关注
Hayoon Yi
Hayoon Yi
Samsung Research
在 samsung.com 的电子邮件经过验证
标题
引用次数
年份
A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar.
W Choi, H Yi, Y Cho, Y Paek
Proceedings of the Korea Information Processing Society Conference, 384-387, 2015
2015
A Meta-data Generation and Compression Technique for Code Reuse Attack Detection
D Hwang, I Heo, J Lee, H Yi, Y Paek
Proceedings of the Korea Information Processing Society Conference, 424-427, 2015
2015
A Study on Dynamic Mobile Malware Detection Systems
DH Kwon, HY Yi, YP Cho, YH Paek
Proceedings of the Korea Information Processing Society Conference, 398-400, 2014
2014
A Study on effect the performance prediction of mobile application on mobile offloading
Y Kwon, S Yang, D Kwon, H Yi, Y Paek
Proceedings of the Korea Information Processing Society Conference, 233-236, 2014
2014
A Study on Offloading Techniques for 3D Rendering Applications
S Yang, Y Kwon, H Yi, D Kwon, Y Paek
Proceedings of the Korea Information Processing Society Conference, 246-248, 2014
2014
DADE: a fast data anomaly detection engine for kernel integrity monitoring
H Yi, Y Cho, Y Paek, K Ko
The Journal of Supercomputing 75, 4575-4600, 2019
42019
Data embedding scheme for efficient program behavior modeling with neural networks
S Ahn, H Yi, H Bae, S Yoon, Y Paek
IEEE Transactions on Emerging Topics in Computational Intelligence 6 (4 …, 2022
22022
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.
Y Cho, D Kwon, H Yi, Y Paek
NDSS, 2017
232017
Exploiting Multi Data Memory Banks in Embedded Systems
D Cho, S Yang, Y Kwon, H Yi, D Kwon, Y Paek
Proceedings of the Korea Information Processing Society Conference, 46-47, 2013
2013
Exploration of machine learning techniques for anomaly detection in computer security
이하윤
서울대학교 대학원, 2019
2019
Fast dynamic execution offloading for efficient mobile cloud computing
S Yang, Y Kwon, Y Cho, H Yi, D Kwon, J Youn, Y Paek
2013 IEEE International conference on Pervasive computing and communications …, 2013
552013
Hawkware: Network intrusion detection based on behavior analysis with ANNs on an IoT device
S Ahn, H Yi, Y Lee, WR Ha, G Kim, Y Paek
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
102020
Hypervisor based Root Exploitation Monitoring in Android
Y Cho, H Yi, D Kwon, W Choi, Y Paek
Proceedings of the Korea Information Processing Society Conference, 395-397, 2014
2014
LSTM-based system-call language modeling and ensemble method for host-based intrusion detection
G Kim, H Yi, J Lee, Y Paek, S Yoon
12016
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems
G Kim, H Yi, J Lee, Y Paek, S Yoon
arXiv preprint arXiv:1611.01726, 2016
1432016
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems. arXiv 2016
G Kim, H Yi, J Lee, Y Paek, S Yoon
arXiv preprint arXiv:1611.01726, 2016
152016
Mantis: Automatic performance prediction for smartphone applications
Y Kwon, S Lee, H Yi, D Kwon, S Yang, BG Chun, L Huang, P Maniatis, ...
2013 USENIX Annual Technical Conference (USENIX ATC 13), 297-308, 2013
902013
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices
Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ...
IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014
202014
Mimicry resilient program behavior modeling with LSTM based branch models
H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon, Y Paek
arXiv preprint arXiv:1803.09171, 2018
82018
Poster: Fast Object Identification for Kernel Data Anomaly Detection
H Yi, Y Cho, D Kwon, Y Paek
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20