default search action
Yongsu Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Seokhyun Kim, Giorgia Fattori, Yongsu Park:
A simple and efficient Distributed Trigger Counting algorithm based on local thresholds. ICT Express 10(4): 895-901 (2024) - [j25]Seokwoo Choi, Taejoo Chang, Yongsu Park:
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0. Sensors 24(3): 840 (2024) - 2021
- [j24]Seokwoo Choi, Taejoo Chang, Sung-Woo Yoon, Yongsu Park:
Hybrid emulation for bypassing anti-reversing techniques and analyzing malware. J. Supercomput. 77(1): 471-497 (2021) - 2020
- [j23]Seokwoo Choi, Taejoo Chang, Changhyun Kim, Yongsu Park:
x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4. IEEE Access 8: 127939-127953 (2020) - [j22]Seokhyun Kim, Yongsu Park:
DDR-Coin: An Efficient Probabilistic Distributed Trigger Counting Algorithm. Sensors 20(22): 6446 (2020)
2010 – 2019
- 2019
- [j21]Gyeong-Min Kim, Juhyun Park, Yun-Hwan Jang, Yongsu Park:
Efficient Automatic Original Entry Point Detection. J. Inf. Sci. Eng. 35(4): 887-901 (2019) - 2018
- [j20]Juhyun Park, Yun-Hwan Jang, Yongsu Park:
New flash memory acquisition methods based on firmware update protocols for LG Android smartphones. Digit. Investig. 25: 42-54 (2018) - [j19]Yun-Hwan Jang, Yongsu Park:
Enhanced Knock Code Authentication with High Security and Improved Convenience. KSII Trans. Internet Inf. Syst. 12(9): 4560-4575 (2018) - [j18]Yongsu Park, Nicholas Paine, Sehoon Oh:
Development of Force Observer in Series Elastic Actuator for Dynamic Control. IEEE Trans. Ind. Electron. 65(3): 2398-2407 (2018) - 2017
- [j17]Hyungsoo Jung, Yongsu Park, Chi-won Song, Sooyong Kang:
PCS: a parity-based personal data recovery service in cloud. Clust. Comput. 20(3): 2655-2668 (2017) - [c17]Su-Hui Kwak, Yongsu Park, Sehoon Oh:
Dynamic model based microrobot control. URAI 2017: 624-625 - 2016
- [c16]Yongsu Park, Sehoon Oh, Heeseung Zoe:
Dynamic analysis of Reaction Force sensing Series Elastic Actuator as unlumped two mass system. IECON 2016: 5784-5789 - 2015
- [j16]Daeseon Choi, Younho Lee, Yongsu Park, Seokhyun Kim:
Estimating Korean Residence Registration Numbers from Public Information on SNS. IEICE Trans. Commun. 98-B(4): 565-574 (2015) - 2014
- [j15]Duck-Ho Bae, Jong-Min Lee, Sang-Wook Kim, Youngjoon Won, Yongsu Park:
Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics. IEICE Trans. Inf. Syst. 97-D(6): 1664-1667 (2014) - [c15]Duck-Ho Bae, Jong-Min Lee, Sang-Wook Kim, Youngjoon Won, Yongsu Park:
Analyzing network privacy preserving methods: a perspective of social network characteristics. SAC 2014: 331-332 - 2013
- [j14]Younho Lee, Il-Hee Kim, Yongsu Park:
Improved multi-precision squaring for low-end RISC microcontrollers. J. Syst. Softw. 86(1): 60-71 (2013) - [j13]Seokhyun Kim, Jaeheung Lee, Yongsu Park, Yookun Cho:
An optimal distributed trigger counting algorithm for large-scale networked systems. Simul. 89(7): 846-859 (2013) - 2012
- [j12]Jaeheung Lee, Seokhyun Kim, Yookun Cho, Yoojin Chung, Yongsu Park:
HORSIC: An efficient one-time signature scheme for wireless sensor networks. Inf. Process. Lett. 112(20): 783-787 (2012) - 2010
- [j11]Heeyoul Kim, Younho Lee, Yongsu Park:
