Secure knn query processing in untrusted cloud environments S Choi, G Ghinita, HS Lim, E Bertino IEEE Transactions on Knowledge and Data Engineering 26 (11), 2818-2831, 2014 | 104 | 2014 |
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations S Choi, G Ghinita, E Bertino Database and Expert Systems Applications: 21st International Conference …, 2010 | 91 | 2010 |
Attention-based automated feature extraction for malware analysis S Choi, J Bae, C Lee, Y Kim, J Kim sensors 20 (10), 2893, 2020 | 28 | 2020 |
Evaluations of AI‐based malicious PowerShell detection with feature optimizations J Song, J Kim, S Choi, J Kim, I Kim ETRI Journal 43 (3), 549-560, 2021 | 21 | 2021 |
Combined kNN Classification and hierarchical similarity hash for fast malware detection S Choi Applied Sciences 10 (15), 5173, 2020 | 18 | 2020 |
Authenticated top-k aggregation in distributed and outsourced databases S Choi, HS Lim, E Bertino 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 14 | 2012 |
Malicious powershell detection using graph convolution network S Choi Applied Sciences 11 (14), 6429, 2021 | 10 | 2021 |
Secure Mutual Proximity Zone Enclosure Evaluation S Choi, G Ghinita, E Bertino ACM SIGSPATIAL GIS, 2014 | 9 | 2014 |
Detection of malicious pdf based on document structure features and stream objects AR Kang, YS Jeong, SL Kim, J Kim, J Woo, S Choi Journal of The Korea Society of Computer and Information 23 (11), 85-93, 2018 | 7 | 2018 |
Secure and resilient proximity-based access control S Choi, C Gutierrez, HS Lim, S Bagchi, E Bertino Proceedings of the 2013 international workshop on Data management …, 2013 | 7 | 2013 |
Network abnormal behaviour analysis system S Choi, Y Choi, J Lee, J Kim, I Kim 2017 19th International Conference on Advanced Communication Technology …, 2017 | 6 | 2017 |
Novel feature extraction method for detecting malicious MQTT traffic using Seq2Seq S Choi, J Cho Applied Sciences 12 (23), 12306, 2022 | 5 | 2022 |
Malicious Powershell Detection Using Attention against Adversarial Attacks S Choi Electronics 9 (11), 1817, 2020 | 5 | 2020 |
딥러닝을 이용한 악성코드탐지 연구동향 S Choi, YS Kim, J Kim, I Kim Review of KIISC 27 (3), 20-26, 2017 | 5 | 2017 |
Internet News User Analysis Using Deep Learning and Similarity Comparison S Choi Electronics, 2022 | 3 | 2022 |
SSL/TLS 기반 암호화 트래픽의 서비스 식별 방법 김성민, 박준상, 윤성호, 김종현, 최선오, 김명섭 한국통신학회논문지 40 (11), 2160-2168, 2015 | 3 | 2015 |
Secure sensor network SUM aggregation with detection of malicious nodes S Choi, G Ghiniţă, E Bertino 37th Annual IEEE Conference on Local Computer Networks, 19-27, 2012 | 3 | 2012 |
Efficient MD coding core selection to reduce the bandwidth consumption S Choi, SS Byun, C Yoo 32nd IEEE Conference on Local Computer Networks (LCN 2007), 231-233, 2007 | 2 | 2007 |
A study of the relationship of malware detection mechanisms using Artificial Intelligence J Song, S Choi, J Kim, K Park, C Park, J Kim, I Kim ICT Express, 2024 | 1 | 2024 |
Similar Word Replacement Method for Improving News Commenter Analysis D Lee, S Choi Applied Sciences, 2022 | 1 | 2022 |