Secure and blockchain-based emergency driven message protocol for 5G enabled vehicular edge computing L Nkenyereye, B Adhi Tama, MK Shahzad, YH Choi Sensors 20 (1), 154, 2019 | 55 | 2019 |
Using deep learning to solve computer security challenges: a survey YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou Cybersecurity 3, 1-32, 2020 | 47 | 2020 |
Software-defined network-based vehicular networks: A position paper on their modeling and implementation L Nkenyereye, L Nkenyereye, SMR Islam, YH Choi, M Bilal, JW Jang Sensors 19 (17), 3788, 2019 | 41 | 2019 |
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection L Zhang, P Liu, YH Choi, P Chen IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022 | 36 | 2022 |
CodeNet: Code-targeted convolutional neural network architecture for smart contract vulnerability detection SJ Hwang, SH Choi, J Shin, YH Choi IEEE Access 10, 32595-32607, 2022 | 26 | 2022 |
Study on virtual service chain for secure software-defined networking W Lee, YH Choi, N Kim Advanced Science and Technology Letters 29 (13), 177-180, 2013 | 19 | 2013 |
Unsupervised multi-stage attack detection framework without details on single-stage attacks J Shin, SH Choi, P Liu, YH Choi Future Generation Computer Systems 100, 811-825, 2019 | 17 | 2019 |
A fast pattern matching algorithm with multi-byte search unit for high-speed network security YH Choi, MY Jung, SW Seo Computer communications 34 (14), 1750-1763, 2011 | 17 | 2011 |
Secure and lightweight cloud-assisted video reporting protocol over 5G-enabled vehicular networks L Nkenyereye, J Kwon, YH Choi Sensors 17 (10), 2191, 2017 | 15 | 2017 |
Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack SH Choi, DH Hwang, YH Choi 2017 IEEE Conference on Dependable and Secure Computing, 131-137, 2017 | 13 | 2017 |
Structural image de-identification for privacy-preserving deep learning DH Ko, SH Choi, JM Shin, P Liu, YH Choi IEEE Access 8, 119848-119862, 2020 | 12 | 2020 |
Load balancing method and apparatus in intrusion detection system YH Choi, SW Seo, BH Koo, H Cho US Patent 10,523,692, 2019 | 12 | 2019 |
L+ 1-mwm: A fast pattern matching algorithm for high-speed packet filtering YH Choi, MY Jung, SW Seo IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2288-2296, 2008 | 12 | 2008 |
A similarity query system for road traffic data based on a NoSQL document store TI Damaiyanti, A Imawan, FI Indikawati, YH Choi, J Kwon Journal of Systems and Software 127, 28-51, 2017 | 11 | 2017 |
Worm virulence estimation for the containment of local worm outbreak YH Choi, L Li, P Liu, G Kesidis computers & security 29 (1), 104-123, 2010 | 10 | 2010 |
ARGAN: Adversarially robust generative adversarial networks for deep neural networks against adversarial examples SH Choi, JM Shin, P Liu, YH Choi IEEE Access 10, 33602-33615, 2022 | 8 | 2022 |
EEJE: Two-step input transformation for robust DNN against adversarial examples SH Choi, J Shin, P Liu, YH Choi IEEE Transactions on Network Science and Engineering 8 (2), 908-920, 2020 | 8 | 2020 |
Authentication protocol for wearable devices using mobile authentication proxy DH Hwang, JM Shin, YH Choi 2018 Tenth international conference on ubiquitous and future networks (ICUFN …, 2018 | 8 | 2018 |
Machine learning based prediction of the value of buildings W Lee, N Kim, YH Choi, YS Kim, BD Lee KSII Transactions on Internet and Information Systems (TIIS) 12 (8), 3966-3991, 2018 | 8 | 2018 |
Dynamic configuration of batch rekeying interval for secure multicast service DH Je, HS Kim, YH Choi, SW Seo 2014 International Conference on Computing, Networking and Communications …, 2014 | 8 | 2014 |