Seong-je Cho
Orcid: 0000-0001-9917-0429Affiliations:
- Dankook University, Yongin, Department of Computer Science & Engineering
According to our database1,
Seong-je Cho
authored at least 86 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps.
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024
Tiered Storage in Modern Key-Value Stores: Performance, Storage-Efficiency, and Cost-Efficiency Considerations.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
J. Comput. Sci. Eng., December, 2023
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023
2022
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART).
IEEE Access, 2022
Efficient Deep Learning Network With Multi-Streams for Android Malware Family Classification.
IEEE Access, 2022
Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022
Sustainability of Machine Learning-based Android Malware Detection Using API calls and Permissions.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022
2021
A Comparative Study on Optimization, Obfuscation, and Deobfuscation tools in Android.
J. Internet Serv. Inf. Secur., 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020
Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020
2019
Soft Comput., 2019
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Internet Serv. Inf. Secur., 2019
RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File.
IEEE Access, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
Representing Multicloud Security and Privacy Policies and Detecting Potential Problems.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
AndroClass: An Effective Method to Classify Android Applications by Applying Deep Neural Networks to Comprehensive Features.
Wirel. Commun. Mob. Comput., 2018
A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.
Secur. Commun. Networks, 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units.
IET Inf. Secur., 2018
Analyzing and modeling the impact of memory latency and bandwidth on application performance.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Android malware detection using convolutional neural networks and data section images.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
2017
Proceedings of the Symposium on Applied Computing, 2017
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Android Application Protection against Static Reverse Engineering based on Multidexing.
J. Internet Serv. Inf. Secur., 2016
Int. J. Comput. Math., 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
2015
Effective and efficient detection of software theft via dynamic API authority vectors.
J. Syst. Softw., 2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
2014
J. Supercomput., 2014
J. Internet Serv. Inf. Secur., 2014
A new detection scheme of software copyright infringement using software birthmark on windows systems.
Comput. Sci. Inf. Syst., 2014
Proceedings of the Symposium on Applied Computing, 2014
An effective data clustering method based on expected update time in flash memory environment.
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
J. Internet Serv. Inf. Secur., 2013
J. Inf. Process. Syst., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
2012
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks.
J. Internet Serv. Inf. Secur., 2012
J. Inf. Sci. Eng., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
An anti-piracy mechanism based on class separation and dynamic loading for Android applications.
Proceedings of the Research in Applied Computation Symposium, 2012
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
2011
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots.
Proceedings of the Research in Applied Computation Symposium, 2011
2010
Comput. Electr. Eng., 2010
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010
2009
Proceedings of the International Conference on Embedded Software and Systems, 2009
2008
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008
2007
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
IEICE Trans. Inf. Syst., 2006
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006
2005
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor.
IEICE Trans. Inf. Syst., 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
<i>SoIDPS</i>: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
2003
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003