default search action
Yoon-Ho Choi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Assem Utaliyeva, SeonJin Hwang, Yoon-Ho Choi:
DP Patch: ROI-Based Approach of Privacy-Preserving Image Processing With Robust Classification. IEEE Access 12: 63156-63170 (2024) - [j38]SeonJin Hwang, Seong-Kwan Hong, Yoon-Ho Choi:
CGGNet: Compiler-Guided Generation Network for Smart Contract Data Augmentation. IEEE Access 12: 97515-97532 (2024) - [j37]Hyeong-Geon Kim, Jin-Myeong Shin, Yoon-Ho Choi:
Human-Unrecognizable Differential Private Noised Image Generation Method. Sensors 24(10): 3166 (2024) - [c20]Jae-Seok Kim, Joonho Seo, SeonJin Hwang, Jin-Myeong Shin, Yoon-Ho Choi:
Zero-SAD: Zero-Shot Learning Using Synthetic Abnormal Data for Abnormal Behavior Detection on Private Cloud. SoCC 2024: 111-125 - [c19]Hye Ju Lee, SeonJin Hwang, Millati Pratiwi, Yoon-Ho Choi:
Obfuscated PHP Webshell Detection Using the Webshell Tailored TextRank Algorithm. SAC 2024: 1358-1365 - 2023
- [j36]Tae-Hoon Kim, SeokHwan Choi, Yoon-Ho Choi:
Instance-Agnostic and Practical Clean Label Backdoor Attack Method for Deep Learning Based Face Recognition Models. IEEE Access 11: 144040-144050 (2023) - [j35]SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks. Future Gener. Comput. Syst. 145: 563-577 (2023) - [j34]Yoon-Ho Choi, Jaechang Nam:
WINE: Warning miner for improving bug finders. Inf. Softw. Technol. 155: 107109 (2023) - [j33]Assem Utaliyeva, Jin-Myeong Shin, Yoon-Ho Choi:
Task-Specific Adaptive Differential Privacy Method for Structured Data. Sensors 23(4): 1980 (2023) - [j32]SeonJin Hwang, Assem Utaliyeva, Jae-Seok Kim, Yoon-Ho Choi:
Bypassing Heaven's Gate Technique Using Black-Box Testing. Sensors 23(23): 9417 (2023) - [j31]Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - [c18]Assem Utaliyeva, Millati Pratiwi, HyeGyoung Park, Yoon-Ho Choi:
ChatGPT: A Threat to Spam Filtering Systems. HPCC/DSS/SmartCity/DependSys 2023: 1043-1050 - 2022
- [j30]SeonJin Hwang, SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection. IEEE Access 10: 32595-32607 (2022) - [j29]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples. IEEE Access 10: 33602-33615 (2022) - [j28]Jae-Seok Kim, Jin-Myeong Shin, Seok-Hwan Choi, Yoon-Ho Choi:
A Study on Prevention and Automatic Recovery of Blockchain Networks Against Persistent Censorship Attacks. IEEE Access 10: 110770-110784 (2022) - [j27]SeokHwan Choi, Tae-u Bahk, Sungyong Ahn, Yoon-Ho Choi:
Clustering Approach for Detecting Multiple Types of Adversarial Examples. Sensors 22(10): 3826 (2022) - [c17]Yoon-Ho Choi, Jaechang Nam:
On the Naturalness of Bytecode Instructions. ASE 2022: 181:1-181:5 - 2021
- [j26]Jin-Myeong Shin, SeokHwan Choi, Yoon-Ho Choi:
Is Homomorphic Encryption-Based Deep Learning Secure Enough? Sensors 21(23): 7806 (2021) - [j25]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. IEEE Trans. Netw. Sci. Eng. 8(2): 908-920 (2021) - 2020
- [j24]DongHyun Ko, SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Structural Image De-Identification for Privacy-Preserving Deep Learning. IEEE Access 8: 119848-119862 (2020) - [j23]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j22]Lewis Nkenyereye, Bayu Adhi Tama, Muhammad Khuram Shahzad, Yoon-Ho Choi:
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing. Sensors 20(1): 154 (2020) - [j21]DongHyun Ko, SeokHwan Choi, Sungyong Ahn, Yoon-Ho Choi:
Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack. Sensors 20(23): 6756 (2020) - [i4]Lan Zhang, Peng Liu, Yoon-Ho Choi:
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. CoRR abs/2009.05602 (2020)
2010 – 2019
- 2019
- [j20]Jin-Myeong Shin, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Gener. Comput. Syst. 100: 811-825 (2019) - [j19]SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
Dynamic Nonparametric Random Forest Using Covariance. Secur. Commun. Networks 2019: 3984031:1-3984031:12 (2019) - [j18]Lionel Nkenyereye, Lewis Nkenyereye, S. M. Riazul Islam, Yoon-Ho Choi, Muhammad Bilal, Jong-Wook Jang:
Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and Implementation. Sensors 19(17): 3788 (2019) - [c16]SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. CNS 2019: 1-6 - [i3]Lionel Nkenyereye, Lewis Nkenyereye, S. M. Riazul Islam, Yoon-Ho Choi, Muhammad Bilal, Jong-Wook Jang:
Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and Implementation. CoRR abs/1909.00201 (2019) - [i2]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - 2018
- [j17]Doo-Hee Hwang, SeokHwan Choi, Jin-Myeong Shin, Giltae Song, Yoon-Ho Choi:
Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage. IEEE Access 6: 45990-46001 (2018) - [j16]Doo-Hee Hwang, Yoon-Ho Choi:
w-Bit Shifting Non-Adjacent Form Conversion. KSII Trans. Internet Inf. Syst. 12(7): 3455-3474 (2018) - [j15]Woosik Lee, Namgi Kim, Yoon-Ho Choi, Yong Soo Kim, Byoung-Dai Lee:
Machine Learning based Prediction of The Value of Buildings. KSII Trans. Internet Inf. Syst. 12(8): 3966-3991 (2018) - [j14]M. Harist Murdani, Joonho Kwon, Yoon-Ho Choi, Bonghee Hong:
Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities. Sensors 18(4): 965 (2018) - [c15]Kwang-Wook Yun, Hyeong-Geon Kim, Joonho Kwon, Han-You Jeong, Yoon-Ho Choi:
Vehicular Acceleration Advisory Algorithm Using V2V Communication in Highway Junction Point. ICUFN 2018: 85-88 - [c14]SeokHwan Choi, DongHyun Ko, SeonJin Hwang, Yoon-Ho Choi:
Memory-Efficient Random Forest Generation Method for Network Intrusion Detection. ICUFN 2018: 305-307 - [c13]Doo-Hee Hwang, Jin-Myeong Shin, Yoon-Ho Choi:
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy. ICUFN 2018: 700-702 - 2017
- [j13]Titus Irma Damaiyanti, Ardi Imawan, Fitri Indra Indikawati, Yoon-Ho Choi, Joonho Kwon:
A similarity query system for road traffic data based on a NoSQL document store. J. Syst. Softw. 127: 28-51 (2017) - [j12]Lewis Nkenyereye, Joonho Kwon, Yoon-Ho Choi:
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks. Sensors 17(10): 2191 (2017) - [c12]SeokHwan Choi, Doo-Hee Hwang, Yoon-Ho Choi:
Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack. DSC 2017: 131-137 - [i1]HyoungSeok Kim, Jihoon Kang, Woo-Myoung Park, SukHyun Ko, Yoon-Ho Choi, DaeSung Yu, YoungSook Song, JungWon Choi:
Convergence Analysis of Optimization Algorithms. CoRR abs/1707.01647 (2017) - 2016
- [j11]Minsu Kim, Yoon-Ho Choi, Byoung-Dai Lee, Namgi Kim:
An Efficient Terminal Selection Method for Multi-Hop Synchronization in Direct Communication Networks. J. Inf. Sci. Eng. 32(6): 1679-1695 (2016) - [j10]Xaiver Jerald Punithan, Jong-Deok Kim, Dongseok Kim, Yoon-Ho Choi:
A game theoretic model for dynamic configuration of large-scale intrusion detection signatures. Multim. Tools Appl. 75(23): 15461-15477 (2016) - [c11]Yoon-Ho Choi, WooJin Park, SeokHwan Choi, Seung-Woo Seo:
STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection. INFOCOM Workshops 2016: 65-70 - [c10]Su-kyung Kown, Bongsoo Jang, Byoung-Dai Lee, Younghae Do, Hunki Baek, Yoon-Ho Choi:
Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate. WISA 2016: 90-101 - 2015
- [j9]Yoon-Ho Choi, Han-You Jeong, Seung-Woo Seo:
A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures. IEICE Trans. Inf. Syst. 98-D(3): 637-648 (2015) - [c9]SeokHwan Choi, Da-Hyeon Kim, Yoon-Ho Choi:
Timely login status control using mobile app. CNS 2015: 743-744 - 2014
- [j8]Byoung-Dai Lee, Kwang-Ho Lim, Yoon-Ho Choi, Namgi Kim:
An Adaptive Computation Offloading Decision for Energy-Efficient Execution of Mobile Applications in Clouds. IEICE Trans. Inf. Syst. 97-D(7): 1804-1811 (2014) - [j7]Seungjae Shin, Namgi Kim, Byoung-Dai Lee, Yoon-Ho Choi, Hyunsoo Yoon:
On the Design of Delay based Admission Control in Hierarchical Networks. KSII Trans. Internet Inf. Syst. 8(3): 997-1010 (2014) - [c8]Dong-Hyun Je, Han-Seok Kim, Yoon-Ho Choi, Seung-Woo Seo:
Dynamic configuration of batch rekeying interval for secure multicast service. ICNC 2014: 26-30 - 2013
- [j6]Yoon-Ho Choi, Seung-Woo Seo:
BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching. IET Inf. Secur. 7(3): 195-202 (2013) - [j5]Yoon-Ho Choi:
Probabilistic Model for Performance Analysis of a Heuristic with Multi-byte Suffix Matching. KSII Trans. Internet Inf. Syst. 7(4): 711-725 (2013) - [j4]Dong-Hyun Je, Yoon-Ho Choi, Seung-Woo Seo:
Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications. IEEE Trans. Veh. Technol. 62(9): 4213-4227 (2013) - [c7]Jihyun Lee, Hye Jin Kam, Ha-Young Kim, Sanghyun Yoo, Kyoung-Gu Woo, Yoon-Ho Choi, Jeong Euy Park, Soo Jin Cho:
Prediction of 4-year risk for coronary artery calcification using ensemble-based classification. EMBC 2013: 3210-3213 - 2012
- [c6]Hye Jin Kam, Ha-Young Kim, Sanghyun Yoo, Jihyun Lee, Kyoung-Gu Woo, Yoon-Ho Choi, Jidong Sung, Sung Won Cho:
Comparing Statistical and Data Mining Approaches to Classify 4-year Risk for Progression of Coronary Artery Calcification in Men. AMIA 2012 - [c5]Sanghyun Yoo, Jihyun Lee, Ha-Young Kim, Hye Jin Kam, Kyoung-Gu Woo, Yoon-Ho Choi, Hee Young Shin, Mira Kang:
Prediction of Carotid Artery Stenosis using Ensemble-based Classification. AMIA 2012 - [c4]Ha-Young Kim, Sanghyun Yoo, Jihyun Lee, Hye Jin Kam, Kyoung-Gu Woo, Yoon-Ho Choi, Jidong Sung, Mira Kang:
Identifying relatively high-risk group of coronary artery calcification based on progression rate: Statistical and machine learning methods. EMBC 2012: 2202-2205 - 2011
- [j3]Yoon-Ho Choi, Moon-Young Jung, Seung-Woo Seo:
A fast pattern matching algorithm with multi-byte search unit for high-speed network security. Comput. Commun. 34(14): 1750-1763 (2011) - 2010
- [j2]Yoon-Ho Choi, Peng Liu, Seung-Woo Seo:
Creation of the importance scanning worm using information collected by Botnets. Comput. Commun. 33(6): 676-688 (2010) - [j1]Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:
Worm virulence estimation for the containment of local worm outbreak. Comput. Secur. 29(1): 104-123 (2010)
2000 – 2009
- 2008
- [c3]Yoon-Ho Choi, Moon-Young Jung, Seung-Woo Seo:
L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet Filtering. INFOCOM 2008: 2288-2296 - 2006
- [c2]Yoon-Ho Choi, Seung-Woo Seo:
A WDM Optical Packet Switch based on Wavelength Converter Blocks with Heterogeneous Conversion Capability. GLOBECOM 2006 - [c1]Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee:
An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. ICISC 2006: 206-221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint