关注
Ji Young Woo
Ji Young Woo
在 sch.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications 21, 100198, 2020
4332020
Know your master: Driver profiling-based anti-theft method
BI Kwak, JY Woo, HK Kim
2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016
2002016
Service improvement by business process management using customer complaints in financial service industry
CU Pyon, JY Woo, SC Park
Expert Systems with Applications 38 (4), 3267-3279, 2011
1552011
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1442013
Visualization method for customer targeting using customer map
JY Woo, SM Bae, SC Park
Expert Systems with Applications 28 (4), 763-772, 2005
1162005
Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog
J Woo, H Chen
SpringerPlus 5, 1-19, 2016
1112016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
Ndss, 1-15, 2016
802016
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
662016
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
622016
Development of a prediction model for hypotension after induction of anesthesia using machine learning
AR Kang, J Lee, W Jung, M Lee, SY Park, J Woo, SH Kim
PloS one 15 (4), e0231172, 2020
592020
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
592015
Survey and research direction on online game security
J Woo, HK Kim
Proceedings of the Workshop at SIGGRAPH Asia, 19-25, 2012
592012
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012
572012
An SIR model for violent topic diffusion in social media
J Woo, J Son, H Chen
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
552011
Malware detection on byte streams of pdf files using convolutional neural networks
YS Jeong, J Woo, AR Kang
Security and Communication Networks 2019 (1), 8485365, 2019
492019
Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy
J Son, J Lee, KR Larsen, J Woo
Journal of the Association for Information Science and Technology 71 (10 …, 2020
482020
Gender classification using sentiment analysis and deep learning in a health web forum
S Park, J Woo
Applied Sciences 9 (6), 1249, 2019
482019
Using a Heuristic-Systematic Model to assess the Twitter user profile’s impact on disaster tweet credibility
J Son, J Lee, O Oh, HK Lee, J Woo
International Journal of Information Management 54, 102176, 2020
472020
A comparative analysis of deep learning and machine learning on detecting movement directions using PIR sensors
J Yun, J Woo
IEEE Internet of Things Journal 7 (4), 2855-2868, 2019
462019
Detecting and classifying method based on similarity matching of Android malware behavior with profile
J Jang, J Yun, A Mohaisen, J Woo, HK Kim
SpringerPlus 5, 1-23, 2016
442016
系统目前无法执行此操作,请稍后再试。
文章 1–20