Constraint-guided directed greybox fuzzing G Lee, W Shim, B Lee 30th USENIX Security Symposium (USENIX Security 21), 3559-3576, 2021 | 82 | 2021 |
Device and method of setting or removing security on content W Shim, IK Yun, I Lee US Patent 9,852,279, 2017 | 66 | 2017 |
Fairness-aware resource allocation in a cooperative OFDMA uplink system W Shim, Y Han, S Kim IEEE Transactions on Vehicular Technology 59 (2), 932-939, 2009 | 62 | 2009 |
Hierarchical system for objectionable video detection S Lee, W Shim, S Kim IEEE Transactions on Consumer Electronics 55 (2), 677-684, 2009 | 36 | 2009 |
Device and method of setting or removing security on content W Shim, IK Yun, I Lee US Patent 10,003,596, 2018 | 32 | 2018 |
# twiti: Social listening for threat intelligence H Shin, WC Shim, S Kim, S Lee, YG Kang, YH Hwang Proceedings of the Web Conference 2021, 92-104, 2021 | 31 | 2021 |
Method of modifying image including photographing restricted element, and device and system for performing the method W Shim, H Kim, JY Huh US Patent 9,911,002, 2018 | 30 | 2018 |
A distributed sinkhole detection method using cluster analysis W Shim, G Kim, S Kim Expert Systems with Applications 37 (12), 8486-8491, 2010 | 30 | 2010 |
Utopia: Automatic generation of fuzz driver using unit tests B Jeong, J Jang, H Yi, J Moon, J Kim, I Jeon, T Kim, WC Shim, YH Hwang 2023 IEEE Symposium on Security and Privacy (SP), 2676-2692, 2023 | 22 | 2023 |
Cybersecurity event detection with new and re-emerging words H Shin, WC Shim, J Moon, JW Seo, S Lee, YH Hwang Proceedings of the 15th ACM asia conference on computer and communications …, 2020 | 20 | 2020 |
Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package W Shim, B Kim US Patent App. 14/471,721, 2015 | 6 | 2015 |
Electronic device detecting software vulnerability and method for operating same S Woochul, S Kim, Y Hwang US Patent 11,861,014, 2024 | 3 | 2024 |
Electronic device and method of transmitting and receiving information by electronic device JW Seo, W Shim, CH Lee, Y Hwang US Patent 10,033,710, 2018 | 3 | 2018 |
Security enhanced speech recognition method and device W Shim, I Kim US Patent App. 15/852,705, 2018 | 3 | 2018 |
Method of generating execution file for mobile device, method of executing application of mobile device, device to generate application execution file, and mobile device W Shim, M Jung US Patent App. 14/283,456, 2014 | 3 | 2014 |
Electronic apparatus and method of controlling the same W Shim US Patent 10,772,156, 2020 | 2 | 2020 |
Device and method of setting or removing security on content W Shim, IK Yun, I Lee US Patent 11,057,378, 2021 | 1 | 2021 |
Device and method of setting or removing security on content W Shim, IK Yun, I Lee US Patent 10,193,885, 2019 | 1 | 2019 |
Electronic device for managing use of data from other electronic device and method for controlling the same CH Lee, W Shim US Patent 10,084,793, 2018 | 1 | 2018 |
A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System Y Han, W Shim, S Kim IEICE transactions on communications 92 (4), 1376-1379, 2009 | 1 | 2009 |