A robust and flexible digital rights management system for home networks. J. Syst. Softw. 83(12): 2431-2440 (2010) - [c14]Min-Jae Kim, Jin-Young Lee, Hyeyoung Chang, Seongje Cho, Yongsu Park, Minkyu Park, Philip A. Wilsey:
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering. ISORC 2010: 80-86
2000 – 2009
- 2009
- [j10]Younho Lee, Heeyoul Kim, Yongsu Park:
A new data hiding scheme for binary image authentication with small image distortion. Inf. Sci. 179(22): 3866-3884 (2009) - [c13]Younho Lee, Yongsu Park:
Framework Design and Performance Analysis on Pairwise Key Establishment. APNOMS 2009: 311-320 - 2008
- [j9]Daeseon Choi, Younho Lee, Yongsu Park, Seunghun Jin, Hyunsoo Yoon:
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks. IEICE Trans. Commun. 91-B(11): 3574-3583 (2008) - [j8]Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids. Inf. Sci. 178(14): 2968-2982 (2008) - 2007
- [j7]Heeyoul Kim, Byungchun Chung, Younho Lee, Yongsu Park, Hyunsoo Yoon:
Weakness of the Synchro-Difference LKH Scheme for Secure Multicast. IEEE Commun. Lett. 11(9): 765-767 (2007) - [j6]Heeyoul Kim, Younho Lee, Yongsu Park, Hyunsoo Yoon:
Reactive Key Management Scheme for Access Control in Group Communications. IEICE Trans. Commun. 90-B(4): 982-986 (2007) - [j5]Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates. IEICE Trans. Commun. 90-B(11): 3259-3262 (2007) - [c12]Seok-Lae Lee, Yongsu Park, Joo-Seok Song:
An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm. ISNN (1) 2007: 1045-1053 - 2006
- [j4]Younho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. IEICE Trans. Inf. Syst. 89-D(8): 2452-2455 (2006) - [j3]Yongsu Park, Yookun Cho:
Efficient One-time Signature Schemes for Stream Authentication. J. Inf. Sci. Eng. 22(3): 611-624 (2006) - [c11]Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Proxy Signature Scheme Providing Self-delegation. ICISC 2006: 328-342 - [c10]Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations. ISI 2006: 572-577 - [c9]Yongsu Park, Yong Ho Song, Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. ISI 2006: 731-732 - [c8]Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services. ISI 2006: 737-738 - [c7]Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim:
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. IWSEC 2006: 268-277 - 2005
- [j2]JaeYong Jeong, Yongsu Park, Yookun Cho:
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading. IEICE Trans. Inf. Syst. 88-D(5): 1077-1081 (2005) - [c6]JaeYong Jeong, Yongsu Park, Yookun Cho:
Efficient DoS Resistant Multicast Authentication Schemes. ICCSA (2) 2005: 353-362 - 2004
- [c5]Yongsu Park, Jaeheung Lee, Yookun Cho:
Intrusion Detection Using Noisy Training Data. ICCSA (1) 2004: 547-556 - [c4]Yongsu Park, Yookun Cho:
The eSAIDA Stream Authentication Scheme. ICCSA (4) 2004: 799-807 - [c3]Yongsu Park, Yookun Cho:
Fair Certified E-mail Protocols with Delivery Deadline Agreement. ICCSA (1) 2004: 978-987 - [c2]Yongsu Park, Yookun Cho:
An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. PARA 2004: 1025-1030 - [c1]Yongsu Park, Yookun Cho:
On Minimizing Distortion in Secure Data-Hiding for Binary Images. PCM (1) 2004: 572-577 - 2003
- [j1]Yongsu Park, Tae-Sun Chung, Yookun Cho:
An efficient stream authentication scheme using tree chaining. Inf. Process. Lett. 86(1): 1-8 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint