In-vehicle network intrusion detection using deep convolutional neural network HM Song, J Woo, HK Kim Vehicular Communications 21, 100198, 2020 | 433 | 2020 |
Know your master: Driver profiling-based anti-theft method BI Kwak, JY Woo, HK Kim 2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016 | 200 | 2016 |
Service improvement by business process management using customer complaints in financial service industry CU Pyon, JY Woo, SC Park Expert Systems with Applications 38 (4), 3267-3279, 2011 | 155 | 2011 |
Online game bot detection based on party-play log analysis AR Kang, J Woo, J Park, HK Kim Computers & Mathematics with Applications 65 (9), 1384-1395, 2013 | 144 | 2013 |
Visualization method for customer targeting using customer map JY Woo, SM Bae, SC Park Expert Systems with Applications 28 (4), 763-772, 2005 | 116 | 2005 |
Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog J Woo, H Chen SpringerPlus 5, 1-19, 2016 | 111 | 2016 |
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. E Lee, J Woo, H Kim, A Mohaisen, HK Kim Ndss, 1-15, 2016 | 80 | 2016 |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim computers & security 58, 125-138, 2016 | 66 | 2016 |
Crime scene reconstruction: Online gold farming network analysis H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016 | 62 | 2016 |
Development of a prediction model for hypotension after induction of anesthesia using machine learning AR Kang, J Lee, W Jung, M Lee, SY Park, J Woo, SH Kim PloS one 15 (4), e0231172, 2020 | 59 | 2020 |
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim Digital Investigation 14, 17-35, 2015 | 59 | 2015 |
Survey and research direction on online game security J Woo, HK Kim Proceedings of the Workshop at SIGGRAPH Asia, 19-25, 2012 | 59 | 2012 |
Chatting pattern based game BOT detection: do they talk like us? AR Kang, HK Kim, J Woo KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012 | 57 | 2012 |
An SIR model for violent topic diffusion in social media J Woo, J Son, H Chen Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011 | 55 | 2011 |
Malware detection on byte streams of pdf files using convolutional neural networks YS Jeong, J Woo, AR Kang Security and Communication Networks 2019 (1), 8485365, 2019 | 49 | 2019 |
Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy J Son, J Lee, KR Larsen, J Woo Journal of the Association for Information Science and Technology 71 (10 …, 2020 | 48 | 2020 |
Gender classification using sentiment analysis and deep learning in a health web forum S Park, J Woo Applied Sciences 9 (6), 1249, 2019 | 48 | 2019 |
Using a Heuristic-Systematic Model to assess the Twitter user profile’s impact on disaster tweet credibility J Son, J Lee, O Oh, HK Lee, J Woo International Journal of Information Management 54, 102176, 2020 | 47 | 2020 |
A comparative analysis of deep learning and machine learning on detecting movement directions using PIR sensors J Yun, J Woo IEEE Internet of Things Journal 7 (4), 2855-2868, 2019 | 46 | 2019 |
Detecting and classifying method based on similarity matching of Android malware behavior with profile J Jang, J Yun, A Mohaisen, J Woo, HK Kim SpringerPlus 5, 1-23, 2016 | 44 | 2016 |