default search action
Jeong Hyun Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j39]Younghoon Ban, Jeong Hyun Yi, Haehyun Cho:
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification. Comput. Syst. Sci. Eng. 46(2): 2215-2230 (2023) - 2022
- [j38]Younghoon Ban, Sunjun Lee, Dokyung Song, Haehyun Cho, Jeong Hyun Yi:
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis. IEEE Access 10: 20008-20018 (2022) - [j37]Minho Kim, Haehyun Cho, Jeong Hyun Yi:
Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware. IEEE Access 10: 75802-75815 (2022) - [j36]Geochang Jeon, Jeong Hyun Yi, Haehyun Cho:
Hiding Data in the Padding Area of Android Applications without Re-Packaging. IEICE Trans. Inf. Syst. 105-D(11): 1928-1929 (2022) - [j35]Jinsung Kim, Younghoon Ban, Eunbyeol Ko, Haehyun Cho, Jeong Hyun Yi:
MAPAS: a practical deep learning-based android malware detection system. Int. J. Inf. Sec. 21(4): 725-738 (2022) - 2021
- [j34]Geochang Jeon, Minseong Choi, Sunjun Lee, Jeong Hyun Yi, Haehyun Cho:
Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications. IEEE Access 9: 119578-119590 (2021) - 2020
- [j33]Ki-Chang Kim, Jinsung Kim, Eunbyeol Ko, Jeong Hyun Yi:
Risk Assessment Scheme for Mobile Applications Based on Tree Boosting. IEEE Access 8: 48503-48514 (2020) - [j32]Sung Tae Kim, Taeyong Park, Geochang Jeon, Jeong Hyun Yi:
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting. Mob. Inf. Syst. 2020: 8813243:1-8813243:11 (2020)
2010 – 2019
- 2019
- [j31]WooJong Yoo, Minkoo Kang, Myeongju Ji, Jeong Hyun Yi:
Automatic string deobfuscation scheme for mobile applications based on platform-level code extraction. Int. J. Ad Hoc Ubiquitous Comput. 31(3): 143-154 (2019) - [j30]Ki-Chang Kim, Eunbyeol Ko, Jinsung Kim, Jeong Hyun Yi:
Intelligent Malware Detection Based on Hybrid Learning of API and ACG on Android. J. Internet Serv. Inf. Secur. 9(4): 39-48 (2019) - [j29]Geonbae Na, Jongsu Lim, Sunjun Lee, Jeong Hyun Yi:
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART. Sensors 19(11): 2625 (2019) - 2018
- [j28]Joonsang Yoo, Jeong Hyun Yi:
Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles. IEEE Access 6: 46731-46741 (2018) - [j27]Haehyun Cho, Jeong Hyun Yi, Gail-Joon Ahn:
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. IEEE Access 6: 71229-71240 (2018) - [j26]Jongsu Lim, Yonggu Shin, Sunjun Lee, Kyuho Kim, Jeong Hyun Yi:
Survey of Dynamic Anti-Analysis Schemes for Mobile Malware. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(3): 39-49 (2018) - [j25]Hyunki Kim, Taejoo Cho, Gail-Joon Ahn, Jeong Hyun Yi:
Risk assessment of mobile applications based on machine learned malware dataset. Multim. Tools Appl. 77(4): 5027-5042 (2018) - [j24]Sung Ryoung Kim, Jeong-Nyeo Kim, Sung Tae Kim, Sunwoo Shin, Jeong Hyun Yi:
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications. J. Supercomput. 74(9): 4261-4280 (2018) - [j23]Jin-Woo Kim, Jeong Hyun Yi, Changho Seo:
Distributed quality of service routing protocol for multimedia traffic in WiMedia networks. Wirel. Networks 24(8): 2835-2849 (2018) - 2017
- [j22]Taejoo Cho, Hyunki Kim, Jeong Hyun Yi:
Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things. IEEE Access 5: 6361-6371 (2017) - [j21]Seongsoo Cho, Jeong Hyun Yi, Bhanu Shrestha, Changho Seo:
Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment. Int. J. Sens. Networks 24(3): 200-207 (2017) - [j20]Bhanu Shrestha, Jeong Hyun Yi, Seongsoo Cho:
Wideband open stub BPF for cognitive radio system applications. Int. J. Sens. Networks 25(3): 198-205 (2017) - [j19]Haehyun Cho, Hyunki Kim, Jongsu Lim, Junghwan Lee, Jeong Hyun Yi:
Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things. Int. J. Serv. Technol. Manag. 23(1/2): 21-31 (2017) - 2016
- [j18]Jongsu Lim, Jeong Hyun Yi:
Structural analysis of packing schemes for extracting hidden codes in mobile malware. EURASIP J. Wirel. Commun. Netw. 2016: 221 (2016) - [j17]Suwan Park, Changho Seo, Jeong Hyun Yi:
Cyber threats to mobile messenger apps from identity cloning. Intell. Autom. Soft Comput. 22(3): 379-387 (2016) - [j16]Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi:
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART. J. Internet Serv. Inf. Secur. 6(3): 27-39 (2016) - [j15]Jeong Hyun Yi, Aziz Mohaisen, Sean Yang, Ching-Hsien Hsu:
