On security and privacy issues of fog computing supported Internet of Things environment K Lee, D Kim, D Ha, U Rajput, H Oh 2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015 | 209 | 2015 |
Repica: Rewriting position independent code of arm D Ha, W Jin, H Oh IEEE Access 6, 50488-50509, 2018 | 13 | 2018 |
Rumor propagation detection system in social network services H Yang, J Zhong, D Ha, H Oh Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016 | 11 | 2016 |
Toward VANET Utopia: A new privacy preserving trustworthiness management scheme for VANET J Son, D Kim, HG Oh, D Ha, W Lee 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016 | 4 | 2016 |
안드로이드 어플리케이션 역공학 보호기법 D Ha, K Lee, H Oh Review of KIISC 25 (3), 19-28, 2015 | 2 | 2015 |
Study on Structure for Robust App Protection through Commercial Android App Hardening Service D Ha, H Oh Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018 | | 2018 |
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain D Ha, H Oh Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018 | | 2018 |
A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application D Ha, H Oh Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018 | | 2018 |
A Hiding Original App Method by Altering Android DexClassLoader Execution Flow H Jo, J Choi, D Ha, J Shin, H Oh Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017 | | 2017 |
Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network F Abbas, U Rajput, H Eun, D Ha, T Moon, W Jin, H Back, H Jo, S Bang, ... Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016 | | 2016 |