default search action
Eunjin Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c25]Raza Ahmad, Aniket Modi, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani:
Analyzing Discrepancies in Whole-Network Provenance. Critical Infrastructure Protection 2023: 93-114 - 2021
- [j9]Eunjin Jung, Incheol Kim:
Hybrid Imitation Learning Framework for Robotic Manipulation Tasks. Sensors 21(10): 3409 (2021) - 2020
- [c24]Nupur Garg, Regine De Guzman, Eunjin Jung, Theresa Migler:
The Joys and Challenges of Outreach in CS Education to Low-Income Populations. SIGCSE 2020: 809-810 - [c23]Raza Ahmad, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani:
Discrepancy Detection in Whole Network Provenance. TaPP 2020
2010 – 2019
- 2019
- [c22]Eunjin Jung, Marion Le Tilly, Ashish Gehani, Yunjie Ge:
Data Mining-Based Ethereum Fraud Detection. Blockchain 2019: 266-273 - 2018
- [c21]Nesrine Kaaniche, Eunjin Jung, Ashish Gehani:
Efficiently Validating Aggregated IoT Data Integrity. BigDataService 2018: 260-265 - [i1]Jean-Philippe Martin, Eunjin Jung:
Rationality-proof consensus: extended abstract. CoRR abs/1811.00742 (2018) - 2017
- [c20]Eunjin Jung, Evelyn Y. Ho:
Inclusive persuasion for security software adoption. SOUPS 2017 - 2015
- [c19]Eunjin Jung, Evelyn Y. Ho, Hyewon Chung, Mark Sinclair:
Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community. CHI Extended Abstracts 2015: 1085-1090 - 2013
- [j8]Insoon Jo, Eunjin Jung, Heon Young Yeom:
Interactive Website Filter for Safe Web Browsing. J. Inf. Sci. Eng. 29(1): 115-131 (2013) - [c18]Eunjin Jung, Xornam S. Apedoe:
Changing young women's perceptions of CS via outreach. ITiCSE 2013: 333 - 2011
- [c17]Fatih Turkmen, Eunjin Jung, Bruno Crispo:
Towards Run-Time Verification in Access Control. POLICY 2011: 25-32 - 2010
- [j7]Hyeong Seog Kim, Eunjin Jung, Heon Young Yeom:
ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks. KSII Trans. Internet Inf. Syst. 4(6): 1311-1326 (2010) - [c16]Eunjin Jung, Sukhyun Ahn, Seung-won Hwang:
k-ARQ: k-Anonymous Ranking Queries. DASFAA (1) 2010: 414-428 - [c15]Insoon Jo, Eunjin Jung, Heon Young Yeom:
You're Not Who You Claim to Be: Website Identity Check for Phishing Detection. ICCCN 2010: 1-6
2000 – 2009
- 2009
- [c14]Peter Likarish, Eunjin Jung:
A targeted web crawling for building malicious javascript collection. CIKM-DSMM 2009: 23-26 - [c13]Eunjin Jung, Bruno Crispo, Lasantha Ranaweera:
An efficient and scalable algorithm for policy compatibility in service virtualization. GRID 2009: 58-65 - [c12]Peter Likarish, Eunjin Jung, Insoon Jo:
Obfuscated malicious javascript detection using classification techniques. MALWARE 2009: 47-54 - [c11]Peter Likarish, Donald E. Dunbar, Juan Pablo Hourcade, Eunjin Jung:
BayeShield: conversational anti-phishing user interface. SOUPS 2009 - 2008
- [c10]Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade:
B-APT: Bayesian Anti-Phishing Toolbar. ICC 2008: 1745-1749 - [c9]Hyeong Seog Kim, Eunjin Jung, Heon Young Yeom:
Load-Balanced and Sybil-Resilient File Search in P2P Networks. OPODIS 2008: 542-545 - 2007
- [j6]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distributed Syst. 18(4): 474-484 (2007) - 2006
- [j5]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key bundles and parcels: Secure communication in many groups. Comput. Networks 50(11): 1781-1798 (2006) - [j4]Deuk-Whee Kwak, Seungjoo Lee, JongWon Kim, Eunjin Jung:
An efficient LKH tree balancing algorithm for group key management. IEEE Commun. Lett. 10(3): 222-224 (2006) - [j3]Eunjin Jung, Mohamed G. Gouda:
Vulnerability analysis of certificate graphs. Int. J. Secur. Networks 1(1/2): 13-23 (2006) - [j2]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. J. Aerosp. Comput. Inf. Commun. 3(10): 487-497 (2006) - [c8]Eunjin Jung, Mohamed G. Gouda:
Rating Certificates. ICCCN 2006: 449-454 - [c7]Deuk-Whee Kwak, Seungjoo Lee, JongWon Kim, Eunjin Jung:
An Efficient Key Tree Management Algorithm for LKH Group Key Management. ICOIN 2006: 703-712 - 2005
- [b1]Eunjin Jung:
Grammaire des adverbes de durée et de date en coréen. (The grammar of adverbs of time, date and duration in Korean). University of Paris-Est, France, 2005 - [c6]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. Self-Stabilizing Systems 2005: 140-152 - 2004
- [c5]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal dispersal of special certificate graphs. GLOBECOM 2004: 2213-2217 - [c4]Mohamed G. Gouda, Eunjin Jung:
Certificate Dispersal in Ad-Hoc Networks. ICDCS 2004: 616-623 - [c3]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. DISC 2004: 435-449 - 2003
- [c2]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key Bundels and Parcels: Secure Communication in Many Groups. Networked Group Communication 2003: 119-130
1990 – 1999
- 1997
- [j1]Il Dong Yun, Eunjin Jung, Sang Uk Lee:
On the fast shape recovery technique using multiple ring lights. Pattern Recognit. 30(6): 883-893 (1997) - 1994
- [c1]Eunjin Jung, Il Dong Yun, Sang Uk Lee:
Recovery of 3-D Shape using Hybrid Reflectance Model. ICIP (2) 1994: 120-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint