default search action
Souhwan Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, Inho Kim, Woongjae Lee, Kihun Hong, Souhwan Jung:
Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices. CCS 2024: 2222-2235 - 2023
- [j26]Long Nguyen-Vu, Thien-Phuc Doan, Mai Bui, Kihun Hong, Souhwan Jung:
On the Defense of Spoofing Countermeasures Against Adversarial Attacks. IEEE Access 11: 94563-94574 (2023) - [j25]Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung:
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android. Comput. Syst. Sci. Eng. 46(3): 3059-3073 (2023) - [c39]Thien-Phuc Doan, Long Nguyen-Vu, Souhwan Jung, Kihun Hong:
BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder. ICASSP 2023: 1-5 - [c38]Thien-Phuc Doan, Kihun Hong, Souhwan Jung:
GAN Discriminator based Audio Deepfake Detection. WDC@AsiaCCS 2023: 29-32 - 2022
- [j24]Long Nguyen-Vu, Souhwan Jung:
Empirical feature learning in application-based samples: A case study. J. Comput. Sci. 64: 101839 (2022) - [j23]Jungsoo Park, Souhwan Jung:
Android Adware Detection using Soot and CFG. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 94-104 (2022) - 2021
- [j22]Ngoc-Tu Chau, Jaehyeon Yoon, Thien-Phuc Doan, Souhwan Jung:
AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment. IEEE Access 9: 30071-30079 (2021) - [j21]Long Nguyen-Vu, Souhwan Jung:
AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification. IEEE Access 9: 39680-39694 (2021) - 2020
- [j20]Ngoc-Tu Chau, Souhwan Jung:
Enhancing Notation-Based Code Cloning Method With an External-Based Identifier Model. IEEE Access 8: 162989-162998 (2020) - [j19]Jungsoo Park, Ngoc-Tu Chau, Long Nguyen-Vu, Jaehyeon Yoon, Souhwan Jung:
A-Pot: A Comprehensive Android Analysis Platform Based on Container Technology. IEEE Access 8: 199638-199645 (2020) - [j18]Jungsoo Park, Long Nguyen-Vu, George Bencivengo, Souhwan Jung:
Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence. KSII Trans. Internet Inf. Syst. 14(8): 3420-3436 (2020) - [j17]Thien-Phuc Doan, Jungsoo Park, Souhwan Jung:
HAL-Based Resource Manipulation Monitoring on AOSP. Mob. Inf. Syst. 2020: 8863385:1-8863385:9 (2020) - [c37]Hyunseok Shim, Souhwan Jung:
Semantic-aware Comment Analysis Approach for API Permission Mapping on Android. NLPIR 2020: 61-69 - [c36]Hyunseok Shim, Souhwan Jung:
Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification. WISA 2020: 59-72 - [c35]Jaehyeon Yoon, Ngoc-Tu Chau, Hoang Nguyen Huy, Souhwan Jung:
Virtualization Technologies in the Android Framework and Compatibility with SEAndroid. WISA 2020: 167-178
2010 – 2019
- 2019
- [j16]Ngoc-Tu Chau, Souhwan Jung:
An Entropy-Based Solution for Identifying Android Packers. IEEE Access 7: 28412-28421 (2019) - [j15]Long Nguyen-Vu, Jinung Ahn, Souhwan Jung:
Android Fragmentation in Malware Detection. Comput. Secur. 87 (2019) - [c34]Jaehyeon Yoon, Jungsoo Park, Souhwan Jung:
Implementation of Private Base Station in Android Container Environment for Mobile Communication. ICUFN 2019: 707-709 - [c33]Hongsun Yoon, Hyunseok Shim, Souhwan Jung:
A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading. MobiSec 2019: 85-98 - 2018
- [j14]Ngoc-Tu Chau, Souhwan Jung:
Dynamic analysis with Android container: Challenges and opportunities. Digit. Investig. 27: 38-46 (2018) - [c32]Ngoc-Tu Chau, Hojin Chun, Souhwan Jung:
Optimizing native analysis with android container. ICMLSC 2018: 185-189 - [c31]Jungsoo Park, Hojin Chun, Souhwan Jung:
API and permission-based classification system for Android malware analysis. ICOIN 2018: 930-935 - 2017
- [j13]Seung Wook Jung, Souhwan Jung:
Personal OAuth authorization server and push OAuth for Internet of Things. Int. J. Distributed Sens. Networks 13(6) (2017) - [j12]Long Nguyen-Vu, Ngoc-Tu Chau, Seongeun Kang, Souhwan Jung:
Android Rooting: An Arms Race between Evasion and Detection. Secur. Commun. Networks 2017: 4121765:1-4121765:13 (2017) - [c30]Nam Pham Nguyen Xuan, Sungmin Lim, Souhwan Jung:
Centralized management solution for vagrant in development environment. IMCOM 2017: 37 - [c29]Kwon-Jin Yoon, Jaehyeon Yoon, Souhwan Jung:
Design and Implementation of Android Container Monitoring Server and Agent. WISA 2017: 162-172 - 2016
- [j11]Long Nguyen-Vu, Jungsoo Park, Minho Park, Souhwan Jung:
Privacy enhancement using selective encryption scheme in data outsourcing. Int. J. Distributed Sens. Networks 12(7) (2016) - [c28]Long Nguyen-Vu, Jungsoo Park, Ngoc-Tu Chau, Souhwan Jung:
Signing key leak detection in Google Play Store. ICOIN 2016: 13-16 - 2015
- [j10]Seung Wook Jung, Souhwan Jung:
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things. Int. J. Distributed Sens. Networks 11: 174383:1-174383:10 (2015) - [j9]Namhi Kang, Jiye Park, Hyeokjin Kwon, Souhwan Jung:
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 393754:1-393754:11 (2015) - [c27]Long Nguyen-Vu, Minho Park, Jungsoo Park, Souhwan Jung:
Privacy enhancement for data outsourcing. ICTC 2015: 335-338 - [c26]Minhoe Kim, Souhwan Jung, Minho Park:
A Distributed Self-Organizing Map for DoS attack detection. ICUFN 2015: 19-22 - [c25]Jungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung:
A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server. WISA 2015: 281-287 - 2014
- [c24]Minho Park, Dong Kun Noh, Souhwan Jung:
An efficient uplink admission control for ertPS in IEEE 802.16. ICOIN 2014: 395-400 - [c23]Ngoc-Tu Chau, Minh-Duong Nguyen, Seung Wook Jung, Souhwan Jung:
SecaaS Framework and Architecture: A Design of Dynamic Packet Control. WISA 2014: 190-201 - 2013
- [j8]Jaeduck Choi, Souhwan Jung:
An Integrated Handover Authentication for FMIPv6 Over Heterogeneous Access Link Technologies. Wirel. Pers. Commun. 71(2): 839-856 (2013) - [c22]Minuk Kim, Jiman Mun, Souhwan Jung, Younghan Kim:
A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior. ICITCS 2013: 1-4 - [c21]Seung Wook Jung, Souhwan Jung:
HRP: A HMAC-based RFID mutual authentication protocol using PUF. ICOIN 2013: 578-582 - 2012
- [j7]Jaeduck Choi, Souhwan Jung:
Unified security architecture and protocols using third party identity in V2V and V2I networks. Wirel. Commun. Mob. Comput. 12(15): 1326-1337 (2012) - [c20]Do Tronghop, Junho Hwang, Souhwan Jung, Yoan Shin, Myungsik Yoo:
Modeling and analysis of the wireless channel formed by LED angle in visible light communication. ICOIN 2012: 354-357 - [e1]Souhwan Jung, Moti Yung:
Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7115, Springer 2012, ISBN 978-3-642-27889-1 [contents] - 2011
- [c19]Chulhwa Hong, Truong Le, Kangsuk Chae, Souhwan Jung:
Evidence collection from car black boxes using smartphones. CCNC 2011: 836-837 - 2010
- [j6]Jaeduck Choi, Souhwan Jung:
A handover authentication using credentials based on chameleon hashing. IEEE Commun. Lett. 14(1): 54-56 (2010) - [c18]Kangsuk Chae, Daihoon Kim, Seohyun Jung, Jaeduck Choi, Souhwan Jung:
Evidence Collecting System from Car Black Boxes. CCNC 2010: 1-2 - [c17]Daihoon Kim, Jaeduck Choi, Souhwan Jung:
Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature. CCNC 2010: 1-2 - [c16]Hyosun Roh, Souhwan Jung:
Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks. ICTC 2010: 482-483
2000 – 2009
- 2009
- [c15]Jaesic Choi, Kangseok Chae, Jaeduck Choi, Souhwan Jung:
Demonstration of Spam and Security Mechanism in SIP-Based VoIP Services. CCNC 2009: 1-2 - [c14]Jaeduck Choi, Souhwan Jung:
A Security Framework with Strong Non-Repudiation and Privacy in VANETs. CCNC 2009: 1-5 - [c13]Jaeduck Choi, Souhwan Jung, Younghan Kim, Myungsik Yoo:
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. NEW2AN 2009: 291-300 - [c12]Myungsik Yoo, Junwon Lee, Younghan Kim, Souhwan Jung:
Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates. NEW2AN 2009: 323-333 - 2008
- [j5]Jaeduck Choi, Souhwan Jung:
A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6. IEICE Trans. Commun. 91-B(2): 605-608 (2008) - 2007
- [j4]Kihun Hong, Souhwan Jung, Namhi Kang, Younghan Kim:
Integrated Authentication Model for Network Access in Next Generation Networks. IEICE Trans. Commun. 90-B(11): 3246-3249 (2007) - 2006
- [j3]Kihun Hong, Souhwan Jung:
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks. IEICE Trans. Commun. 89-B(12): 3417-3420 (2006) - [c11]Seung Wook Jung, Souhwan Jung:
Secure Password Authentication for Distributed Computing. CIS 2006: 491-501 - [c10]Seung Wook Jung, Souhwan Jung:
Forward Secure Password-Enabled PKI with Instant Revocation. EuroPKI 2006: 54-67 - [c9]Namhi Kang, Seongil Yoo, Younghan Kim, Souhwan Jung, Kihun Hong:
Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks. UCS 2006: 384-397 - 2005
- [c8]Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim:
IPSec Support in NAT-PT Scenario for IPv6 Transition. ISC 2005: 194-202 - [c7]Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu:
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. WISA 2005: 96-107 - 2004
- [c6]Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung:
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. ACNS 2004: 398-413 - [c5]Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim:
Threat Analysis on NEtwork MObility (NEMO). ICICS 2004: 331-342 - [c4]Kihun Hong, Souhwan Jung:
An Efficient Authentication Scheme Using Recovery Information in Signature. ICICS 2004: 520-531 - [c3]Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications. WISA 2004: 1-13 - 2000
- [j2]Ki Yong Lee, Souhwan Jung, JaeYeol Rheem:
Smoothing approach using forward-backward Kalman filter with Markov switching parameters for speech enhancement. Signal Process. 80(12): 2579-2588 (2000) - [j1]Ki Yong Lee, Souhwan Jung:
Time-domain approach using multiple Kalman filters and EM algorithm to speech enhancement with nonstationary noise. IEEE Trans. Speech Audio Process. 8(3): 282-291 (2000)
1990 – 1999
- 1998
- [c2]Souhwan Jung, Younghan Kim, James S. Meditch:
Dynamic bandwidth allocation for VBR video transport. ICC 1998: 544-548 - [c1]Xinyu Wang, Souhwan Jung, James S. Meditch:
Dynamic bandwidth allocation for VBR video traffic using adaptive wavelet prediction. ICC 1998: 549-553
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint