Folgen
Sunoh Choi
Sunoh Choi
Associate Professor, Jeonbuk National University
Bestätigte E-Mail-Adresse bei jbnu.ac.kr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Secure knn query processing in untrusted cloud environments
S Choi, G Ghinita, HS Lim, E Bertino
IEEE Transactions on Knowledge and Data Engineering 26 (11), 2818-2831, 2014
1032014
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
S Choi, G Ghinita, E Bertino
Database and Expert Systems Applications: 21st International Conference …, 2010
892010
Attention-based automated feature extraction for malware analysis
S Choi, J Bae, C Lee, Y Kim, J Kim
sensors 20 (10), 2893, 2020
252020
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
J Song, J Kim, S Choi, J Kim, I Kim
ETRI Journal 43 (3), 549-560, 2021
172021
Combined kNN Classification and hierarchical similarity hash for fast malware detection
S Choi
Applied Sciences 10 (15), 5173, 2020
142020
Authenticated top-k aggregation in distributed and outsourced databases
S Choi, HS Lim, E Bertino
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
142012
Malicious powershell detection using graph convolution network
S Choi
Applied Sciences 11 (14), 6429, 2021
102021
Secure Mutual Proximity Zone Enclosure Evaluation
S Choi, G Ghinita, E Bertino
ACM SIGSPATIAL GIS, 2014
92014
Detection of malicious pdf based on document structure features and stream objects
AR Kang, YS Jeong, SL Kim, J Kim, J Woo, S Choi
Journal of The Korea Society of Computer and Information 23 (11), 85-93, 2018
72018
Secure and resilient proximity-based access control
S Choi, C Gutierrez, HS Lim, S Bagchi, E Bertino
Proceedings of the 2013 international workshop on Data management …, 2013
72013
Network abnormal behaviour analysis system
S Choi, Y Choi, J Lee, J Kim, I Kim
2017 19th International Conference on Advanced Communication Technology …, 2017
62017
Novel feature extraction method for detecting malicious MQTT traffic using Seq2Seq
S Choi, J Cho
Applied Sciences 12 (23), 12306, 2022
52022
Malicious Powershell Detection Using Attention against Adversarial Attacks
S Choi
Electronics 9 (11), 1817, 2020
52020
딥러닝을 이용한 악성코드탐지 연구동향
S Choi, YS Kim, J Kim, I Kim
Review of KIISC 27 (3), 20-26, 2017
52017
Internet News User Analysis Using Deep Learning and Similarity Comparison
S Choi
Electronics, 2022
32022
SSL/TLS 기반 암호화 트래픽의 서비스 식별 방법
김성민, 박준상, 윤성호, 김종현, 최선오, 김명섭
한국통신학회논문지 40 (11), 2160-2168, 2015
32015
Secure sensor network SUM aggregation with detection of malicious nodes
S Choi, G Ghiniţă, E Bertino
37th Annual IEEE Conference on Local Computer Networks, 19-27, 2012
32012
Efficient MD coding core selection to reduce the bandwidth consumption
S Choi, SS Byun, C Yoo
32nd IEEE Conference on Local Computer Networks (LCN 2007), 231-233, 2007
22007
Similar Word Replacement Method for Improving News Commenter Analysis
D Lee, S Choi
Applied Sciences, 2022
12022
Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows
S Choi, HW Park, JY Lee, JH Kim, IK Kim
Advances in Computer Science and Ubiquitous Computing: CSA & CUTE, 171-175, 2015
12015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20