Embedded Computer Systems: Architectures, 2005
2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
2003
An Efficient Job Selection Scheme in Real-Time Scheduling under the Stack Resource Policy.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
On the Real-Time Job Management in Dynamic Priority Scheduling under the Stack Resource Policy.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003
2000
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000