Advances in Mobile Security Technologies. Mob. Inf. Syst. 2016: 9501918:1-9501918:2 (2016) - [j14]Jongwon Choi, Geonbae Na, Jeong Hyun Yi:
Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks. Multim. Tools Appl. 75(22): 14833-14848 (2016) - [j13]Yuxue Piao, Jin-Hyuk Jung, Jeong Hyun Yi:
Server-based code obfuscation scheme for APK tamper detection. Secur. Commun. Networks 9(6): 457-467 (2016) - [j12]Haehyun Cho, Jongsu Lim, Hyunki Kim, Jeong Hyun Yi:
Anti-debugging scheme for protecting mobile apps on android platform. J. Supercomput. 72(1): 232-246 (2016) - [j11]Haehyun Cho, Jiwoong Bang, Myeongju Ji, Jeong Hyun Yi:
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks. J. Supercomput. 72(9): 3629-3645 (2016) - [c16]Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi:
Checking Intent-based Communication in Android with Intent Space Analysis. AsiaCCS 2016: 735-746 - 2015
- [j10]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j9]Jongwon Choi, Haehyun Cho, Jeong Hyun Yi:
Personal Information Leaks with Automatic Login in Mobile Social Network Services. Entropy 17(6): 3947-3962 (2015) - [c15]Kangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You:
Cyber Threats to Industrial Control Systems. MIST@CCS 2015: 79-81 - [c14]Jiwoong Bang, Haehyun Cho, Myeongju Ji, Taejoo Cho, Jeong Hyun Yi:
Tamper detection scheme using signature segregation on android platform. ICCE-Berlin 2015: 459-462 - [c13]Myeongju Ji, Sungryong Kim, Yongjin Park, Jeong Hyun Yi:
Mobile device management system with portable devices. ISCE 2015: 1-2 - [e1]Kyung Hyune Rhee, Jeong Hyun Yi:
Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8909, Springer 2015, ISBN 978-3-319-15086-4 [contents] - 2014
- [j8]Taejin Kim, Jeong Hyun Yi, Changho Seo:
Spyware Resistant Smartphone User Authentication Scheme. Int. J. Distributed Sens. Networks 10 (2014) - [j7]Su-Wan Park, Jeong Hyun Yi:
Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android. J. Internet Serv. Inf. Secur. 4(4): 115-126 (2014) - 2013
- [j6]Hyunyi Yi, Siwan Kim, Gunil Ma, Jeong Hyun Yi:
Elastic password authentication scheme using the Passcell-based virtual scroll wheel. Int. J. Comput. Math. 90(12): 2530-2540 (2013) - [j5]Jin-Hyuk Jung, Ju Young Kim, Hyeong-chan Lee, Jeong Hyun Yi:
Repackaging Attack on Android Banking Applications and Its Countermeasures. Wirel. Pers. Commun. 73(4): 1421-1437 (2013) - [c12]Taejin Kim, Siwan Kim, Hyunyi Yi, Gunil Ma, Jeong Hyun Yi:
Mobile User Authentication Scheme Based on Minesweeper Game. MUE 2013: 227-233 - 2011
- [c11]Hyeong-chan Lee, Chung Hui Kim, Jeong Hyun Yi:
Experimenting with system and Libc call interception attacks on ARM-based Linux kernel. SAC 2011: 631-632
2000 – 2009
- 2009
- [j4]Nitesh Saxena, Jeong Hyun Yi:
Noninteractive self-certification for long-lived mobile ad hoc networks. IEEE Trans. Inf. Forensics Secur. 4(4): 946-955 (2009) - [j3]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distributed Syst. 20(2): 158-170 (2009) - 2008
- [c10]Jeong Hyun Yi:
Self-Configurable Authentication Mechanism with Verifiability in Wireless Ad Hoc Networks. GLOBECOM 2008: 1925-1929 - 2007
- [j2]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Robust self-keying mobile ad hoc networks. Comput. Networks 51(4): 1169-1182 (2007) - [j1]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control. Comput. Networks 51(12): 3632-3649 (2007) - [c9]Jung Hee Cheon, Jeong Hyun Yi:
Fast Batch Verification of Multiple Signatures. Public Key Cryptography 2007: 442-457 - 2006
- [c8]Jeong Hyun Yi:
Energy-Efficient and Non-interactive Self-certification in MANETs. SSS 2006: 533-547 - 2005
- [c7]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 - [c6]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. NETWORKING 2005: 1083-1095 - 2004
- [c5]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Access control in ad hoc groups. HOT-P2P 2004: 2-7 - [c4]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 - [c3]Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi:
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. SASN 2004: 1-9 - 2003
- [c2]Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi:
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336- - [c1]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint