Filter
Conference contribution

Search results

  • 2015

    EGG 2014: Exploration on Games and Gamers - Introduction

    Kwak, H., Blackburn, J. & Kim, H. K., 2015, Social Informatics - SocInfo 2014 International Workshops, Revised Selected Papers. McFarland, D. & Aiello, L. M. (eds.). Springer Verlag, p. 179-182 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8852).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal modeling and verification for SDN firewall application using pACSR

    Kang, M., Choi, J. Y., Kwak, H. H., Kang, I., Shin, M. K. & Yi, J. H., 2015, Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014. Hussain, A. & Ivanovic, M. (eds.). CRC Press/Balkema, p. 155-161 7 p. (Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forward secure non-interactive key exchange from indistinguishability obfuscation

    Lee, Y. K. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292984. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Generosity as Social Contagion in Virtual Community

    Woo, J., Kwak, B. I., Lim, J. & Kim, H. K., 2015, Social Informatics - SocInfo 2014 International Workshops, Revised Selected Papers. McFarland, D. & Aiello, L. M. (eds.). Springer Verlag, p. 191-199 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8852).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Passing go with DNA sequencing: Delivering messages in a covert transgenic channel

    Chun, J. Y., Lee, H. L. & Yoon, J. W., 2015 Jul 17, Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015. Institute of Electrical and Electronics Engineers Inc., p. 17-26 10 p. 7163204. (Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Citations (Scopus)
  • Preserving biosensor users' anonymity over wireless cellular network

    Baek, S., Seo, S. H. & Kim, S., 2015 Aug 7, ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 470-475 6 p. 7182588. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2015-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Promptly pinpointing mobile RFID tags for large-scale internet-of-things

    Kim, T., Shao, C. & Lee, W., 2015 Mar 30, 2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015. Institute of Electrical and Electronics Engineers Inc., p. 118-123 6 p. 7072820. (2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Study on the effectiveness of the security countermeasures against spear phishing

    Song, M., Seo, J. & Lee, K., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K.-H. & Yi, J. H. (eds.). Springer Verlag, p. 394-404 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • The right to be forgotten: Standard on deleting the exposed personal information on the internet

    Lee, H. J., Yun, J. H., Yoon, H. S. & Lee, K. H., 2015, Computer Science and Its Applications - Ubiquitous Information Technologies. Jeong, H. Y., Stojmenovic, I., Park, J. J. & Yi, G. (eds.). Springer Verlag, p. 883-889 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verification for NFV-enabled network services

    Shin, M. K., Choi, Y., Kwak, H. H., Pack, S., Kang, M. & Choi, J. Y., 2015 Dec 11, International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015. Institute of Electrical and Electronics Engineers Inc., p. 810-815 6 p. 7354672. (International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Visual honey encryption: Application to steganography

    Yoon, J. W., Kim, H., Jo, H. J., Lee, H. & Lee, K., 2015 Jun 17, IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, p. 65-74 10 p. (IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 2014

    Analyzing the effect of the distortion compensation in reversible watermarking

    Kim, S. & Kim, H. J., 2014, Fifth International Conference on Graphic and Image Processing, ICGIP 2013. 90690P. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9069).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An approximation algorithm for client assignment in client/server systems

    Zhu, Y., Wu, W., Willson, J., Ding, L., Wu, L., Li, D. & Lee, W., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2777-2785 9 p. 6848227. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Andro-profiler: Anti-malware system based on behavior profiling of mobile malware

    Jang, J. W., Yun, J., Woo, J. & Kim, H. K., 2014 Apr 7, WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 737-738 2 p. (WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • A new approach to preserve privacy data mining based on fuzzy theory in numerical database

    Cui, R. & Kim, H. J., 2014, Fifth International Conference on Graphic and Image Processing, ICGIP 2013. 90691A. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9069).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A research for partition restoration techniques

    Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014, Future Information Technology, FutureTech 2013. Springer Verlag, p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

    Sachnev, V. & Kim, H. J., 2014, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700. (IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Distinguishing attack on SDDO-based block cipher BMD-128

    Kang, J., Jeong, K., Lee, C. & Hong, S., 2014, Ubiquitous Information Technologies and Applications, CUTE 2013. Springer Verlag, p. 595-602 8 p. (Lecture Notes in Electrical Engineering; vol. 280 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Enhanced discriminant linear regression classification for face recognition

    Qu, X. & Kim, H. J., 2014, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827696. (IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • JPEG copy paste forgery detection using BAG optimized for complex images

    Ayalneh, D. A., Kim, H. J. & Choi, Y. S., 2014, 16th International Conference on Advanced Communication Technology: Content Centric Network Innovation!, ICACT 2014 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 181-185 5 p. 6778945. (International Conference on Advanced Communication Technology, ICACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Mal-netminer: Malware classification based on social network analysis of call graph

    Jang, J. W., Woo, J., Yun, J. & Kim, H. K., 2014 Apr 7, WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 731-734 4 p. (WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Moneymakers and bartering in online games

