Follow
Yoo, Jeong Do
Yoo, Jeong Do
Other namesJeong Do Yoo, 유정도
Verified email at korea.ac.kr
Title
Cited by
Cited by
Year
IoT network intrusion dataset
H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim
IEEE Dataport 10, q70p-q449, 2019
1922019
Cyber attack and defense emulation agents
JD Yoo, E Park, G Lee, MK Ahn, D Kim, S Seo, HK Kim
Applied Sciences 10 (6), 2140, 2020
362020
Unsupervised malicious domain detection with less labeling effort
KH Park, HM Song, J Do Yoo, SY Hong, B Cho, K Kim, HK Kim
Computers & Security 116, 102662, 2022
212022
Uavcan dataset description
D Kim, Y Song, S Kwon, H Kim, JD Yoo, HK Kim
arXiv preprint arXiv:2212.09268, 2022
132022
IoT network intrusion dataset. IEEE Dataport
H Kang, DH Ahn, GM Lee, J Do Yoo, KH Park, HK Kim
102019
MUVIDS: false MAVLink injection attack detection in communication for unmanned vehicles
S Jeong, E Park, KU Seo, J Do Yoo, HK Kim
Workshop on automotive and autonomous vehicle security (AutoSec) 2021, 25, 2021
92021
Liuer Mihou: A practical framework for generating and evaluating grey-box adversarial attacks against NIDS
K He, DD Kim, J Sun, JD Yoo, YH Lee, HK Kim
arXiv preprint arXiv:2204.06113, 2022
82022
Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling
YG Kang, JD Yoo, E Park, DH Kim, HK Kim
Journal of The Korea Society of Computer and Information 25 (3), 65-72, 2020
52020
GUIDE: GAN-based UAV IDS Enhancement
J Do Yoo, H Kim, HK Kim
Computers & Security 147, 104073, 2024
12024
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names
H Lee, J Do Yoo, S Jeong, HK Kim
IEEE Access, 2024
12024
RTPS Attack Dataset Description
DY Kim, D Kim, Y Song, GM Kim, MG Song, JD Yoo, HK Kim
arXiv preprint arXiv:2311.14496, 2023
12023
C-ITS Environment Modeling and Attack Modeling
J Choi, MG Song, H Lee, C Sagong, S Park, J Lee, JD Yoo, HK Kim
arXiv preprint arXiv:2311.14327, 2023
12023
Generative adversarial network model and training method to generate message id sequence on unmanned moving objects
HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo
US Patent App. 17/532,226, 2022
12022
MeNU: Memorizing normality for UAV anomaly detection with a few sensor values
J Do Yoo, GM Kim, MG Song, HK Kim
Computers & Security 150, 104248, 2025
2025
AI-based Attack Graph Generation
S Park, J Lee, JD Yoo, MG Song, H Lee, J Choi, C Sagong, HK Kim
arXiv preprint arXiv:2311.14342, 2023
2023
Method and apparatus for dechipering obfuscated text for cyber security
MW Jeong, J Do YOO, SH Shin, HK Kim
US Patent App. 18/198,562, 2023
2023
Intrusion detection and prevention solution system in iot network using explainable ai
HK Kim, K Hyunjae, J Do YOO, YH Lee, C Young-Ah, YS Kim
US Patent App. 17/890,608, 2023
2023
Defining C-ITS Environment and Attack Scenarios
Y Kim, JW Choi, HS Lee, JD Yoo, H Kim, J Jang, K Park, HK Kim
arXiv preprint arXiv:2212.10854, 2022
2022
Anomaly detection model using message id sequence on unmanned moving objects
HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo
US Patent App. 17/532,272, 2022
2022
Multi-Modal Based Malware Similarity Estimation Method
JD Yoo, T Kim, I Kim, HK Kim
Journal of the Korea Institute of Information Security & Cryptology 29 (2 …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20