Follow
Ah Reum Kang
Ah Reum Kang
Pai Chai University
Verified email at arkang.net - Homepage
Title
Cited by
Cited by
Year
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1572013
Development of a prediction model for hypotension after induction of anesthesia using machine learning
AR Kang, J Lee, W Jung, M Lee, SY Park, J Woo, SH Kim
PloS one 15 (4), e0231172, 2020
792020
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012
652012
Malware detection on byte streams of pdf files using convolutional neural networks
YS Jeong, J Woo, AR Kang
Security and Communication Networks 2019 (1), 8485365, 2019
612019
A statistical-based anomaly detection method for connected cars in internet of things environment
ML Han, J Lee, AR Kang, S Kang, JK Park, HK Kim
Internet of Vehicles-Safe and Intelligent Mobility: Second International …, 2015
502015
Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game
S Son, AR Kang, H Kim, T Kwon, J Park, HK Kim
PloS one 7 (4), e33918, 2012
492012
Comparative analysis on machine learning and deep learning to predict post-induction hypotension
J Lee, J Woo, AR Kang, YS Jeong, W Jung, M Lee, SH Kim
Sensors 20 (16), 4575, 2020
472020
Multimodal game bot detection using user behavioral characteristics
AR Kang, SH Jeong, A Mohaisen, HK Kim
SpringerPlus 5, 1-19, 2016
472016
Developing an individual glucose prediction model using recurrent neural network
DY Kim, DS Choi, J Kim, SW Chun, HW Gil, NJ Cho, AR Kang, J Woo
Sensors 20 (22), 6460, 2020
342020
Analysis of game bot's behavioral characteristics in social interaction networks of MMORPG
SH Jeong, AR Kang, HK Kim
ACM SIGCOMM Computer Communication Review 45 (4), 99-100, 2015
322015
Improved building blocks for secure multi-party computation based on secret sharing with honest majority
M Blanton, A Kang, C Yuan
Applied Cryptography and Network Security: 18th International Conference …, 2020
312020
The contagion of malicious behaviors in online games
J Woo, AR Kang, HK Kim
ACM SIGCOMM Computer Communication Review 43 (4), 543-544, 2013
282013
Malicious PDF detection model against adversarial attack built from benign PDF containing javascript
AR Kang, YS Jeong, SL Kim, J Woo
Applied Sciences 9 (22), 4764, 2019
262019
Prediction of blood pressure after induction of anesthesia using deep learning: A feasibility study
YS Jeong, AR Kang, W Jung, SJ Lee, S Lee, M Lee, YH Chung, BS Koo, ...
Applied Sciences 9 (23), 5135, 2019
252019
WHAP: Web-hacking profiling using case-based reasoning
ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim
2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016
212016
Prediction of postoperative complications for patients of end stage renal disease
YS Jeong, J Kim, D Kim, J Woo, MG Kim, HW Choi, AR Kang, SY Park
Sensors 21 (2), 544, 2021
202021
Domain name system security and privacy: old problems and new challenges
AR Kang, J Spaulding, A Mohaisen
arXiv preprint arXiv:1606.07080, 2016
202016
Rise and fall of online game groups: Common findings on two different games
AR Kang, J Park, J Lee, HK Kim
Proceedings of the 24th International Conference on World Wide Web, 1079-1084, 2015
162015
Modeling of bot usage diffusion across social networks in MMORPGs
J Woo, AR Kang, HK Kim
Proceedings of the Workshop at SIGGRAPH Asia, 13-18, 2012
162012
Malware detection of hangul word processor files using spatial pyramid average pooling
YS Jeong, J Woo, SM Lee, AR Kang
Sensors 20 (18), 5265, 2020
152020
The system can't perform the operation now. Try again later.
Articles 1–20