دنبال کردن
Euijin Choo
عنوان
نقل شده توسط
نقل شده توسط
سال
Detecting opinion spammer groups through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
782015
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
772010
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission
E Choo, J Lee, H Lee, G Nam
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
432007
Revealing and incorporating implicit communities to improve recommender systems
E Choo, T Yu, M Chi, Y Sun
Proceedings of the fifteenth ACM conference on Economics and computation …, 2014
162014
Method for encrypting and decrypting an image frame
HJ Lee, EJ Choo, JH Lee, GW Nam
US Patent App. 11/905,240, 2008
162008
A large scale study and classification of virustotal reports on phishing and malware urls
E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil
ACM SIGMETRICS Performance Evaluation Review 52 (1), 55-56, 2024
132024
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Journal of Computer Security 25 (3), 283-318, 2017
132017
Siraj: A unified framework for aggregation of malicious entity detectors
S Thirumuruganathan, M Nabeel, E Choo, I Khalil, T Yu
2022 IEEE Symposium on Security and Privacy (SP), 507-521, 2022
122022
Content-agnostic detection of phishing domains using certificate transparency and passive dns
M AlSabah, M Nabeel, Y Boshmaf, E Choo
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
112022
Identifying malicious metering data in advanced metering infrastructure
E Choo, Y Park, H Siyamwala
2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014
92014
Time-window based group-behavior supported method for accurate detection of anomalous users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
72021
A large scale study and classification of virustotal reports on phishing and malware urls
E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023
52023
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
ACM Transactions on Privacy and Security 26 (1), 1-32, 2022
42022
Compromised mobile device detection system and method
M Al Sabah, M Nabeel, E Choo, IM Khalil, T Yu, W Wang
US Patent App. 17/495,391, 2022
32022
Graphic model analysis of frauds in online consumer reviews
C Song, K Goswami, Y Park, SY Chang, E Choo
Proceedings of the Second International Conference on Internet of things …, 2017
32017
Munkhbayar Bat-Erdene, and Heejo Lee.“
G Jeong, E Choo, J Lee
Generic unpacking using entropy analysis.” In: MALWARE., 2010
32010
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
arXiv preprint arXiv:2012.13971, 2020
22020
Analyzing opinion spammers’ network behavior in online review systems
E Choo
2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018
22018
COMPARS: toward an empirical approach for comparing the resilience of reputation systems
E Choo, J Jiang, T Yu
Proceedings of the 4th ACM conference on Data and application security and …, 2014
22014
3d-gsw: 3d gaussian splatting watermark for protecting copyrights in radiance fields
Y Jang, H Park, F Yang, H Ko, E Choo, S Kim
arXiv preprint arXiv:2409.13222, 2024
12024
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20