    Lee, J. E., Kang, A. R., Kim, H. K. & Park, J., 2014, Complex Networks V: Proceedings of the 5th Workshop on Complex Networks CompleNet 2014. Springer Verlag, p. 39-46 8 p. (Studies in Computational Intelligence; vol. 549).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

    Sachnev, V. & Kim, H. J., 2014, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649. (IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Reversible watermarking using edge based difference modification

    Qu, X., Kim, S. & Kim, H., 2014, Fifth International Conference on Graphic and Image Processing, ICGIP 2013. 90690Q. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9069).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Stable matching with ties for cloud-assisted smart TV services

    Kim, G. & Lee, W., 2014, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 558-559 2 p. 6776132. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Unveiling group characteristics in online social games: A socio-economic analysis

    Chung, T., Han, J., Choi, D., Kwon, T., Kim, H. K. & Choi, Y., 2014 Apr 7, WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, p. 889-899 11 p. (WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Who is sending a spam email: Clustering and characterizing spamming hosts

    Woo, J., Kang, H. J., Kang, A. R., Kwon, H. & Kim, H. K., 2014, Information Security and Cryptology - ICISC 2013 - 16th International Conference, Revised Selected Papers. Lee, H.-S. & Han, D.-G. (eds.). Springer Verlag, p. 469-482 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8565).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    A framework for anomaly pattern recognition in electronic financial transaction using moving average method

    Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Aggregating CL-signatures revisited: Extended functionality and better efficiency

    Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • An attempt to generalize distortion measure for JPEG steganography

    Sachnev, V. & Kim, H. J., 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Approximations for minimum connected sensor cover

    Wu, L., Du, H., Wu, W., Li, D., Lv, J. & Lee, W., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1187-1194 8 p. 6566910. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • A stackelberg game for cooperative cognitive radio network with active SUs

    Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 International Conference on Computing, Networking and Communications, ICNC 2013. p. 911-915 5 p. 6504211. (2013 International Conference on Computing, Networking and Communications, ICNC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • A study on weakness and improvement of Cloud Shredder

    Park, M., Kang, S. & Kim, S., 2013, 2013 International Conference on ICT Convergence: "Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013. IEEE Computer Society, p. 1107-1113 7 p. 6675569. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Attribute-based encryption for commercial content distribution

    Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds

    Kim, G. & Lee, W., 2013, 2013 4th International Conference on the Network of the Future, NoF 2013. IEEE Computer Society, 6724514. (2013 4th International Conference on the Network of the Future, NoF 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Compressing JPEG compressed image using reversible data hiding technique

    Kang, S. U., Qu, X. & Kim, H. J., 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324. (2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • I know what the BOTs did yesterday: Full action sequence analysis using Naïve Bayesian algorithm

    Lee, J., Lim, J., Cho, W. & Kim, H. K., 2013, 2013 12th Annual Workshop on Network and Systems Support for Games, NetGames 2013. IEEE Computer Society, 6820611. (Annual Workshop on Network and Systems Support for Games).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Loyalty or profit? Early evolutionary dynamics of online game groups

    Kang, A. R., Park, J. & Kim, H. K., 2013, 2013 12th Annual Workshop on Network and Systems Support for Games, NetGames 2013. IEEE Computer Society, 6820602. (Annual Workshop on Network and Systems Support for Games).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Predictability of Android OpenSSL's pseudo random number generator

    Kim, S. H., Han, D. & Lee, D. H., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 659-668 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Citations (Scopus)
  • Price-based tethering for cooperative networking

    Lee, J., Shao, C., Roh, H. & Lee, W., 2013, International Conference on Information Networking 2013, ICOIN 2013. p. 379-384 6 p. 6496408. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Resource pricing game in geo-distributed clouds

    Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1519-1527 9 p. 6566947. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

    Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Citations (Scopus)
  • Sequential aggregate signatures made shorter

    Lee, K., Lee, D. H. & Yung, M., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

    Lee, K., Lee, D. H. & Yung, M., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • The contagion of malicious behaviors in online games

    Woo, J., Kang, A. R. & Kim, H. K., 2013, SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. p. 543-544 2 p. (SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • The contagion of malicious behaviors in online games

    Woo, J., Kang, A. R. & Kim, H. K., 2013, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 543-544 2 p. (Computer Communication Review; vol. 43, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Topology control using selection diversity in ad hoc network

    Moon, K. R. & Oh, S. J., 2013, 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013. p. 1198-1203 6 p. 6554734. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vulnerabilities of android data sharing and malicious application to leaking private information

    Cho, T., Kim, J. H., Cho, H. J., Seo, S. H. & Kim, S., 2013, ICUFN 2013 - 5th International Conference on Ubiquitous and Future Networks. p. 37-42 6 p. 6614773. (International Conference on Ubiquitous and Future Networks, ICUFN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 2012

    Analysis framework to detect artifacts of portable web browser

    Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analysis of smartphone-based location information

    Kim, D., Bang, J. & Lee, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)