Data embedding scheme for efficient program behavior modeling with neural networks S Ahn, H Yi, H Bae, S Yoon, Y Paek IEEE Transactions on Emerging Topics in Computational Intelligence 6 (4 …, 2022 | 3 | 2022 |
Hawkware: Network intrusion detection based on behavior analysis with ANNs on an IoT device S Ahn, H Yi, Y Lee, WR Ha, G Kim, Y Paek 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 10 | 2020 |
Exploration of machine learning techniques for anomaly detection in computer security 이하윤 서울대학교 대학원, 2019 | | 2019 |
DADE: a fast data anomaly detection engine for kernel integrity monitoring H Yi, Y Cho, Y Paek, K Ko The Journal of Supercomputing 75, 4575-4600, 2019 | 4 | 2019 |
Real-time anomalous branch behavior inference with a GPU-inspired engine for machine learning models H Oh, H Yi, H Choe, Y Cho, S Yoon, Y Paek 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 908-913, 2019 | 2 | 2019 |
Safe and efficient implementation of a security system on ARM using intra-level privilege separation D Kwon, H Yi, Y Cho, Y Paek ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-30, 2019 | 9 | 2019 |
Mimicry resilient program behavior modeling with LSTM based branch models H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon, Y Paek arXiv preprint arXiv:1803.09171, 2018 | 8 | 2018 |
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Y Cho, D Kwon, H Yi, Y Paek NDSS, 2017 | 24 | 2017 |
Poster: Fast Object Identification for Kernel Data Anomaly Detection H Yi, Y Cho, D Kwon, Y Paek | | 2017 |
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems G Kim, H Yi, J Lee, Y Paek, S Yoon arXiv preprint arXiv:1611.01726, 2016 | 143 | 2016 |
LSTM-based system-call language modeling and ensemble method for host-based intrusion detection G Kim, H Yi, J Lee, Y Paek, S Yoon | 1 | 2016 |
Precise execution offloading for applications with dynamic behavior in mobile cloud computing Y Kwon, H Yi, D Kwon, S Yang, Y Cho, Y Paek Pervasive and Mobile Computing 27, 58-74, 2016 | 30 | 2016 |
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems. arXiv 2016 G Kim, H Yi, J Lee, Y Paek, S Yoon arXiv preprint arXiv:1611.01726, 2016 | 15 | 2016 |
A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar. W Choi, H Yi, Y Cho, Y Paek Proceedings of the Korea Information Processing Society Conference, 384-387, 2015 | | 2015 |
A Meta-data Generation and Compression Technique for Code Reuse Attack Detection D Hwang, I Heo, J Lee, H Yi, Y Paek Proceedings of the Korea Information Processing Society Conference, 424-427, 2015 | | 2015 |
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ... IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014 | 20 | 2014 |
Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing S Yang, D Kwon, H Yi, Y Cho, Y Kwon, Y Paek IEEE Transactions on Mobile Computing 13 (11), 2648-2660, 2014 | 77 | 2014 |
The potential of mobile execution offloading for enhanced device security H Yi, Y Cho, D Kwon, Y Paek Proceedings of the Korea Information Processing Society Conference, 240-242, 2014 | | 2014 |
Hypervisor based Root Exploitation Monitoring in Android Y Cho, H Yi, D Kwon, W Choi, Y Paek Proceedings of the Korea Information Processing Society Conference, 395-397, 2014 | | 2014 |
A Study on Dynamic Mobile Malware Detection Systems DH Kwon, HY Yi, YP Cho, YH Paek Proceedings of the Korea Information Processing Society Conference, 398-400, 2014 | | 2014 |